Public sector security
Identiv, Inc. announced the development of Identiv’s Body Temperature Measurement Patch. The near field communication (NFC)-enabled transponder supports the reopening of public spaces, including theme parks and stadiums, and helps operators keep attendees and employees comfortable, confident, and safe. The product also supports global governments and healthcare workers that need to periodically monitor quarantined patients diagnosed with COVID-19. The new solution combines the simplicity...
The National Security Inspectorate (NSI) has announced the resumption of all audit and assessment activity from 1st June 2020, in light of current Government “go to work if you are unable to work from home” guidance. Government guidance allows all employers to resume activity in the workplace where appropriate, including professional services that cannot be delivered remotely, such as NSI on-site audits. NSI will utilize a combination of remote audit and on-site audit capability in...
Now that Europe is taking the first steps towards economic and social recovery after the COVID-19 crisis, it is also time to rethink the future. European politicians and institutions are now joining forces to present a recovery plan that builds on existing plans and ambitions to make the society healthier, more environmentally friendly, more energy efficient and safer. Euralarm calls on policymakers to take measures to increase the security of renovated buildings and to strengthen the cohesion...
Interphone has teamed up with Dahua Technology, a global video surveillance specialist, to help private and public sector organizations create a safer in-building environment and experience as COVID-19 restrictions are lifted. As an accredited Dahua Integrator Partner, Interphone will have access to the latest innovations in thermal access control, temperature monitoring, people counting and flow control, which will be used to develop epidemic safety protection solutions all types of premises....
Teleste Corporation will supply onboard Public Address, Passenger Information display and CCTV solutions to Alstom’s Coradia trains for the Luxembourg state railways, CFL (Société Nationale des Chemins de Fer Luxembourgeois). With the deliveries taking place in 2020–2024, the agreement covers system deployment for 34 EMU trains and includes an option for an additional 20 trains. “As more than 9.6 billion passengers travel on national railroad networks in the EU a...
Organizations globally are facing an urgent need to rapidly onboard hundreds of key employees, such as medical staff, nursing staff and other staff members, on a daily basis across multiple facilities and sites. HID Global, a worldwide renowned provider of trusted identity and identity management solutions, has introduced an emergency badging solution to help manage the secure issuance and administration of staff badges and access control credentials for employees as they navigate the current g...
Detection Technology, a globally renowned provider of X-ray detector solutions, has unveiled the industry’s first off-the-shelf detector subsystem for security CT (computed tomography) applications. CT plug-and-play-type subsystem The plug-and-play-type subsystem, branded as Aurora CT, includes ready-made, multi-slice detector boards and a data acquisition system (DAS). Aurora CT speeds up time-to-market and decreases total costs of X-ray imaging systems that meet the most stringent security equipment standards in aviation, such as ECAC EDSCB C3, ECAC EDS Standard 3.1, and TSA AT-2 TIER II. “We have a comprehensive track record as the most trusted provider of customized detector solutions for security CT applications, and now we are positioning ourselves as the first in the industry to offer standard solutions for this high-tier segment,” said Tomi Fält, Manager of Product Management at Security and Industrial Business Unit, Detection Technology. Off-the-shelf CT detector solutions Our Aurora-branded multi-slice X-ray detectors and control unit provide accurate data for 3D CT imaging systems" He adds, “We have identified an increasing demand for off-the-shelf CT detector solutions, which enable rapid and cost-efficient system development, yet meet the latest regulations and standards in every detail. Security CT systems offer plenty of features to enhance aviation safety and passenger experience.” Tomi further said, “Our Aurora-branded multi-slice X-ray detectors and control unit provide accurate data for 3D CT imaging systems that detect the contents of bags without the need to remove electronics or liquids from the bags. In Aurora CT design, we have also paid attention to planned next-generation standards, and have ensured that the design is future-proofed.” 3-sided tileable detector modules The 3-sided tileable detector modules easily scale from 16-slice up to 64-slice system configurations to cover a wide range of set-ups, from entry-level checkpoint carry-on baggage scanners to large hold baggage CT scanners. In addition, air cargo and other critical logistics applications can be boosted with the Aurora CT subsystem. The modules are available in flexible single-energy constructions, which also support dual-energy configurations. The high integration level of detector modules improves mechanical robustness and imaging performance. Withstanding G-forces of rotating CT systems The whole detector system withstands G-forces of rotating CT systems up to 20G. Furthermore, the design selections ensure very high radiation hardness for long product lifetime. Tomi said, “In Aurora CT, we have utilized our previously launched, well-proven Aurora platform. The platform is powered by a 20-bit, application-optimized single-chip ASIC that effectively mitigates the impact of external interferences.” “All our Aurora-branded solutions have a big heart in a small package. Aurora CT provides superior image quality and a fully digitalized data path in the most robust, modular and easily scalable platform”. Aurora CT detector subsystem Aurora CT detector subsystem comes with sparse and full pixel matrix options Aurora CT detector subsystem comes with sparse and full pixel matrix options. The detector matrix is built on individual low-noise BSI (backside-illuminated) photodiodes for ultra-low crosstalk and low noise to meet high spatial resolution and penetration performance requirements. The scintillator matrix has high light output, and is practically afterglow-free to ensure high image quality without artifacts at fast scanning speeds. Optical, high-speed datalink The Aurora CT detector subsystem includes X-DCB (data combiner board) as an essential part of the DAS. Precise synchronization with a rotating gantry can be implemented with flexible encoder interface. Aurora CT features an optical, high-speed datalink from the data acquisition system to a host computer. This is a proven solution for system integration with the data transmission over rotating slip ring. Support for remote firmware updates Aurora CT detectors and X-DCB support remote firmware updates for smooth system development and possible adaptation to new requirements. In addition, various development and diagnostics functions are included to confirm the status and monitor health of the detector system. A software library is available to support rapid integration of the inspection system. Furthermore, Detection Technology provides global support to facilitate and accelerate the system design phase and detector integration. The Aurora CT subsystem is available for volume shipments, and inquiries about the development kit can directed to the company.
The Innovation Gallery is an initiative promoted by the pioneering Spanish Security event, SICUR, that recognizes businesses who have demonstrated true innovation and made a significant contribution to technological development in their sector. OPTEX was featured among the top 14 winners in the Security category by a panel of industry experts for its innovative ViiK radar-based vehicle sensors. ViiK’s sensors are above-ground vehicle detectors which require no civil engineering works to be implemented. They can be easily mounted on a pole making it an ideal vehicle detection solution for historical city centers, untarmacked roads, or other locations where digging is not possible or impractical. Automatic gates or barriers The technology combines both microwave and ultrasonic waves to detect vehicles for a range of different operations. It has the ability to ignore human traffic and can be used in conjunction with automatic gates or barriers. The technology provides reliable detection even in adverse weather conditions such as rain and snow, with an operating range up to -30 degrees. ViiK sensors can also be part of a solution to trigger ANPR cameras and LED lights to increase the capture rate in license plate recognition systems. Milton Acosta, Regional Sales Manager for Iberia, says the business never stands still: “We are very pleased to be recognized among this years’ SICUR Innovation Gallery. For many single lane applications, our ViiK vehicle sensor represent an accurate and easy to install alternative to induction loops. By avoiding civil engineering work, it means a less disruptive and far quicker installation job. Sicur was a great event for us to showcase this new sensor.”
Union Community Co. Ltd. has newly developed its iris recognition terminals (UBio-X Iris) that can recognize IRIS at a distance of 50cm. Sales are expected to increase this year with the launch of contactless new products such as face recognition devices. Amid the on-going COVID-19 crisis, the demand for the non-contact biometric method is growing popular and biometric recognition solutions firm, Union Community has announced to launch an iris recognition system on the 12th of May, 2020. UBio-X Iris, iris recognition system Union Community's iris recognition system "UBio-X Iris" is equipped with an auto tilting function, which automatically finds iris at a distance of up to 50 cm and quickly authenticates it. It is expected that it will be spotlighted in medical facilities, airports, and commercial facilities where there is a high risk of infection due to the large floating population by eliminating the rejection of the iris scanner. Multimodal iris and fingerprint recognition In particular, security and convenience have been further strengthened with the "multimodal type" product, which enables not only iris authentication but also the multi-modal authentication of iris and fingerprints, to differentiate it from existing companies’ products. It is also equipped with a high-performance iris recognition algorithm that enables 20,000 iris authentications within a second. Contactless biometric recognition solutions Union Community expects a significant increase in sales with the launch of the iris recognition system this year As the demand for contactless biometric recognition has expanded in the global market, Union Community expects a significant increase in sales with the launch of the iris recognition system this year. There has been a steady request for iris products in major exporting areas such as the Middle East Region. Unlike facial recognition, the introduction of an iris recognition system is accelerating, focusing on public institutions and others, given that recognition can be accurate and fast even if using hijab. Rising demand for iris-recognition products In addition, in case of iris distinction, even twins are also knowledgeable and even after plastic surgery, there is no problem with authentication. Union Community is planning to speed up the release of iris-recognition products, which were scheduled to be released in the second half of this year, and strengthen its promotion. Biometric recognition systems Shin Yo-sik (Yoshik Shin), CEO of Union Community, said, "Based on our know-how that has been developing and selling biometric recognition systems for the past 20 years, we have established an integrated biometric recognition system that encompasses iris, face, and fingerprints as of this year.” Shin Yo-sik adds, “We will expand our demand for non-contact products around the world and plan to increase sales by strengthening non-face-face-face-face biometric products and security solutions."
Cybersecurity expert CrowdStrike has issued a stark warning to British businesses, telling them to crack down on lax remote working policies now or risk catastrophic exposure at the hands of adversaries after lockdown is over. Its latest research, in cooperation with YouGov, has found that over half (52%) of people in the UK working from home do so on their own personal devices, creating potential backdoors into corporate systems for adversaries. CrowdStrike has also seen a 100X increase in COVID-19 related malicious files circulating in February and March, yet two thirds (65%) of remote workers in the UK say they had no extra training against cyberattacks. Missing proper cyber security practices "It is important to stress that businesses in the UK are at huge risk of cyber security breaches right now," warned Mike Sentonas, CTO at CrowdStrike. "Most companies had to improvize in order to keep their operations running during lockdown. But the rush of creating a fully-remote workforce has meant that proper cyber security practices have fallen by the wayside. We have seen a rapid increase in attempted cyber-attacks by criminals taking advantage of the situation. UK businesses are attractive targets to these adversaries right now." Despite the rapid evolution and expansion of the cyber security threat landscape during the pandemic, only a third (33%) of respondents believe that cyber-attacks are more likely now than before the lockdown. Similarly, only 6% of respondents believe their personal devices are less secure than corporate ones, highlighting the urgent need for education around cyber security threats. "If companies don't take urgent action to tighten security measures around remote working practices, adversaries will gut organizations from the inside out. The time for UK businesses to wake up from their COVID-19 induced cyber security slumber is now," concludes Sentonas.
Genetec Inc. (“Genetec”), a renowned technology provider of unified security, public safety, operations, and business intelligence solutions announced that it is significantly expanding its digital initiatives to make it easier for customers and partners to stay connected and informed over the coming months. Following the success of Connect’DX, the Genetec virtual trade show and conference, the company is planning a similar event in the fall. Genetec is also ramping up its education programs with the immediate online availability of its entire technical curriculum including instructor-led classes, bespoke training, and self-paced learning options. Genetec also announced it will significantly reduce attendance at major in-person trade shows, conventions and conferences for the rest of the year. Genetec digital experience The whole Genetec team is motivated and engaged to help the people who put their trust in us" “The whole Genetec team is motivated and engaged to help the people who put their trust in us,” said Pierre Racz, President of Genetec, Inc. "These initiatives are about doing the right thing for our customers, our employees, and the industry as a whole. While we are all keen to get back on the road and interact with our customers and colleagues in person, I would much rather lose business than put a single customer or employee at risk.” Over 8,200 industry professionals from all over the world registered for Connect’DX. Each of the 4,750 attendees who participated in the event spent an average of 9 hours each attending expert panels, educational sessions and product demos, and visiting partners’ booths, leading to a total of 20,057 unique presentation views and 22,426 booth visits. Over 40 hours of content from Connect’DX is now available on-demand from the registration page, for existing registrants, and the post-show registration page for newcomers. First virtual trade show Building on the success of its first virtual trade show, Genetec is planning another Connect’DX event this fall. An invitation-only gathering, it will be targeted at partners, consultants and end-users. The company is also announcing a bi-weekly podcast that will explore the everyday challenges of managing and improving security, operations and intelligence with a practical look at real-world solutions and best practices. More information on both initiatives will follow soon. “We are presented with a significant opportunity to reassess our in-person events model and think in nontraditional ways,” said Andrew Elvish, Vice President of Marketing at Genetec. Online training and certification In the last 6 weeks, the Genetec education team has already remotely trained over 900 professionals “Looking ahead, we will be putting the emphasis on our signature in-person events such as our Connect series, and in the near term focusing on digital experiences that deliver a high level of engagement without having to travel. The overwhelmingly positive feedback we received from everyone who participated in our first digital experience, Connect’DX, clearly demonstrates that the physical security industry is ready to embrace new ways of connecting, networking and learning.” To ensure continued access to its training and certification classes in spite of the current travel restrictions, Genetec is making its entire course curriculum and instructor-led classes available online, leveraging the latest learning technologies. In the last 6 weeks, the Genetec education team has already remotely trained over 900 professionals and is ramping up its schedule of offerings with live training courses across all time zones while also offering opportunities for self-paced learning. Bespoke training is now also available online with a dedicated instructor. Comprehensive technical training curriculum “Our team is fully committed to providing the best learning experience possible to all our customers around the world. After rigorously testing and vetting new approaches, we are offering a comprehensive technical training curriculum in a fully virtual environment, making use of several great tools and new techniques, including: our Learning Management System, a practice environment within Microsoft Azure, how-to videos, revamped exam scenarios, and hardware simulators, to name a few,” said Nadia Boujenoui, Vice President of Customer Experience at Genetec. “We have pushed hard to ensure multiple online training options are available to customers but some things haven't changed, including the individual attention from our talented instructors, our trainer-to-student ratio, and rich discussions with other professionals during our live courses, all of which are key to effective learning.”
Since 2011, SALTO Systems, in partnership with BioCote, the market renowned antimicrobial technology supplier, has incorporated antimicrobial silver ion technology in its smart electronic lock range, electronic cylinders, locker locks, and supporting devices like wall readers. The addition of BioCote’s antimicrobial technology helps reduce microbes on product surfaces and improves hygienic building environments and ultimately creates a cleaner environment for both users and visitors. “A cleaner, more hygienic building environment ultimately creates a better environment for both users and visitors. The more hygienic the environment, the less chance of cross-contamination. This helps to reduce the spread of microbes around a building as microbes are not transferred from door to door and surface to surface,” said Aznar Sethna, CSMO SALTO Systems. Ultimate hygiene solution "We have long relied on the addition of BioCote to our electronic lock products and we will continue to do so to help cleaning regimens and hand hygiene to provide the ultimate hygiene solution.” BioCote has successfully tested against a feline strain of Coronavirus, showing a reduction of 90% in two hours, which is a positive indicator of the antiviral properties of their technology. Previous testing has revealed that BioCote delivers 99.9 percent, 24/7 protection against an array of microbes including Influenza A H1N1, E.coli, Salmonella, and antibiotic-resistant CRE, VRE, and MRSA. Smart-locking range BioCote cannot be wiped or worn away and hence enhances hygiene management and reduces the possibility of cross-contamination. SALTO BioCote antimicrobial protection consists of silver-ion technology which is integrated during the manufacturing process. SALTO added BioCote as a standard additive for all plastic devices produced as well as with the new XS4 Locker Lock BLE. SALTO also offers BioCote as an option on its complete line of electronic locks and online wall readers. "Our findings continue to show the positive impact antimicrobial surfaces in our smart-locking range and products have on reducing the levels of bacterial contamination. BioCote silver ion technology significantly reduces the level of microbes on SALTO escutcheons and door handles by up to 99.99 percent which is an incredible accomplishment,” said Sethna. Smart door lock hardware The finish is long-lasting and maintains its antimicrobial performance over the expected lifetime of the escutcheon The finish of BioCote treated smart door lock hardware differs slightly from that of standard-finish escutcheons due to the mix of lacquer and silver ion particles. In wall readers, locker locks, and lock readers, it's invisible. The finish is long-lasting and maintains its antimicrobial performance over the expected lifetime of the escutcheon. At present, government guidelines recommend regular cleaning to minimize the spread of microbes in any building type. However, beyond regular cleaning, little consideration has been given to alternate or non-traditional methods for limiting the potential for cross-contamination within the public environment. By effectively reducing a broad spectrum of microbes by up to 99.9 percent, BioCote antimicrobial technology provides integrated and lasting hygienic protection that supports regular cleaning regimes and hand hygiene. Electronic access control technology “SALTO has been an innovative leader in electronic access control technology for two decades and we are just as proud to have been equally as advanced when it comes to the hygienic upkeep of our products with a leading partner like BioCote,” said Sethna. SALTO has developed a white paper that discusses the use of BioCote antimicrobial technology. To download the white paper, one can visit the official website of the company.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
Axis Communications has introduced a body-worn camera solution, which the company says represents a natural extension of their corporate vision, business strategy and core competence. The new body-worn cameras and other elements of the system will provide Axis new opportunities to grow by tapping into existing and new customers. The fast-growing body-worn camera market is an attractive one, and Axis sees opportunities to extend the use of body-worn cameras beyond the current core market of police and corrections officers. Private security applications for the technology include healthcare, education, banking, public venues, retail, logistics, transportation and places of worship. The new body-worn camera system was designed with Axis partners and ecosystem in mind, says Martin Gren, Founder and Director of New Projects at Axis. “We try to make it fit with existing customers.” Deploying and using the system The new body-worn camera system was designed with Axis partners and ecosystem in mind Gren says the system is easy to deploy and use. The Axis W100 camera provides 1080p images, wide dynamic range (WDR) and has dual microphones, operating 12 hours on a single charge. GPS/GNSS global satellite navigation provides location, and a six-axis gyroscope and accelerometer offer additional data beyond the video image. For example, sensors might be triggered in some situations to initiate recording. One-bay (Axis W700) or eight-bay (Axis W701) docking stations enable high-speed supervised data offloading and battery charging, and a system controller (Axis W800) provides a central point for integration and management. Use of Zipstream compression technology saves on bandwidth and storage. Video cannot be accessed in the field, but only when a camera has been docked. There are many layers of security, and encryption protects all data used in the system from being accessed by outside agents. The USB interface cannot be connected to an ordinary computer but only to the docking station. Open standards Open standards ensure easy integration with video management systems and/or evidence management systems, whether on-premises or in the cloud. At the time of release, the Axis body-worn camera system is already integrated with Milestone XProtect, Genetec Security Center, and Axis Camera Station VMSs. It is also integrated with the Genetec Clearance cloud-based evidence management system. An application programming interface (API) will facilitate additional integrations over time. The body-worn cameras will be sold through the current Axis channels The body-worn cameras will be sold through the current Axis channels of distributors, systems integrators and resellers. The camera is part of the Axis “ecosystem,” which includes the company’s familiar network cameras as well as recent additions such as access control, network audio systems (including loud speakers), intercom door stations, a radar detector and other Internet of Things (IoT) devices. “The more things you integrate, the more value you add to customers,” said Gren. The new body-worn camera systems are core products for Axis; they are not made by another original equipment manufacturer (OEM) and merely sold under the Axis label. “When we decided to do body-worn cameras, OEMing was not an option,” said Gren. “Instead we took some experienced Axis engineers and a bunch of new ones to develop this product line to ensure the same Axis quality and compatibility.” Introducing the new product The body-worn camera system was unveiled remotely in a press conference webinar; the original plan was to introduce the new product at ISC West, which was canceled to minimize spread of the novel coronavirus. In addition to announcing the new product, the Axis executives provided commentary and insight into the ongoing coronavirus crisis. “The security industry is a close-knit community that is connected in more ways than one,” said Fredrik Nilsson, Axis Vice President of the Americas. “We are all in this together. The industry has always exemplified resiliency, ingenuity and vision to address such challenges.” We are all in this together. The industry has always exemplified resiliency, ingenuity and vision" “There is some disruption in the Axis supply chain, but we have a broad partner-based supply chain when it comes to our sub-suppliers, our seven global CLCs (Configuration and Logistics Centers) and the distributors who keep inventory for integrators,” said Nilsson in the March 18th press call. “There is some stress on some components, but things are working relatively well under the circumstances. We are monitoring it on a day-to-day basis, but so far we have been able to hold things up very well.” Gren offered a comment on the possible use of thermal cameras (which Axis makes) to measure body temperature during the COVID-19 crisis: “When we designed our thermal cameras, that was a common question,” he said. “But in general, it is difficult to use a thermal camera to get an accurate reading. We have one model – the Q2901 – that is a temperature-accurate thermal camera, and if you look straight into the camera, it is accurate to around 1° F. However, there are more efficient ways to [measure temperature]. In general, it’s not a business application I would recommend.”
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
Synectics has secured a competitive public space contract to provide integrated surveillance solutions for a number of prestigious sites across London, the UK's capital. Comprising government properties, heritage sites, and high-profile public event venues, the contract builds on Synectics' reputation as the surveillance solution of choice for London's public space protection. The successful award can also be attributed to the company's ability to deliver tailored, open-architecture solutions incorporating integration to third-party systems such as access control and intruder detection. Control software platform Synectics, which supports more than 70% of London's boroughs, as well as major retail stores and stadiums across the city, will upgrade all sites to its Synergy 3 command and control software platform. Each of these sites falls under our specialism in public space" While the specific locations cannot be named, the sites include listed buildings, high-security 'closed-to-public' assets, and venues with high levels of public footfall. Martin Bonfield, UK Sales Manager, at Synectics commented: "Each of these sites falls under our specializm in public space, but individually they each have unique requirements. That plays to our strengths in terms of the flexible technologies we offer and the broader sector experience we hold, from gaming and critical national infrastructure to city surveillance, retail, and public transport.” Superior incident management "These credentials illustrate our capability at developing and deploying surveillance solutions for projects that must balance high levels of public access with stringent security conventions and superior incident management. Our professional services team is also highly skilled at migrating systems under live operating conditions, which was a specification of the comprehensive brief." "One of the locations included in this tender process was an existing Synectics site operating a legacy Synergy product. The trust in our Synergy solution by the customer meant that satisfaction with the system reliability and user experience was high." Multi-Site monitoring The Synergy 3 solution deployed at each site will enable the control room teams to monitor existing cameras The Synergy 3 solution deployed at each site will enable the control room teams to monitor existing cameras — totaling around 500 across the sites — alongside integrated third-party systems such as access control and intruder detection. Linking all locations for eventual multi-site monitoring was a crucial component of the project brief, ensuring the sites continue to support future needs and incorporate the latest camera technology and system features as required. Martin explained: "Synergy 3's power and scalability in terms of integrations and future system consolidation presented a powerful proposition to our customers, combined with our wider London portfolio of projects, partnerships, and supporting closer collaboration with the Metropolitan Police."
Verkada Inc., globally renowned provider of cloud-based enterprise video security, has announced the company's 'Remote Video Monitoring Station' program which includes 90 days of complimentary equipment and cloud services to help healthcare facilities, shelters, and municipal services across the U.S., Canada, and UK respond to the COVID-19 outbreak. 'Remote Video Monitoring Station' program With this program, Verkada will provide hospitals and municipalities with all the necessary video equipment to quickly scale patient video monitoring while reducing medical workers' exposure and use of critical PPE equipment. Organizations will receive Verkada security cameras, a designated viewing station and complete access to Verkada's cloud-based management software, which delivers secure remote monitoring from any device or browser. Cameras can be easily deployed in both existing sites and newly converted "pop-up" locations at shelters and hospitals. HIPAA compliant video solution Over 200 leading healthcare providers already use Verkada's HIPAA compliant video solution Over 200 leading healthcare providers already use Verkada's HIPAA compliant video solution. With a focus on customer privacy and security, Verkada provides customers with the tools to ensure patients and staff are always protected. For organizations looking to enable remote visibility without adding overhead, Verkada deploys in minutes, is simple to maintain, and requires no additional equipment like NVRs or DVRs. To ensure a low network impact and support limited connectivity, cameras store continuous footage while select metadata is sent over the cloud, reducing network consumption to just 20 kbps per camera in the steady-state without impact to quality. Remote Viewing Station "Verkada has helped us implement features that make our business better and allow us to use video footage in ways that we hadn't thought of before," said Michael Marques, Director of Technical Services at Halifax Health. At the end of the program, organizations can either return their Remote Viewing Station at no cost using prepaid postage or can purchase the equipment for ongoing use.
While HENSOLDT is a global pioneer of technologies that are designed for protecting armed forces, civilians, assets and borders, the company is also actively making a difference as a protector of endangered species. South Africa is known for its iconic wildlife and is also home to one of HENSOLDT’s largest industrial sites. As a result, it came as a natural progression to protect the country’s wildlife using state-of-the-art defense and security technologies. Rise in rhino poaching In recent years, animals such as rhinos have been under increased pressure due to rising poaching levels, threatening the future of these animals. South Africa holds nearly 80% of the world’s rhinos and has been hit the hardest by poaching, with more than 1 000 rhinos killed each year between 2013 and 2017. HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy HENSOLDT responded to this threat, and is now combining advanced intelligence, radar and optical surveillance systems with physical security for high-end wildlife protection. This week, HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy, where HENSOLDT’s technologies have been keeping a large number of rhino safe. HENSOLDT South Africa designed and installed a surveillance and security system on the farm and since then, not one animal has been lost to poaching. “Before that, we had poaching every month, sometimes every week,” says John Hume, owner of Buffalo Dream Ranch. Situational awareness In 2017, Buffalo Dream Ranch, the world’s largest rhino farm, started a partnership with HENSOLDT to secure 8000 hectares of land, where some 1800 rhinos now live peacefully, protected by state-of-the-art HENSOLDT technology. The specially developed system combines a number of advanced sensors, including optical and radar sensors, to monitor the rhinos, farm and surrounding area. Data from these sensors are fused using advanced analytics at a command and control center to provide complete situational awareness and early-warning of potential poachers approaching the area. In combination with existing physical barriers and a team of security personnel, the system augments the total security approach to create a surveillance solution, with technology that is always on guard, never fatigues and which cannot be compromised. “We are for the first time in years feeling confident, with HENSOLDT, of perfecting the protection of our rhino,” says Hume. Wildlife protection The know-how acquired through these projects can be applied for protecting other wildlife “We are honored to be part of important initiatives such as the conservation of our wildlife and we aim to expand our efforts,” says Hennie Venter, Chief Executive of the HENSOLDT South Africa GEW business unit. The know-how acquired through these projects can be applied for protecting other wildlife and national parks to safe-keep endangered species such as lions, elephants and even abalone. HENSOLDT prides itself on its relationship with its clients. “For us it’s not putting down the equipment and getting the business, for us it’s rather a journey,” says Werner Muller, GEW’s Chief Executive of Spectrum Monitoring and Security. Needs-based solutions Because of this philosophy, and because each wildlife scenario is different, with its own unique set of challenges, HENSOLDT’s experts collaborate with each client to develop a solution that addresses their specific needs. Through its business units, GEW and Optronics, HENSOLDT South Africa delivers solutions to clients across the world, and significantly contributes to South Africa’s export industry, while it is firmly grounded in its roots as a proudly South African company, operating in South Africa for South Africa. HENSOLDT is committed to continue innovating to protect the wildlife.
The State of Illinois has enacted a ‘stay at home’ order effective as of Saturday, March 21, at 5pm to curb the spread of the COVID-19 coronavirus. This means all residents are mandated to ‘remain at home’ and only essential businesses may remain open to provide critical services. Everybody fully supports this measure as it will hopefully slow the spread of the virus. Securing critical infrastructure Under the order, Illinois Gov. J.B. Pritzker has mandated that all Illinoisans stay in their homes except as needed to maintain continuity of business critical operations. This coincides with Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience that advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. BCD plays an important role in the information technology sector. The sector's complex and dynamic environment makes identifying threats and assessing security vulnerabilities difficult and requires that these tasks be addressed in a collaborative and creative fashion, especially as it directly affects both the public and security infrastructure.BCD plays an important role in the information technology sector Working with security integrators and OEMS In addition, it is imperative to maintain the supply chain in this unprecedented time of need. They work hand-in-hand with a number of security integrators and OEMs that work directly with the Federal Government. Most importantly, they supply life safety equipment that is used by first responders to help and keep them safe. Therefore, BCD Illinois build centers will remain open and operational, as the support technicians and engineers will remain available to continue to support all customers to fulfill the critical technology needs of the nation’s federal, state and local governments, healthcare facilities, and education, industrial and financial services sectors. It has also been notified that all shipments to US States currently in "stay at home" status may be delayed by the freight carriers; this includes the State of Illinois. BCD build centers Jeff Burgess, Chief Executive Officer (CEO) at BCD said, “We continue to implement strict precautionary measures in all our logistics and integration centers, in accordance with government and public health requirements, to reduce risk for colleagues who are performing their duties. Our Illinois-based technical operations will continue as long as we can confidently protect the health and well-being of these dedicated two dozen team members. All other BCD staff will continue working from home until further notice.”
AI technology solutions firm, Athena Security is rolling out a line of artificial intelligent thermal cameras, which will be critical in the coming weeks. Containing Covid-19 spread With voters congregating at the primary polls in three US states, exponential spread of the Coronavirus (Covid-19) is inevitable. The infected voters, many of whom will be ignorant that they have the contracted the virus, will spread it to countless others. In the coming weeks, those infected with the virus will need full awareness of their state of health to prevent further spread of the infection. High-tech AI thermal cameras AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus Taking into consideration that high temperature is one of the first symptoms of Coronavirus (Covid-19) infection, these high-tech AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus and encouraging that person to take serious steps to self-quarantine immediately. Although many voters are bound to contract Coronavirus (Covid-19) when casting votes, steps taken in the coming weeks could prevent those infected from spreading it to loved ones and strangers alike. Some details surrounding the AI thermal cameras include: The cameras capture video accurately within 1/2 a degree They detect 12 different points on the body These cameras are perfect for mass congregation locations, such as airports, grocery stores, hospitals and voting locations The AI thermal cameras are ‘Ethical’ and feature no facial recognition or personal tracking Athena Security is the first A.I. technology company to accurately detect guns to mitigate mass shootings back in 2018 The first deployment of the AI thermal cameras is in Austin, Texas, USA
Link11, renowned European firm in the field of cyber-resilience and cyber security, is offering its DDoS protection solutions free of charge to public sector health, government and public education organizations during the highly contagious phase of COVID-19. Public sector organizations are particularly vulnerable to cyber-attacks, and the availability of critical public infrastructures is more important than ever as people look for genuine sources of information related to the virus outbreak. Remote working policies Governments all over the world have taken necessary actions to lower COVID-19’s spreading curve, including implementing remote working policies, resulting in significant growth in internet traffic, leading to an increased risk of social engineering, business email compromise, ransomware and DDoS attacks. According to Link11’s research, during the three-week period Monday 17 February to Monday 9 March, Link11’s Security Operation Center (LSOC) defended 20,349 minutes of attacks (over 2,860 hours), which is more than 30% up compared to the 15,612 minutes of attacks mitigated during the same period in 2019. Link11 Cloud Protection Platform Marc Wilczek, Chief Operations Officer (COO) of Link11 said, “It takes only a small effort these days to overload servers and online services, and organizations need to protect their infrastructures. To help them deal with the evolving threat landscape, Link11 is offering government, public health and education organizations a solution that proactively identifies, blocks, and mitigates DDoS attacks within the Link11 Cloud Protection Platform, free of charge until September 2020.” Link11’s integrated Cloud Security Platform ensures cyber-resilience of the entire IT infrastructure On Sunday 15 March, the U.S. Department of Health and Human Services (HHS) suffered a cyber-attack, designed to slow the agency’s services amid the government’s rollout of a response to coronavirus, with the aim of overloading HHS servers. Officials assume a hostile foreign actor was behind this campaign. Cloud-based DDoS protection Traditional on-premise DDoS defenses, which are still widely used, and load-balancing products, are not able to protect individual websites, APIs or cloud applications against Layer-7 attacks, as these malicious data tsunamis can create big damage with little total bandwidth, bringing everything to a standstill instantly. Cloud-based DDoS protection, such as Link11’s integrated Cloud Security Platform, uses artificial intelligence, machine learning, strict automation and real-time analytics to ensure cyber-resilience of the entire IT infrastructure and application landscape supporting hybrid as well as cloud-native deployments.
Round table discussion
Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting utilities?
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Public sector security: Manufacturers & Suppliers
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload