Axis Communications has introduced a body-worn camera solution, which the company says represents a natural extension of their corporate vision, business strategy and core competence. The new body-worn cameras and other elements of the system will provide Axis new opportunities to grow by tapping into existing and new customers. The fast-growing body-worn camera market is an attractive one, and Axis sees opportunities to extend the use of body-worn cameras beyond the current core market of poli...
Coronavirus (Covid19) pandemic has hit the world unprepared for its consequences on the healthcare system and economic life. As a result, the number one priority for countries and states is to flatten the infection curve and provide them with time. Essential policies adopted to achieve this are directed at changing and controlling human daily behavior. AI-Based solutions viisights has Artificial Intelligence-based solutions to help authorities enforce those policies, help prevent the virus spr...
Hikvision UK & Ireland has announced offering security installers, integrators and end users the opportunity to undertake free online training on its fever screening thermal products and solutions. Hikvision thermal cameras Hikvision’s newly developed thermal cameras can be configured to aid high level screening by detecting elevated skin-surface temperatures, and are suitable for use in rapid preliminary fever screening in office buildings, factories, railway stations, airports and...
Alertus Technologies LLC, a provider of mass notification and critical communication solutions, announces it is releasing a new feature to its Alertus Recipient Mobile App, ‘ThreatWatcher™ Mobile,’ that will allow users to track their recent movement against those users who reported having COVID-19. The ‘Pandemic Alerts’ feature of ThreatWatcher™ Mobile will be free and accessible to the public in response to the increasing concerns regarding the COVID-19 pand...
The Security Industry Association (SIA) has selected Efrain Pardo as the spring 2020 recipient of the Denis R. Hebert Identity Management Scholarship, a program presented in partnership with the Center for Identity at the University of Texas at Austin offering $5,000 scholarships for SIA members to help further their education in the field of identity management. This scholarship program – named after Hebert, President of Feenics Inc. and a past member of SIA’s Board of Directors wh...
Genetec Inc., a renowned technology provider of unified security, public safety, operations, and business intelligence solutions announced the immediate availability of its next-generation mobile license plate recognition system. The new AutoVu SharpZ3 goes beyond traditional license plate identification and brings new levels of insight in vehicle analytics, situational awareness, and accuracy. Mobile ANPR Ideally suited to meet the needs of parking managers who use mobile ANPR as pa...
This year Counter-Terror Expo (CTX) and IFSEC International will co-locate for the first time, creating the UK’s largest security event. The two events will take place simultaneously from 19-21 May 2020 at the ExCeL, London. CTX brings together international specialists and experts from industry, government and policing to share ideas and technology within the counter-terrorism field. The content program will feature themes including drone threats and response, securing major events and public spaces, perimeter and access security, counter surveillance, threat forecasting and prevention, cyber threat detection and mitigation. IFSEC, one of UK and Europe’s most popular security events, will welcome tens of thousands of security professionals and provide valuable opportunities to meet with buyers and customers across the supply chain. Discuss technologies in crucial areas The first-time co-location of these two key industry events will allow attendees from the broader security and protection sectors to join with counter-terror stakeholders to source and discuss technologies in crucial areas including surveillance, venue security, AI, access control, transport security and more. Co-locating CTX with IFSEC opens the event to a wider and more international audience, which is a win-win" Exhibitors have praised the co-location of the two shows. Antonia McIntosh, Marketing Specialist at Fischer Connections said, “Fischer Connectors is looking forward to be exhibiting at CTX again and as part of the show’s continued growth and popularity, we’re excited to see it co-located with IFSEC which will give us the opportunity to showcase our products and meet and engage with even more visitors representing all aspects of the security supply chain, all under one roof.” More international audience Nick Booth, VP Marketing at Blighter Surveillance Systems Ltd said, “Co-locating CTX with IFSEC opens the event to a wider and more international audience, which is a win-win for both visitors and exhibitors alike.” CTX and IFSEC will also be joined by further co-located events within ExCeL – Forensics Europe Expo, Intelligent Building Europe, FIREX International, Safety & Health Expo, Facilities Show and Workplace Wellbeing Show.
Videonetics, an international provider of AI & DL powered Unified Video Computing Platform development company, has announced a distribution partnership with Spectra Innovations Pte Ltd, Singapore, to offer their complete array of products and solutions across the South East Asia and ASEAN region. Headquartered in Singapore, Spectra Innovations Pte Ltd has an established network of certified channel partners, system integrators, training and support specialists in South East Asia and ASEAN countries. Through this partnership, Spectra is all set to offer Videonetics AI & DL powered Unified Video Computing Platform encompasses Intelligent VMS, Artificial Intelligence & Deep Learning Video Analytics, Intelligent Traffic Management System and Facial Recognition Software. Video Analytics solutions We are pleased to enter into this value-added distribution relationship with Spectra" On the appointment, Avinash Trivedi, VP – Business Development, Videonetics expressed, “We are pleased to enter into this value-added distribution relationship with Spectra and introduce our indigenous offerings in the ever-growing markets of SEA and ASEAN region. As ranked amongst the top 5 VMS providers in Asia, Videonetics continues to increase focus and investment globally." "I am assured that Spectra’s remarkable management capabilities and extensive partner network, combined with Videonetics’s state-of-the-art solutions will cater to growing demand for truly unified solutions in different verticals such as safe & smart city, aviation, transportation, critical infrastructures, heavy engineering, healthcare, education and retail to name a few.” Affordable and deployable “Spectra is pleased to be appointed as a Regional Distributor of Videonetics. With the adoption of CCTV gaining acceptance beyond just surveillance into sectors such as garbage management under Smart City initiative, loss prevention applications in retail, logistics and warehouses, productivity improvements in factories to name a few, the need for VMS and Video Analytics solutions are becoming affordable and deployable in mass scale today” said Kanwal Sahney, Managing Director, Spectra Innovations Pte Ltd.
Motorola Solutions announced the latest addition to its video security and analytics portfolio, the integration of its VideoTag enterprise body-worn cameras and Avigilon Control Center (ACC) video management software. The integration enhances enterprise security efforts by making live body-worn video and audio easily accessible through the ACC™ AI-powered platform. access control systems “The introduction of this integration is a part of our ongoing efforts to introduce intelligent end-to-end solutions that serve the specific security and business needs of our customers”, said John Kedzierski, senior vice president, Video Security Solutions. "By adding a mobile video capability to their access control systems, our customers are now able to better protect their employees and customers while improving on their business outcomes". The VideoTag series of body-worn cameras are lightweight, unobtrusive cameras and easily assigned to staff and attached to uniforms like ID badges. When integrated with ACC, the activation of a body-worn camera recording immediately triggers an event in the software, displaying the camera’s live video feed to the system operator alongside video feeds from fixed cameras, allowing security personnel to gain better situational awareness and respond accordingly. Increase staff protection Enterprises such as healthcare, hospitality and retail rely on body-worn cameras to increase staff protection, improve customer relations and help to prevent incidents. For example, caregivers helping patients who may behave erratically or violently are risking their own safety and security. By wearing the mobile camera, staff is able to capture events in real-time and alert security operators so that they are made aware of any incident that might compromise a staff member’s safety, and are able to respond proactively. This product will be available for preview at Motorola Solutions’ first-ever virtual showcase taking place March 18-20, 2020.
Symmetry Business Intelligence analyzes how a person’s access activity is tracked and patterns established based on a risk score methodology. Anomalous behavior may raise a person’s score, and high-risk identities are flagged in a dashboard. Identify the employees Dashboards within Symmetry Business Intelligence provide the security team with an at-a-glance look at identities with the highest risk scores. Scores are generated based on the reader location, time of day and a user’s access patterns. Symmetry Business Intelligence helps to easily identify the employees, contractors and other identities that may pose the highest risk to a company. “Symmetry Business Intelligence highlights anomalous behavior, helping organizations discover unauthorized access patterns and possible threats worthy of further investigation,” said AMAG Technology, COO, Howard Johnson. “It’s a natural extension of any security program.” Easily integrate with other systems Keeping in line with AMAG’s commitment to providing open solutions, Symmetry Business Intelligence has been designed from the ground up to easily integrate with other systems. Over the past five years, AMAG has released Symmetry CONNECT identity management, Symmetry GUEST visitor management and Symmetry incident management, all open, cloud-based security systems designed to provide more flexibility and options for the end-user.
ASSA ABLOY publicly launches the RITE Slide, an integrated opening assembly where all individual door components are included to create a complete door system. RITE Slide is engineered for a wide array of applications and industries, specifically where sound control and space are critical to the design, such as medical exam rooms, patient rooms, offices and hotel meeting spaces. “Drawing on years of experience and expertise in building acoustically rated door systems, RITE Slide is an innovative opening solution that enhances privacy, saves space, and is aesthetically designed to meet the needs of a variety of customers and end-users,” said Stacey Callahan, ASSA ABLOY Door Group’s Vice President of Marketing and Innovation. Ensuring privacy and quiet operation RITE Slide’s unique, integrated assembly design includes all of the necessary door components RITE Slide ensures privacy and quiet operation with sound seals, automatic door bottom, and soft-close operation to minimize slamming, and wear and tear on the door and hardware. Offering both acoustically rated and non-acoustic options, the sliding door has a perimeter seal that blocks out light and sound, and operational door hardware for passage or privacy with locking applications. The acoustically rated series has been third-party tested to an STC 34 utilizing a flush wood door as a complete assembly according to ASTM E90. A barn-style sliding door, RITE Slide’s unique, integrated assembly design includes all of the necessary door components including the frame, door, operating hardware, track hardware and accessories. Traditional swing doors RITE Slide’s design also saves space by occupying a fractional footprint compared to traditional swing doors. The aluminum frame and track has a narrow 1-1/2” face frame profile for a sleek aesthetic design. Adding to the modern design, RITE Slide comes in 11 veneer species, 5 door stain colors and 6 cut-out options as standard, with further custom capabilities available. The door also incorporates built-in three axis adjustability for ease of installation and operation.
Egress, the provider of human layer email security, has announced that its Egress Protect solution will be integrated into NHSmail to offer enhanced protection and improve user experience. NHSmail is used by up to 1.5m healthcare staff daily, and is the largest closed secure email network in the UK. The announcement comes as part of NHS Digital’s commitment to use innovative technology to transform the UK healthcare landscape. Effective communication is an integral part of the NHS, and Egress’ email encryption technology has a significant footprint in UK Government. NHSmail secure email service NHSmail is a secure email service, approved by the Department of Health and Social Care, for sharing sensitive information. NHSmail has a function for sending sensitive emails which are encrypted, to non-secure email addresses. Egress Protect improves healthcare practitioners’ experience by enabling them to use NHSmail to send encrypted emails to unsecure domains, including patients and other areas of the health and care system, as well as offering automatic decryption for inbound email. This allows those recipients of NHSmail emails that are encrypted using Egress Protect to read and reply free of charge via an easy-to-use online portal or using Egress’ free app for Outlook integration. Streamlining communications NHSmail is already a safe, secure email system, used by almost 1.5 million health and care professionals" Consequently, secure email communication is available free of charge and in a simple and accessible way, to everyone who needs it. Egress Protect is already used by many local government organizations, and major private healthcare providers in the UK and will streamline communications between these organizations and the NHS. Following an initial pilot phase, Egress is now the new provider for sending sensitive emails from NHSmail accounts encrypted to external email accounts. Chris Parsons at NHS Digital said, “NHSmail is already a safe, secure email system, used by almost 1.5 million health and care professionals, enabling them to send sensitive information and deliver effective care. The partnership with Egress will continue to build on this, delivering an effective user experience, supporting security and compliance with GDPR with detailed auditing and reporting.” Innovative email security solutions “We are delighted to be working with NHS Digital to improve the NHSmail experience for healthcare practitioners and patients throughout the UK,” commented Egress CEO Tony Pepper. “Modern and efficient healthcare requires an accessible and secure communication network built on the best data security and IT architecture available.” “At Egress, we deliver innovative email security solutions that makes it easy for users to protect data, and meet compliance requirements, and then quite simply, get on with their day-to-day work. We look forward to an ongoing relationship with NHS Digital, supporting them in the delivery of this critical communication network.”
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
Being in the physical security industry for almost two decades has been an exciting journey, with significant changes that have impacted the world of security. Companies today must be proactive when it comes to securing their facility and are lucky to have so many choices when it comes to security technology. From the beginning, the ISC West show was always at the forefront of new technology and brought together the very best technology and industry professionals in the “City of Lights”. Back in 2001 when I first entered the security world, video surveillance was the key driver, and transitioning from analog cameras to IP video cameras was the talk of the town. In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras and the IT folks were just starting to get involved with the security decisions. Back then the ISC West show consisted of a myriad of video manufacturers exhibiting their camera lines. Where now in 2020 the high-profile enterprise-level camera manufacturers dominate the show floor. Over the last two decades, keeping up with the technology advancements of IP cameras was a difficult feat for most camera manufacturers and the high-profile manufacturers who had the funds to invest in R & D were the only ones that survived. Changing the game in video surveillance and access control In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras Another huge change that our industry has seen over the years was the increase in the number of acquisitions. Smaller security manufacturers started being acquired by the larger ones, which changed the game in video surveillance and access control. In addition to manufacturers, large security integrators like Convergint Technologies & Anixter were also buying smaller commercial integrators and dominating the market. At ISC West today, you will see predominately high profile – big name manufacturers and integrators where the smaller companies were either acquired or went out of business. Revolutions in the industry The security industry also faced a huge revolution with three major technologies driving growth in the security market – Network-based technologies (IoT enabled solutions), Access Control as a Service (ACaaS) and Mobile Credentials. ISC West saw this evolution coming and created specific educational seminars dedicated to these topics. Another big push that came into play in the last few years was being able to integrate a host of technologies like video and access control by using an open architecture platform. Many partnerships were formed in the security industry due to this massive push for integration. At ISC West, we now see many companies having their partners sharing booth space. This helps reduce costs for exhibitors in addition to giving smaller companies credibility by being recognized with the bigger players in the industry. In addition, ISC West makes it easy for attendees to plan out their show schedule in advance with the mobile app; creating a convenient way to access show information from mobile devices. From the beginning, the ISC West show was always at the forefront of new technology Emerging excitement Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions that help segment the security industry into different sectors. An example of some new technology pavilions includes drones & robotics, loss prevention & supply chains, and emerging tech. All new start-up companies that are 5 years old or less can be part of the emerging tech section of the show. Here entrepreneurs can unveil new and upcoming security technologies; creating a win win situation for any size business looking to make its name known in the industry. New technology, innovations and rising trends Another huge focus at the ISC West show is public safety. A full range of solutions are offered at the Public Safety Pavilion including barriers/bollards/gates/perimeter security, surveillance, access control, and alarms - along with innovative technologies for gunshot and drug detection, license plate recognition, acoustics, facial recognition and AI, connected vehicles, communication systems and devices, alerts and monitoring, and active shooter solutions Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions and training. Virtual reality demonstrations have also been available at the show to help attendees with preventative measures when it comes to school and public safety. Some new vape and metal detection technology built on the IoT concept will be featured at ISC West 2020 to help combat the vaping epidemic in our country. With active shooter incidents on the rise, metal detection and perimeter protection at schools will be an important part of the show. Awards and showcases When it comes to show press, we have also seen an influx of awards for security manufacturers that are exhibiting at the show. The major security publications have been offering manufacturers the opportunity to submit a product in distinct categories and win a prestigious award at the show. This creates “buzz” about your product and great for social media postings. Live video interviews at an exhibitors’ booth has also become a very popular tool to increase brand awareness and thought leadership for exhibitors. The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlessly. Over the years, the show has created a conduit The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlesslyfor manufactures and integrators to showcase new products and technologies to end users across multiple vertical markets. At the top of the game While the security industry continues to evolve, the one thing that stays constant is the wealth of information that ISC West offers to its attendees. The show always brings together the latest technologies and thought leaders that will continue to change the game in security for years to come.
Video surveillance is commonly associated with security. But in most cases, it's used to record incidents and assist in investigations after the fact rather than prevent undesirable events. Artificial intelligence–powered video analytics is a highly promising trend that fundamentally changes the way things work. Extracting manageable data from a video stream can help recognize risky situations early on, minimizing damage and, ideally, completely avoid emergencies. At the same time, AI significantly expands the areas of application of video surveillance beyond security systems. AI significantly expands the areas of application of video surveillance beyond security systems However, the hype around this new, trendy technology prevents the potential user from choosing quality solutions in a wide variety of products. This often leads to over-expectation, followed by a complete let-down. Can AI-powered video analytics really be the key to a technological breakthrough in video surveillance? We'll take a look at what the technology can do, what it can't, and where it can go from here. Technological breakthrough or just another bubble? It's often said that the video management software (VMS) market is becoming increasingly commoditized and widely available. A lot of products with similar features (or, at least, similar promises from the manufacturer) make it hard to choose. As a result, vendor names and reputations are turning into one of their primary selling points. Manufacturers have two choices available: get wrapped up in a price war and rely on cutting expenses, or offer a product that's truly innovative and revolutionary. Manufacturers have two choices available: get wrapped up in a price war, or offer a product that's truly innovative and revolutionary VMS developers who choose the second route are gravitating towards creating products that use artificial intelligence based on neural networks and deep learning. Emerging two or three years ago, the AI video analytics market is experiencing a boom in growth. This new tech wave has stirred the still, stagnant backwaters of the VMS world and gave small, ambitious developers something to be optimistic about. It seems they now have a chance to emerge as market leaders in the next few years. However, the hype around this popular trend is raising reasonable concerns among experienced security industry professionals. These concerns come from clients looking for a solution to their problems, and from suppliers building a long-term development strategy. This largely resembles another tech bubble, like the one built up around pre-AI video analytics and burst when it became clear that the sensational promises around it were pure marketing hype (and rather unscrupulously so). However, there are a lot of factors that indicate that AI-powered video surveillance systems aren't another bubble. The three factors The first — and the main one — comes from systems already in place on customers' sites. They fulfill the same promises made during the previous bubble by hotheads in a rush to teach the computer to analyze events in real time using a classical algorithmic approach. The second is the fact that this new technology has seen investment from not only software and cloud startups, but also established VMS developers. Even giants like Intel, which has presented a full line of neural network accelerator hardware and a set of software tools that streamlines working with them, specifically in the field of computer vision. This new technology has seen investment from not only software and cloud startups, but also established VMS developers The third factor lies in artificial intelligence's abilities. AI plays chess, drives cars, and works wonders in many other fields. Why shouldn't it be applied to video monitoring and analysis? What AI can do Just what can artificial intelligence do in video surveillance systems at this stage of development? It can't quite analyze a sequence of events and understand the "logic" of what's happening in the cameras' field of view. At least not yet. But it's probable that AI will learn to do this in the next few years. But neural network analytics can already detect, classify, and track objects very well, providing high accuracy even in busy scenes. Artificial intelligence can be used in the real world to: detect smoke and flames for early fire warning at open areas (forest, open warehouse, parking lot, etc.); distinguish people/vehicles from animals and other moving objects, e.g. to protect the perimeter of a nature park from poachers; distinguish a person in a helmet and protective clothing from a person without them to prevent accidents at a dangerous production facility or construction site; count objects of a specific type, e.g. cars in a parking lot, people in the sales floor, wares moving on a conveyor belt, etc. in non-security-related solutions. Those are just a few examples. After training a neural network, it can tackle other, similar tasks, too. Generally, a neural network trained in specific conditions isn't replicable. In other words, it won't work as well under different conditions. On the other hand, developers have learned how to quickly train AI for the needs of a specific project. The most important requirement is having enough video footage. Somewhat apart from that is the use of neural networks in facial and automatic number-plate recognition. This is an example of reproducible neural networks (train once, deploy everywhere), which makes them more appealing commercially. If non-reproducible neural networks have only recently become economically feasible due to the rapid evolution of specialized hardware (aforementioned Intel's product, for example), then the use of AI in facial recognition and ANPR has been well established for a long time. The use of AI in facial recognition and ANPR has been well established for a long time Another kind of AI analytics that we'll explore is behavior analytics. This function, probably more than any other, is bringing video surveillance systems closer to understanding what's happening on camera. Its potential is vast. How Behavior Analytics Works From a technical point of view, behavior analytics combines artificial intelligence with a classic algorithmic approach. A neural network trained on a multitude of scenarios can determine the position of the bodies, heads, and limbs of humans in the camera's field of view. The algorithm outputs an array of data containing descriptions of their poses. Conditions can be set for data to detect a specific pose, such as raised hands, prostrated or crouching persons. Developers can use this to quickly create new detection tools to identify potentially dangerous behavior specified by a government or business client. There's no need for additional training of the neural network. How Behavior Analytics Can Be Deployed Someone crouched down next to an ATM could be a technician, CIT guard, or burglar. Bank security should be notified in any of the cases. A person in shooter position, together with a bank employee or cashier with their hands raised could indicate a robbery. The system can be configured to automatically send alerts with a surveillance snapshot to the police so they can assess the threat and take action if needed. It's vital that the police receive the alert, even if the employee is unable to activate the alarm. In many cases, attention should be directed to a prostrate individual. This could be somebody who needs immediate help, or it could be someone sleeping in an inappropriate public place, for example, a 24/7 ATM space. Behavioral analytics can also be used to ensure workplace safety. For example, tracking whether employees are holding the handrails when using the stairs at a manufacturing facility or a construction site. What Now? Behavior analytics can be deployed wherever your clients' imagination takes them. With this feature, practically any pose that indicates potentially dangerous behavior can be detected. Timely response to an alarm helps avoid material damages or, in other situations, casualties. Practically any pose that indicates potentially dangerous behavior can be detected An area of potential development for behavior analytics is the ability to analyze a sequence of poses by the same person or a combination of poses and relative positions of several individuals. That will be the next level of evolution in AI's use in video surveillance: moving from "detecting" to "understanding" behavior in real time. In its most basic form, this type of analytics can be deployed to detect deviations from the search procedure in correctional facilities when a person being inspected must assume a pre-defined sequence of poses. A more advanced form allows it to detect any kind of abnormal behavior, such as a brawl breaking out in a public space. Ideally, behavior analytics can predict dangerous situations based on nearly imperceptible cues gleaned from collected statistics and a Big Data analysis. At the moment, this sounds like pure fantasy, but what seemed like whimsy not too long ago is now a reality with AI. It's already beaten humans in chess and the game of Go (Weiqi). Will artificial intelligence be able to outplay humans at charades one day? It's entirely possible that we'll soon see for ourselves.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behavior we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behavior that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behavior is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyze the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behavior provide guidance on professional behavior but are not mandatory. The draft code of conduct builds on the Standards of Behavior. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behavior that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyze the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
VIVOTEK, the global IP surveillance provider, has deployed its IP surveillance cameras in the residential project “New Borovaya,” constructed by A-100 Development, one of the largest developers of residential and commercial real estate in Belarus. This deployment has been carried out by long-standing distributor DataStream DEP, and has successfully put into action the high-quality products and brand value of VIVOTEK. On land with a total area of more than 100 hectares, a whole district is being actively developed in line with the most modern European trends of improved urban living environments. Based on the principle of SMART and SOCIAL, the “New Borovaya” project is one of the most innovative and upscale developments in Minsk, the capital of Belarus. In order to ensure public safety and protect private property, А-100 Development pays special attention to the security of the huge residential complex. Bullet network cameras To meet the demanding requirements of the project, including high-quality imagery, reliable equipment from a global brand, excellent technical characteristics and optimal price, the distributor DataStream DEP had complete confidence in recommending VIVOTEK’s IP surveillance solutions. VIVOTEK is honored to have this decade-long strategic partnership with A-100 Development VIVOTEK’s IB8369A and IB8367A bullet-type network cameras were selected for video surveillance of streets, playgrounds and outdoor parking, while the FD8369A-V dome type cameras were chosen for the entrances of residential buildings. A single data transmission network has been built at the facility, which unites all cameras and provides easy-access to any camera. Surveillance solutions Commenced in 2014, development of the "New Borovaya" project will last for 10 years. In the first two quarters, solutions based on VIVOTEK IP surveillance cameras were implemented, the success of which has led developer А-100 Development to proudly place VIVOTEK solutions in its marketing materials, and confidently declare the reliability of this brand during both operation and for further cooperation. VIVOTEK is honored to have this decade-long strategic partnership with A-100 Development and looks forward to providing its latest surveillance solutions again in the near future.
The State of Illinois has enacted a ‘stay at home’ order effective as of Saturday, March 21, at 5pm to curb the spread of the COVID-19 coronavirus. This means all residents are mandated to ‘remain at home’ and only essential businesses may remain open to provide critical services. Everybody fully supports this measure as it will hopefully slow the spread of the virus. Securing critical infrastructure Under the order, Illinois Gov. J.B. Pritzker has mandated that all Illinoisans stay in their homes except as needed to maintain continuity of business critical operations. This coincides with Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience that advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. BCD plays an important role in the information technology sector. The sector's complex and dynamic environment makes identifying threats and assessing security vulnerabilities difficult and requires that these tasks be addressed in a collaborative and creative fashion, especially as it directly affects both the public and security infrastructure.BCD plays an important role in the information technology sector Working with security integrators and OEMS In addition, it is imperative to maintain the supply chain in this unprecedented time of need. They work hand-in-hand with a number of security integrators and OEMs that work directly with the Federal Government. Most importantly, they supply life safety equipment that is used by first responders to help and keep them safe. Therefore, BCD Illinois build centers will remain open and operational, as the support technicians and engineers will remain available to continue to support all customers to fulfill the critical technology needs of the nation’s federal, state and local governments, healthcare facilities, and education, industrial and financial services sectors. It has also been notified that all shipments to US States currently in "stay at home" status may be delayed by the freight carriers; this includes the State of Illinois. BCD build centers Jeff Burgess, Chief Executive Officer (CEO) at BCD said, “We continue to implement strict precautionary measures in all our logistics and integration centers, in accordance with government and public health requirements, to reduce risk for colleagues who are performing their duties. Our Illinois-based technical operations will continue as long as we can confidently protect the health and well-being of these dedicated two dozen team members. All other BCD staff will continue working from home until further notice.”
AI technology solutions firm, Athena Security is rolling out a line of artificial intelligent thermal cameras, which will be critical in the coming weeks. Containing Covid-19 spread With voters congregating at the primary polls in three US states, exponential spread of the Coronavirus (Covid-19) is inevitable. The infected voters, many of whom will be ignorant that they have the contracted the virus, will spread it to countless others. In the coming weeks, those infected with the virus will need full awareness of their state of health to prevent further spread of the infection. High-tech AI thermal cameras AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus Taking into consideration that high temperature is one of the first symptoms of Coronavirus (Covid-19) infection, these high-tech AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus and encouraging that person to take serious steps to self-quarantine immediately. Although many voters are bound to contract Coronavirus (Covid-19) when casting votes, steps taken in the coming weeks could prevent those infected from spreading it to loved ones and strangers alike. Some details surrounding the AI thermal cameras include: The cameras capture video accurately within 1/2 a degree They detect 12 different points on the body These cameras are perfect for mass congregation locations, such as airports, grocery stores, hospitals and voting locations The AI thermal cameras are ‘Ethical’ and feature no facial recognition or personal tracking Athena Security is the first A.I. technology company to accurately detect guns to mitigate mass shootings back in 2018 The first deployment of the AI thermal cameras is in Austin, Texas, USA
Link11, renowned European firm in the field of cyber-resilience and cyber security, is offering its DDoS protection solutions free of charge to public sector health, government and public education organizations during the highly contagious phase of COVID-19. Public sector organizations are particularly vulnerable to cyber-attacks, and the availability of critical public infrastructures is more important than ever as people look for genuine sources of information related to the virus outbreak. Remote working policies Governments all over the world have taken necessary actions to lower COVID-19’s spreading curve, including implementing remote working policies, resulting in significant growth in internet traffic, leading to an increased risk of social engineering, business email compromise, ransomware and DDoS attacks. According to Link11’s research, during the three-week period Monday 17 February to Monday 9 March, Link11’s Security Operation Center (LSOC) defended 20,349 minutes of attacks (over 2,860 hours), which is more than 30% up compared to the 15,612 minutes of attacks mitigated during the same period in 2019. Link11 Cloud Protection Platform Marc Wilczek, Chief Operations Officer (COO) of Link11 said, “It takes only a small effort these days to overload servers and online services, and organizations need to protect their infrastructures. To help them deal with the evolving threat landscape, Link11 is offering government, public health and education organizations a solution that proactively identifies, blocks, and mitigates DDoS attacks within the Link11 Cloud Protection Platform, free of charge until September 2020.” Link11’s integrated Cloud Security Platform ensures cyber-resilience of the entire IT infrastructure On Sunday 15 March, the U.S. Department of Health and Human Services (HHS) suffered a cyber-attack, designed to slow the agency’s services amid the government’s rollout of a response to coronavirus, with the aim of overloading HHS servers. Officials assume a hostile foreign actor was behind this campaign. Cloud-based DDoS protection Traditional on-premise DDoS defenses, which are still widely used, and load-balancing products, are not able to protect individual websites, APIs or cloud applications against Layer-7 attacks, as these malicious data tsunamis can create big damage with little total bandwidth, bringing everything to a standstill instantly. Cloud-based DDoS protection, such as Link11’s integrated Cloud Security Platform, uses artificial intelligence, machine learning, strict automation and real-time analytics to ensure cyber-resilience of the entire IT infrastructure and application landscape supporting hybrid as well as cloud-native deployments.
A security system upgrade at one of Australia’s most prestigious universities has seen Gallagher’s solutions installed at campuses across Melbourne. According to the University of Melbourne, Gallagher was selected for the upgrade due to their strong integration capability, commitment to supporting the university’s long-term site plan, and investment in development. Gallagher worked in partnership with the university and Gallagher Channel Partner MGA Electronic Security to roll out the upgrade in over 150 buildings across seven campuses. The partnerships were integral to the success of the rollout, ensuring the system was configured to best meet the university’s needs. System flexibility “We’re impressed with not only the flexibility of the system, but the support from Gallagher,” says Adam Leach, Security Systems Coordinator at the University of Melbourne. Project Leads from the university visited Gallagher’s head office in Hamilton, New Zealand, prior to the project beginning. The upgrade included access control for over 3,000 doors, over 177,000 cardholders, and thousands of inputs “The opportunity to visit Gallagher and see their investment in R&D showed us that they are committed to growth and future developments. We were looking for a long-term business relationship, and we are definitely confident we have chosen the right solution.” Complete site control The upgrade included access control for over 3,000 doors, over 177,000 cardholders, and thousands of inputs. Gallagher Command Center software, a powerful solution offering complete site control from one central platform, runs at the heart of the university’s security system. “The integration capabilities of Gallagher’s Command Center are second to none,” says Leach. The university has integrations with Active Directory, Unicard, Syllabus Plus, IndigoVision and Schindler. People safety One of the key decisions in choosing the Gallagher system for their upgrade was its flexibility to grow with the university. “Our security solutions are designed to protect sites now and into the future,” says Scott Johnstone, Gallagher’s National Sales Manager, Australia and Papua New Guinea. “We’re pleased to be able to support the University of Melbourne with their long-term plans, all while ensuring the safety of their people, assets and information.” MGA Electronic Security completed the upgrade project quicker than expected and on budget, undertaking the entire system changeover in under 18 months.
Air Partner plc, the global aviation services group, worked alongside the Foreign and Commonwealth Office (FCO) to deliver a unique, fully-integrated and holistic solution for the evacuation and repatriation of UK and Irish nationals onboard the cruise ship quarantined off the coast of Yokohama in Japan. The project was complex, challenging and time sensitive, made more demanding by the requirement for the FCO to carry out the security screening of all passengers and their baggage in Tokyo before they could board the flight back to the UK. Throughout the planning phase and operational delivery, employees from across the Air Partner Group worked closely with the FCO, the operating airline, the Department for Transport (DFT) and the Spanish Civil Aviation Authority to obtain the numerous authorisations and approvals needed to complete the project on time. Optimally configured airline Air Partner’s Group Charter team chartered a Boeing 747-400 to carry out the flight from Tokyo Haneda to Boscombe Down in the UK, ensuring that the aircraft was optimally configured. The upper deck was designated for crew rest only to clearly segregate the evacuees and the flight crew, and there was also a separate section in the nose of the aircraft that could be used as an isolation zone for passengers. Redline mobilised its security experts from its rapid deployment team (RDT) within two hours of the project Redline Assured Security (“Redline”), Air Partner’s recently acquired Safety & Security division, endorsed by the International Civil Aviation Organization (ICAO), the Civil Aviation Authority (CAA), and the UK Department for Transport (DFT), worked hand in hand with the FCO on all matters pertaining to security clearances and the security screening of passengers and their baggage in Tokyo. Rapid deployment team Redline mobilized its security experts from its rapid deployment team (RDT) within two hours of the project being given the go-ahead and arranged for them to be deployed to Tokyo on the positioning flight from Madrid on 20 February, along with the necessary scanning equipment. The Group’s Freight team worked alongside Redline to charter a Metroliner freighter to transport the equipment directly from Redline’s National Security Training Center at Doncaster Sheffield Airport to Madrid ahead of this. The operatives were appropriately attired in protective clothing at all times. The evacuation flight departed Tokyo Haneda at 07:57 on Friday 21 February (local time) and arrived into Boscombe Down in Wiltshire at 11:41 on Saturday 22 February (local time), carrying 32 passengers safely home. Fully-integrated solution This was a multifaceted and time sensitive project and I am immensely proud of the work our colleagues undertook" Mark Briffa, CEO at Air Partner, commented, “Unfortunately, the spread of Coronavirus has continued at pace and our thoughts remain with everyone affected. We were pleased that we could play a role in the FCO’s mission to swiftly and safely repatriate British and Irish nationals quarantined on the cruise ship in Japan. Our Group Charter and Safety & Security divisions were in a unique position to deliver a fully-integrated solution to make this happen.” “This was a multifaceted and time sensitive project and I am immensely proud of the work our colleagues undertook to ensure 32 UK and Irish nationals onboard the ship could return to the UK. By offering this holistic solution, which combines Charter and Safety & Security, with appropriate international accreditations and approvals in place, we are ideally placed to meet our customers’ diverse aviation requirements in fast-moving crisis situations.” Yokohama cruise ship evacuation “We continue to work with customers to provide our range of aviation services in the wake of the coronavirus outbreak and remain on standby to assist in any way we can.” The Yokohama cruise ship evacuation follows a project earlier in which Air Partner flew medical supplies to Wuhan, the epicentre of the coronavirus outbreak, and evacuated over 300 British and EU nationals from the city.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals