Public sector security
Cheshire, UK, based Anekanta Ltd (Anekanta) and New York, USA, based GT Digital (GT) announced that they are working together to progress GT’s patent-pending, innovative, cognitive intelligence platform MediaMaestro. Through its advanced military-grade proprietary algorithms, MediaMaestro can automatically predict emerging threats before they happen, enable fast mitigating action and provide continuous updates to a rapidly evolving scenario. In a society where the threats to the s...
Allot Ltd., the global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers and enterprises, announced that it was chosen by Broadcom as the recommended vendor to offer a transition path from the discontinued PacketShaper line of products to the Allot Secure Service Gateway (SSG). Following their Broadcom acquisition, the Symantec Enterprise Division has chosen to End of Sale the PacketShaper line of produc...
Given the current outbreak of COVID-19 and the impact the virus is having on global communities, customers, employees and families, AAEON would like to share their business continuity plans, and how they can help. Operation as Usual All AAEON facilities and functions are running as usual. The manufacturing sites in AAEON Taiwan and China are at full operation. The Supply Chain Management, FAE, RMA, and Logistic Center in AAEON Europe Netherlands remains working without disturbance. All AAEON E...
AAEON, a provider of IoT and AI edge computing solutions, is helping to power the pandemic response with the BOXER-6638U rugged embedded box PC. Featuring Intel Core i3 processors, the BOXER-6638U brings the power of industrial computing to mobile X-ray machines, used to perform chest X-ray scans of suspected COVID-19 patients. This vital equipment helps increase the speed and accuracy of diagnosis, and prevent the spread of the pandemic. The spread of Coronavirus disease 19 (COVID-19, previous...
The Security Industry Association (SIA) has selected Efrain Pardo as the spring 2020 recipient of the Denis R. Hebert Identity Management Scholarship, a program presented in partnership with the Center for Identity at the University of Texas at Austin offering $5,000 scholarships for SIA members to help further their education in the field of identity management. This scholarship program – named after Hebert, President of Feenics Inc. and a past member of SIA’s Board of Directors wh...
Genetec Inc., a renowned technology provider of unified security, public safety, operations, and business intelligence solutions announced the immediate availability of its next-generation mobile license plate recognition system. The new AutoVu SharpZ3 goes beyond traditional license plate identification and brings new levels of insight in vehicle analytics, situational awareness, and accuracy. Mobile ANPR Ideally suited to meet the needs of parking managers who use mobile ANPR as pa...
Sepura has hired Victor Rodrigues as Strategic Account Director for Southern Europe, confirming the company’s ambition to continue growing business in the region. Victor has extensive experience in global sales from an initial spell with Sepura, having provided TETRA radios to national police forces that are still in use across Southern Europe, a testament to the radios’ durability. public safety organizations Victor latterly headed up Sepura’s South American sales team, establishing the company as a major presence in the regional critical communications market, and securing business with both public safety and commercial organizations in the region. This included providing radios and networks to support the 2014 FIFA World Cup in Brazil, as well as regional police forces in Brazil, Argentina, Chile and Mexico. Victor’s experience and contacts in the market will be crucial to continue developing Sepura’s presence" Before returning to Sepura in 2020, Victor was based in Barcelona, supplying technology including body worn cameras and Tasers to police and other public safety organizations in Southern Europe. TETRA radios Speaking about his return to Sepura, Victor said, “I see tremendous potential in the Southern European market with upcoming opportunities to provide Sepura’s newest generation of TETRA radios to critical communications users. I’m looking forward to working with our partners and customers to ensure that Sepura continues to be the radio of choice for public safety in Europe.” Sales and Marketing Director Terence Ledger added, “For Sepura it is vital to have the right resources in region. Victor’s experience and contacts in the market will be crucial to continue developing Sepura’s presence, and ensuring that our customers have best-in-class solutions to support their operations. We are delighted to welcome Victor back as part of our great team at Sepura.”
This year Counter-Terror Expo (CTX) and IFSEC International will co-locate for the first time, creating the UK’s largest security event. The two events will take place simultaneously from 19-21 May 2020 at the ExCeL, London. CTX brings together international specialists and experts from industry, government and policing to share ideas and technology within the counter-terrorism field. The content program will feature themes including drone threats and response, securing major events and public spaces, perimeter and access security, counter surveillance, threat forecasting and prevention, cyber threat detection and mitigation. IFSEC, one of UK and Europe’s most popular security events, will welcome tens of thousands of security professionals and provide valuable opportunities to meet with buyers and customers across the supply chain. Discuss technologies in crucial areas The first-time co-location of these two key industry events will allow attendees from the broader security and protection sectors to join with counter-terror stakeholders to source and discuss technologies in crucial areas including surveillance, venue security, AI, access control, transport security and more. Co-locating CTX with IFSEC opens the event to a wider and more international audience, which is a win-win" Exhibitors have praised the co-location of the two shows. Antonia McIntosh, Marketing Specialist at Fischer Connections said, “Fischer Connectors is looking forward to be exhibiting at CTX again and as part of the show’s continued growth and popularity, we’re excited to see it co-located with IFSEC which will give us the opportunity to showcase our products and meet and engage with even more visitors representing all aspects of the security supply chain, all under one roof.” More international audience Nick Booth, VP Marketing at Blighter Surveillance Systems Ltd said, “Co-locating CTX with IFSEC opens the event to a wider and more international audience, which is a win-win for both visitors and exhibitors alike.” CTX and IFSEC will also be joined by further co-located events within ExCeL – Forensics Europe Expo, Intelligent Building Europe, FIREX International, Safety & Health Expo, Facilities Show and Workplace Wellbeing Show.
Videonetics, an international provider of AI & DL powered Unified Video Computing Platform development company, has announced a distribution partnership with Spectra Innovations Pte Ltd, Singapore, to offer their complete array of products and solutions across the South East Asia and ASEAN region. Headquartered in Singapore, Spectra Innovations Pte Ltd has an established network of certified channel partners, system integrators, training and support specialists in South East Asia and ASEAN countries. Through this partnership, Spectra is all set to offer Videonetics AI & DL powered Unified Video Computing Platform encompasses Intelligent VMS, Artificial Intelligence & Deep Learning Video Analytics, Intelligent Traffic Management System and Facial Recognition Software. Video Analytics solutions We are pleased to enter into this value-added distribution relationship with Spectra" On the appointment, Avinash Trivedi, VP – Business Development, Videonetics expressed, “We are pleased to enter into this value-added distribution relationship with Spectra and introduce our indigenous offerings in the ever-growing markets of SEA and ASEAN region. As ranked amongst the top 5 VMS providers in Asia, Videonetics continues to increase focus and investment globally." "I am assured that Spectra’s remarkable management capabilities and extensive partner network, combined with Videonetics’s state-of-the-art solutions will cater to growing demand for truly unified solutions in different verticals such as safe & smart city, aviation, transportation, critical infrastructures, heavy engineering, healthcare, education and retail to name a few.” Affordable and deployable “Spectra is pleased to be appointed as a Regional Distributor of Videonetics. With the adoption of CCTV gaining acceptance beyond just surveillance into sectors such as garbage management under Smart City initiative, loss prevention applications in retail, logistics and warehouses, productivity improvements in factories to name a few, the need for VMS and Video Analytics solutions are becoming affordable and deployable in mass scale today” said Kanwal Sahney, Managing Director, Spectra Innovations Pte Ltd.
Milestone Systems, a global pioneer within open platform video management software (VMS), withdraws from 2020 Expo Seguridad Mexico, the largest exhibition for security products and solutions in Latin America. Due to recent developments of COVID-19 in Mexico as reported by the Mexican Ministry of Health, Milestone is enacting this proactive health measure. “The health and well-being of our partners, employees, and customers is our top priority at Milestone,” said Tim Palmquist, Vice President for the Americas at Milestone Systems. “As COVID-19 continues to unfold worldwide, we are taking this precautionary measure for the benefit of all our stakeholders in Latin America and are withdrawing from Expo Seguridad. We are in the process of considering alternative ways to share the essential information we prepared for the show.”
Percepto, the global company for autonomous industrial drone solutions, has announced the appointment of Amit Musli to the role of Vice President of Sales. Amit Musli will build on the success Percepto has achieved in the past 12 months, during which time the company has grown its customer-base across four continents and 10 countries – providing aerial insights for organizations (including Fortune 500 and the top ASX) in mining, oil & gas, solar and thermoelectric power industries. Industrial drone solutions Amit is responsible for managing Percepto’s rapidly expanding global sales team The company has also established a solid foundation expansion in 2020, having helped many customers to obtain waivers to fly its drones Beyond Visual Line of Sight (BVLoS) in the US, Mexico, Singapore, Portugal, Israel and Italy. Amit is responsible for managing Percepto’s rapidly expanding global sales team. He brings to Percepto a wealth of experience value selling to large enterprises in the aerospace, defense and cyber industries. He joins the company from Kramer Electronics Ltd, where as a key member of the senior management team he led its corporate sales operations policy and implementation, establishing and managing global sales teams of more than 100 people and generating hundreds of millions of dollars in sales. Autonomous drone technology “Percepto is a cutting-edge company at the frontier of an industry that is predicted to be worth $100 billion in just five years,” states Amit. “The impact autonomous drone technology is already having on the operations, safety, security and regulatory compliance of industrial organizations cannot be overstated, and it makes this new role at Percepto an immensely exciting opportunity.” CEO of Percepto, Dor Abuhasira comments on the appointment, “Amit has the expertise and also shares our excitement about Percepto's global potential. He will lead our expanding sales operations to introduce new organizations, industries and territories, to our DIB solution, as well as supporting existing customers to grow with us, and take advantage of new product and service innovations which we are constantly developing.”
Everbridge, Inc., the globally renowned company in critical event management (CEM), has announced that the company has unveiled new CEM capabilities across the Internet of Things (IoT) for corporate, government and healthcare organizations to protect their people, assets, operations, supply chain and brand from critical events such as coronavirus (COVID-19). Everbridge CEM platform Everbridge’s industry renowned CEM platform will feature a new IoT extension module that will also leverage the intellectual property from recent technology acquisitions of Connexient and CNL Software. As a result, organizations will be able to gather a broader range of situational intelligence and automate targeted responses throughout their entire safety, security, and operational continuum – from across a global footprint to within campuses and facilities. Everbridge CEM platform enables organizations to utilize vast amounts of electronic data, including IoT sensors With the number of IoT devices expected to approach 75 billion by 2025, the Everbridge CEM platform enables organizations to utilize vast amounts of electronic data, including IoT sensors, to digitally transform how they manage the safety and security of their employees, customers, patients, first responders, residents, and visitors, as well as the resiliency of their operations and supply chain. Critical Event Management (CEM) for IoT CEM for IoT extends the number of use cases for the Everbridge platform within the broader critical event management market, complementing the company’s existing offerings for supply chain and wearable devices. Companies, governments and healthcare organizations utilize CEM to mitigate risks from coronavirus with several million COVID-19 related communications deployed by Everbridge in recent weeks. The expansion of CEM for IoT enhances coronavirus-related use cases to better protect people, operations, supply chain and brand. Coordination between first responders, healthcare units For example, the Everbridge ecosystem supports over 1,500 healthcare entities including the top pharmaceutical, biomedical and medical device and manufacturing companies, as well as the largest healthcare systems (overseeing more than 25 percent of all hospital beds in the U.S.), managed care organizations, pharmacies, and statewide health alert networks (HANs), including the Center for Disease Control and Prevention (CDC) and the National Institutes of Health (NIH). CEM for IoT improves the ability to coordinate first responders and other critical healthcare resources such as intensive care unit (ICU) beds, respirators, expert medical staff, etc., based on real-time data on the broader impact of COVID-19. Data security and threat identification The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats Everbridge’s IoT initiative employs the same CEM framework currently being used by global industry firms involved in aircraft manufacturing, financial services, entertainment & media, high tech, healthcare, hospitality, retail, pharmaceuticals, the federal government, and other sectors. The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats; determining the relevance of a threat to an organization’s people, facilities, assets, supply chain and reputation based on their dynamic locations; automatically initiating and orchestrating an enterprise-wide response plan using the organization’s policies and procedures and monitoring execution of that plan; while analyzing cycle times and results to identify bottlenecks and improve future performance. The acquisitions of Connexient and CNL Software augment the IoT capabilities of the Everbridge CEM Platform bringing the total number of out-of-the-box integrations to over 225. Integrations include numerous healthcare systems, indoor positioning, digital wayfinding, building management, access control, intruder detection, video management, and many more. Safe City and Smart Building programs Everbridge solutions secure major events, cities, states, military installations, government buildings, universities, airports, corporate campuses, and healthcare facilities, providing instrumental functionality to Safe City and Smart Building use cases across multiple critical events including coronavirus. The CEM platform monitors threat data streams continuously, alerts stakeholders" “The CEM platform monitors threat data streams continuously, alerts stakeholders when there is a relevant issue, and automatically orchestrates a coordinated response—it is always on,” said Imad Mouline, Chief Technology Officer (CTO) of Everbridge Inc. Connected, IoT devices Everbridge has experience with early implementations of Safe City and Smart Building programs in both the public safety and corporate space. According to IHS Markit, the global Safe City market will reach $35.8 billion in 2024. Brand Essence Market Research forecasts the overall Smart Building market will grow to $59 billion in 2025. The utilization of a network of connected devices, or IoT, will make up a portion of both markets.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
While HENSOLDT is a global pioneer of technologies that are designed for protecting armed forces, civilians, assets and borders, the company is also actively making a difference as a protector of endangered species. South Africa is known for its iconic wildlife and is also home to one of HENSOLDT’s largest industrial sites. As a result, it came as a natural progression to protect the country’s wildlife using state-of-the-art defense and security technologies. Rise in rhino poaching In recent years, animals such as rhinos have been under increased pressure due to rising poaching levels, threatening the future of these animals. South Africa holds nearly 80% of the world’s rhinos and has been hit the hardest by poaching, with more than 1 000 rhinos killed each year between 2013 and 2017. HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy HENSOLDT responded to this threat, and is now combining advanced intelligence, radar and optical surveillance systems with physical security for high-end wildlife protection. This week, HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy, where HENSOLDT’s technologies have been keeping a large number of rhino safe. HENSOLDT South Africa designed and installed a surveillance and security system on the farm and since then, not one animal has been lost to poaching. “Before that, we had poaching every month, sometimes every week,” says John Hume, owner of Buffalo Dream Ranch. Situational awareness In 2017, Buffalo Dream Ranch, the world’s largest rhino farm, started a partnership with HENSOLDT to secure 8000 hectares of land, where some 1800 rhinos now live peacefully, protected by state-of-the-art HENSOLDT technology. The specially developed system combines a number of advanced sensors, including optical and radar sensors, to monitor the rhinos, farm and surrounding area. Data from these sensors are fused using advanced analytics at a command and control center to provide complete situational awareness and early-warning of potential poachers approaching the area. In combination with existing physical barriers and a team of security personnel, the system augments the total security approach to create a surveillance solution, with technology that is always on guard, never fatigues and which cannot be compromised. “We are for the first time in years feeling confident, with HENSOLDT, of perfecting the protection of our rhino,” says Hume. Wildlife protection The know-how acquired through these projects can be applied for protecting other wildlife “We are honored to be part of important initiatives such as the conservation of our wildlife and we aim to expand our efforts,” says Hennie Venter, Chief Executive of the HENSOLDT South Africa GEW business unit. The know-how acquired through these projects can be applied for protecting other wildlife and national parks to safe-keep endangered species such as lions, elephants and even abalone. HENSOLDT prides itself on its relationship with its clients. “For us it’s not putting down the equipment and getting the business, for us it’s rather a journey,” says Werner Muller, GEW’s Chief Executive of Spectrum Monitoring and Security. Needs-based solutions Because of this philosophy, and because each wildlife scenario is different, with its own unique set of challenges, HENSOLDT’s experts collaborate with each client to develop a solution that addresses their specific needs. Through its business units, GEW and Optronics, HENSOLDT South Africa delivers solutions to clients across the world, and significantly contributes to South Africa’s export industry, while it is firmly grounded in its roots as a proudly South African company, operating in South Africa for South Africa. HENSOLDT is committed to continue innovating to protect the wildlife.
The State of Illinois has enacted a ‘stay at home’ order effective as of Saturday, March 21, at 5pm to curb the spread of the COVID-19 coronavirus. This means all residents are mandated to ‘remain at home’ and only essential businesses may remain open to provide critical services. Everybody fully supports this measure as it will hopefully slow the spread of the virus. Securing critical infrastructure Under the order, Illinois Gov. J.B. Pritzker has mandated that all Illinoisans stay in their homes except as needed to maintain continuity of business critical operations. This coincides with Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience that advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. BCD plays an important role in the information technology sector. The sector's complex and dynamic environment makes identifying threats and assessing security vulnerabilities difficult and requires that these tasks be addressed in a collaborative and creative fashion, especially as it directly affects both the public and security infrastructure.BCD plays an important role in the information technology sector Working with security integrators and OEMS In addition, it is imperative to maintain the supply chain in this unprecedented time of need. They work hand-in-hand with a number of security integrators and OEMs that work directly with the Federal Government. Most importantly, they supply life safety equipment that is used by first responders to help and keep them safe. Therefore, BCD Illinois build centers will remain open and operational, as the support technicians and engineers will remain available to continue to support all customers to fulfill the critical technology needs of the nation’s federal, state and local governments, healthcare facilities, and education, industrial and financial services sectors. It has also been notified that all shipments to US States currently in "stay at home" status may be delayed by the freight carriers; this includes the State of Illinois. BCD build centers Jeff Burgess, Chief Executive Officer (CEO) at BCD said, “We continue to implement strict precautionary measures in all our logistics and integration centers, in accordance with government and public health requirements, to reduce risk for colleagues who are performing their duties. Our Illinois-based technical operations will continue as long as we can confidently protect the health and well-being of these dedicated two dozen team members. All other BCD staff will continue working from home until further notice.”
AI technology solutions firm, Athena Security is rolling out a line of artificial intelligent thermal cameras, which will be critical in the coming weeks. Containing Covid-19 spread With voters congregating at the primary polls in three US states, exponential spread of the Coronavirus (Covid-19) is inevitable. The infected voters, many of whom will be ignorant that they have the contracted the virus, will spread it to countless others. In the coming weeks, those infected with the virus will need full awareness of their state of health to prevent further spread of the infection. High-tech AI thermal cameras AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus Taking into consideration that high temperature is one of the first symptoms of Coronavirus (Covid-19) infection, these high-tech AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus and encouraging that person to take serious steps to self-quarantine immediately. Although many voters are bound to contract Coronavirus (Covid-19) when casting votes, steps taken in the coming weeks could prevent those infected from spreading it to loved ones and strangers alike. Some details surrounding the AI thermal cameras include: The cameras capture video accurately within 1/2 a degree They detect 12 different points on the body These cameras are perfect for mass congregation locations, such as airports, grocery stores, hospitals and voting locations The AI thermal cameras are ‘Ethical’ and feature no facial recognition or personal tracking Athena Security is the first A.I. technology company to accurately detect guns to mitigate mass shootings back in 2018 The first deployment of the AI thermal cameras is in Austin, Texas, USA
Link11, renowned European firm in the field of cyber-resilience and cyber security, is offering its DDoS protection solutions free of charge to public sector health, government and public education organizations during the highly contagious phase of COVID-19. Public sector organizations are particularly vulnerable to cyber-attacks, and the availability of critical public infrastructures is more important than ever as people look for genuine sources of information related to the virus outbreak. Remote working policies Governments all over the world have taken necessary actions to lower COVID-19’s spreading curve, including implementing remote working policies, resulting in significant growth in internet traffic, leading to an increased risk of social engineering, business email compromise, ransomware and DDoS attacks. According to Link11’s research, during the three-week period Monday 17 February to Monday 9 March, Link11’s Security Operation Center (LSOC) defended 20,349 minutes of attacks (over 2,860 hours), which is more than 30% up compared to the 15,612 minutes of attacks mitigated during the same period in 2019. Link11 Cloud Protection Platform Marc Wilczek, Chief Operations Officer (COO) of Link11 said, “It takes only a small effort these days to overload servers and online services, and organizations need to protect their infrastructures. To help them deal with the evolving threat landscape, Link11 is offering government, public health and education organizations a solution that proactively identifies, blocks, and mitigates DDoS attacks within the Link11 Cloud Protection Platform, free of charge until September 2020.” Link11’s integrated Cloud Security Platform ensures cyber-resilience of the entire IT infrastructure On Sunday 15 March, the U.S. Department of Health and Human Services (HHS) suffered a cyber-attack, designed to slow the agency’s services amid the government’s rollout of a response to coronavirus, with the aim of overloading HHS servers. Officials assume a hostile foreign actor was behind this campaign. Cloud-based DDoS protection Traditional on-premise DDoS defenses, which are still widely used, and load-balancing products, are not able to protect individual websites, APIs or cloud applications against Layer-7 attacks, as these malicious data tsunamis can create big damage with little total bandwidth, bringing everything to a standstill instantly. Cloud-based DDoS protection, such as Link11’s integrated Cloud Security Platform, uses artificial intelligence, machine learning, strict automation and real-time analytics to ensure cyber-resilience of the entire IT infrastructure and application landscape supporting hybrid as well as cloud-native deployments.
ASSA ABLOY High Security and Safety Group has been named as the preferred supplier of security solutions for the Intercity Express Project (IEP) and East Coast Open Access (ECOA). The new IEP trains from Hitachi, which had their first roll out in 2017, have been introduced to replace older fleets with new high-speed trains and improve the current network. Further projects featuring the Hitachi engineering are now also planned across the UK. Locking systems, emergency access and egress devices The Group, which is a tier one supplier to the IEP project, has supplied a range of products including locking systems, emergency access and emergency egress devices. Thousands of products have been supplied over the past four years for trains that will be deployed over the whole UK rail network, operated by multiple train operators, replacing trains that were built by British Railways back in the late 1970s. Following on from the success of the IEP projects, the Group has also been named as preferred supplier for locking systems, emergency access and emergency egress devices for Hitachi’s latest project named East Coast Open Access (ECOA).
Pulse Secure, globally renowned provider of software-defined Secure Access solutions, has announced the delivery of a successful project at Warrington Borough Council (WBC), designed to help deliver taxpayer value and workforce flexibility through Secure Network Access. Warrington Borough Council is a unitary authority in the north west of England serving approximately 200,000 citizens across 22 wards. WBC provides a full range of local government services including council tax billing, libraries, social services, the processing of planning applications, waste collection and disposal and more, that are delivered through its own staff and third-party partners supporting council operations. This approach makes remote access to relevant areas of the network increasingly important for communication and productivity. Juniper VPN technology and RSA two-factor authentication WBC’s existing Juniper VPN technology and RSA two-factor authentication were up for replacement, prompting the council to put out a tender invitation for vendors to propose new technology to deliver secure, selective access to its network for third party associates. The tender required a secure access platform that could initially support 100 licenses, with the potential to scale to meet changing demand while offering easy ongoing management. WBC objectively tested the proposed solution before selecting Pulse Secure as the best fit for its needs with DXC, a Pulse Secure Elite partner selected as the solution provider including a three-year contract with built-in software and service support. Reliable, secure VPN access DXC team transitioned the council’s network from Juniper SAs to Pulse PSAs in on-site implementation project The DXC team seamlessly transitioned the council’s network from Juniper SAs to Pulse PSAs in a two-day, on-site implementation project with minimal interruption to user services. Now, the council can provide reliable and secure VPN access for its entire direct and indirect workforce, making remote and mobile working easier. “[I was] really impressed with how DXC were able to implement our remote access solution, no impact to our customers, and no complaints either,” said David Gallear, Technical Lead (Network), Resources and Strategic Commissioning Directorate at Warrington Borough Council. Remote and mobile access The council has gained a fully secure network and can grant selective access to third party partners as needed, with simple ongoing management keeping costs low. Giving third-party associates remote and mobile access has also helped the council to promote a better work/life balance for its entire workforce. The new solution also helps WBC provide a more responsive, streamlined and efficient service to customers. With secure remote access, productivity has remained high even during bad weather or travel disruption that would previously prevent staff from coming into the office.
Round table discussion
Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting utilities?
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Public sector security: Manufacturers & Suppliers
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals