Paxton Access Ltd. (Paxton) has announced new additions to their renowned Net2 access control product line, helping installers make their customers’ buildings more COVID-secure. The latest version of Net2 – v6.04 has been in rapid development since May 2020 and is now ready for installers to download. Net2 – v6.04 The latest version features Net2 Occupancy Management, which allows enterprises to limit the number of people in any given area, either barring access or sending an...
Researchers at Check Point have identified security flaws in Apache Guacamole, one of the world’s most popular IT infrastructures for remote work. With over 10 million downloads, the free open-source software enables remote workers to access their company’s computer network from anywhere, by using only a web browser. Apache Guacamole software Apache Guacamole runs on many devices, including mobile phones and tablets, giving remote workers ‘constant, world-wide, unfettered acc...
SonicWall announced it had appointed Tristan Bateup as Country Manager for Ireland, building on the company’s long-established collaboration with distributors in the region as it continues to expand its presence and capabilities in the country. Tristan has over a decade of experience in the cybersecurity industry, including five years managing SonicWall partner business at long-time distributor Exertis. From there, he joined SonicWall, where he served as Strategic Account Manager for the...
Pulse Secure, the provider of software-defined Secure Access solutions, announced that Pulse Secure was recognized among Representative Vendors within Gartner’s Market Guide for Zero Trust Network Access (ZTNA). Pulse SDP provides direct device-to-application trusted connectivity only after successful user, device and security state verification. The solution offers enterprises the only dual-mode VPN and SDP architecture that yields single-pane-of-glass management with unified policy admi...
Sensor system supplier HENSOLDT has been awarded a contract by Airbus Defense and Space to develop and produce a new AESA (Active Electronic Scanning Array) radar for the German and Spanish Eurofighter fleets. The project is jointly financed by the Eurofighter partner nations Spain and Germany, who will also be the first users of the radar in their fleets. Following budget approval by the Spanish government and most recently by the German Bundestag in mid-June, the contracts worth over 1.5 bill...
Dahua Technology, a globally renowned video-centric smart IoT solutions and services provider, has announced the release of DMSS, its newly designed mobile client. DMSS can connect Dahua products via the Internet or Ethernet through P2P or IP, and can also be operated remotely. It supports all kinds of product types, including NVR, XVR, IPC, TPC, VTO, Alarm Hub, and Access Control, etc. Remote operations DMSS can work in an environment with multiple internet connections. It connects Dahua prod...
Nutanix, a globally renowned company in enterprise cloud computing solutions, has announced new remote IT software solutions that will allow IT teams to deploy, upgrade and troubleshoot their cloud infrastructure while working from anywhere, whether at home or from a central office location. Nutanix HCI software These solutions will be delivered via Nutanix Foundation Central, Insights and Lifecycle Manager, all of which will be available as part of Nutanix HCI software at no additional cost to customers. While IT teams have been working overtime to deliver remote work solutions for businesses worldwide in light of the COVID-19 pandemic, they’re not always able to do so themselves. Managing IT infrastructure, troubleshooting issues, and updating software often requires IT teams to be on-site at their data center, something even more challenging with social distancing requirements. Enhanced IT infrastructure management Nutanix was founded with a vision to make IT infrastructure management simple" “Nutanix was founded with a vision to make IT infrastructure management so simple, that it essentially becomes invisible,” said Greg Smith, Vice President of Technical and Product Marketing at Nutanix. Greg adds, “These new capabilities will offer an even more seamless experience from day one and beyond — from anywhere. Nutanix’s simplified management as well as a more secure and resilient IT infrastructure, whether from home or a remote location, is something that is now more important than ever.” These Nutanix solutions will allow IT teams to remotely manage cloud infrastructure throughout the entire software lifecycle. Expanded cloud infrastructure deployments Managed through the Prism interface, Nutanix Foundation Central allows IT teams to deploy private cloud infrastructure on a global scale from a single interface, and from any location. After quickly installing non-configured appliances or servers on-site, Foundation Central then takes over to image and configure Nutanix nodes, and install any Nutanix software solution. In addition to automating and centralizing infrastructure software deployment, Foundation Central enables organizations to simply scale existing infrastructure capacity to keep pace with business growth. Nutanix Insights for automated IT support Nutanix Insights will provide predictive health and automated support services to streamline IT operations globally. The new service will analyze telemetry from customers’ cloud deployments, including all clusters, sites and geographies, to identify ongoing and potential issues that could impact application and data availability. Once identified, the Insights service can provide customized recommendations to optimize the health and performance of the infrastructure. These recommendations are based on established IT best practices, as well as a deep knowledge accumulated by Nutanix in supporting more than 16,000 enterprises around the world. Insights service Additionally, the Insights service can automatically open a support ticket with Nutanix Additionally, the Insights service can automatically open a support ticket with Nutanix, have a Site Reliability Engineer (SRE) assigned, and optionally collect and upload all relevant customer log files for analysis, all of this without any manual interaction. Preliminary internal data reveals that Insights will enable customers to resolve about 30% of issues without opening a support ticket, resulting in fewer support cases for a healthier IT and cloud infrastructure. “Not having a ticket to open is already a good thing. But the ability to see the potential problems and how to solve them is great. It's the same philosophy that made the one-click upgrade so valuable,” said Olivier Massoni, Systems Engineer at Compass Group France. One-click, non-disruptive infrastructure upgrades IT infrastructure upgrades have become increasingly complex and error-prone, especially in environments with multiple vendors and products. The necessary planning, testing and the out-of-business-hours execution required to mitigate outages to mission-critical applications also make the update process costly. This often results in IT teams delaying necessary upgrades and opening themselves up to possible security issues. Nutanix Lifecycle Manager Nutanix Lifecycle Manager (LCM) will deliver seamless, one-click upgrades to the Nutanix software stack, as well as to appliance firmware, without any application or infrastructure downtime. Nutanix LCM can automatically determine any software and firmware dependencies, intelligently prioritize updates, and orchestrate the entire upgrade process removing guesswork, and resulting in a more secure and resilient infrastructure. And, as with other Nutanix solutions, LCM will be able to operate anywhere to manage Nutanix environments globally. Remote cloud infrastructure management At NetDocuments, we have 12 co-located data centers to support our customers all over the world" “At NetDocuments, we have 12 co-located data centers to support our customers all over the world, so simplicity, scalability and ability to manage the infrastructure remotely are paramount,” said Todd Burris, System Engineer at NetDocuments, a globally renowned content services and productivity platform. Todd adds, “Nutanix delivers on all of these aspects and helps us keep our customers happy. Products like Foundation Central and Lifecycle Manager (LCM) are key to our ability to deploy, manage and troubleshoot issues remotely from anywhere in the world.” Secure, resilient cloud infrastructure solution In addition to providing an enhanced remote experience for IT infrastructure administrators, Nutanix’s Foundation Central and Lifecycle Manager (LCM) software deliver a secure, resilient and easy-to-use private cloud infrastructure solution. Nutanix also recently earned a 2020 Top Rated Award from TrustRadius in the Server Virtualization and Virtual Desktop Infrastructure (VDI) categories, with a score of 9.1 out of 10 and over 125 verified reviews. Managing hybrid and multi-cloud environments Organizations around the world use Nutanix software to leverage a single platform to manage any application, at any location and at any scale for their private, hybrid and multi-cloud environments. Nutanix Foundation Central is currently available to customers, while Nutanix Insights and Lifecycle Manager software solutions are currently under development.
Bugcrowd, the crowdsourced security company, released its 2020 Inside the Mind of a Hacker report, the study to date on the global hacking community. Among the report’s key findings, human ingenuity supported by actionable intelligence of the Bugcrowd platform were found to be critical ingredients to maintaining a resilient infrastructure. AI-powered solutions not enough In fact, 78% of hackers indicated AI-powered cybersecurity solutions alone aren’t enough to outmaneuver cyber attacks over the next decade. Nearly nine out of 10 hackers, 87%, say that scanners cannot find as many critical or unknown assets as humans. Hackers can adapt four to five low-impact bugs to exploit a single high-impact attack While 2019 was a record year for data breaches, the report found that hackers working on the Bugcrowd platform prevented $8.9B of cybercrime in 2019 and earned 38% more than they did in the previous period. In the next few years, hackers on the Bugcrowd platform are projected to prevent more than $55 billion in cybercrime for organisations worldwide. “Globally-distributed good-faith hackers are increasing in number and diversifying. Bugcrowd gives organisations the power to proactively leverage human ingenuity – the enabler of malicious cyberattacks – at-scale to prevent them,” said Casey Ellis, founder, chairman, and CTO of Bugcrowd. “While AI has a role to play in helping to reduce cyber risk, companies need to integrate crowdsourced security throughout their security lifecycle if they hope to outsmart and outmanoeuvre cybercriminals.” Limitations of machine intelligence Hacking as a profession is lucrative and highly attractive to young people “Hackers will always be one step ahead of AI when it comes to cybersecurity because humans are not confined by the logical limitations of machine intelligence,” said Jasmin Landry, Bugcrowd hacker. “For example, hackers can adapt four to five low-impact bugs to exploit a single high-impact attack vector that AI would likely miss without the creative flexibility of human decision-making. Experience allows hackers to recognize vulnerable misconfigurations that represent a true risk to organizations without all of the false positives that typically come with AI-powered solutions.” Nearly half of neurodiverse hackers (6%) experience Attention-Deficit/Hyperactivity Disorder (AD/HD) The Inside the Mind of a Hacker report analyzes 3,493 survey responses from working hackers, plus hacking activity on the Bugcrowd Platform between May 1, 2019 and April 30, 2020. In addition, the report incorporates data from 1,549 programs and 7.7 million platform interactions to provide a striking and in-depth view of emerging trends among Bug Bounty, Penetration Testing, Attack Surface Management, and Vulnerability Disclosure Programs. Younger and neurologically diverse hackers Hacking as a profession is lucrative and highly attractive to young people, with 53% of hackers under the age of 24. Remarkably, the report uncovered that 13% of hackers are neurodiverse and possess neurological advantages that help them provide extraordinary depth and dimension in security testing. Research found that hackers live on six continents and reside in more than 100 countries worldwide These unique strengths include exceptional memory skills, heightened perception, a precise eye for detail, and an enhanced understanding of systems. Nearly half of neurodiverse hackers (6%) experience Attention-Deficit/Hyperactivity Disorder (AD/HD) and thrive in environments of rapid change, such as security research, where creativity and out-of-the-box thinking are rewarded generously. Career Hacking in Emerging Countries Skyrockets The research found that hackers live on six continents and reside in more than 100 countries worldwide. Most notably, the report identified an 83% growth in respondents living in India and nearly three out of four hackers (73%) speak two or more languages. 93% of hackers primarily hack out of care for the well-being of the organisations with which they work Bugcrowd uncovered a growing social responsibility trend among businesses and hackers. 93% of hackers primarily hack out of care for the well-being of the organizations with which they work. Additionally, organizations made five-times the number of coordinated disclosures in the last twelve months. “The exponential growth of these disclosures highlights the value of transparency to stakeholders and demonstrates organisations are taking social responsibility more seriously than ever,” said Ellis. COVID-19 pandemic Increasing demand for career hackers The FBI reported a 400% rise in cybercrime after COVID-19 was declared a pandemic and organizations are investing more in bug bounty programs as a result. More than half of hackers (61%) have noticed an increase in available bug bounty programs to participate in due to widespread remote working conditions related to the COVID-19. Hackers (48%) believe the Healthcare industry is vulnerable to cybercrime during the unfolding crisis “We are in unprecedented territory – and COVID-19 has forced many businesses to accelerate digital transformation efforts,” said Ashish Gupta, CEO and president of Bugcrowd. “The rush to digitize businesses can create serious lapses in security and organizations are turning to bug bounty programs to proactively safeguard new products and applications against vulnerabilities.” Alternative polling methods not favored by hackers Like the larger security industry, career hackers also noted concerns about COVID-related fraud. Nearly half of hackers (48%) believe the Healthcare industry is vulnerable to cybercrime during the unfolding crisis, followed by Education and Community Support (17%) and Government and Military (16%). Additionally, as the government faces the potential impact of COVID-19 on the upcoming 2020 US Presidential election, 72% of hackers independently reported that they do not trust alternative polling methods, like electronic polling or mail-in ballots.
Proxyclick, the globally renowned provider of enterprise visitor management software, has launched ‘Touchless Check-in’ to provide enterprises with a contactless check-in solution at the front desk for every step of the visitor journey. "Visibility into who is entering or leaving your premises has become more critical than ever during this global crisis," said Gregory Blondeau, Founder and CEO of Proxyclick. ‘Touchless Check-in’ contactless solution Gregory adds, "Companies are realizing that understanding who's potentially come into contact with the virus is the only way to ensure employees their workplace is safe. Our mission since the onset of the COVID-19 crisis has been to give companies this level of insight, and our new contactless check-in solution serves as a natural extension of our efforts to help companies worldwide provide a safe return to work for their employees." With millions of employees, visitors, and contractors set to re-enter corporate premises around the world, Proxyclick's solution will allow organizations to perform sufficient due diligence to mitigate liability risks. The new offering introduces a completely contactless solution with no physical interaction necessary from check-in to check-out of a facility. Primary benefits and features include: Screening: Visitors can be screened according to each company's health and safety protocol, via Proxyclick's remote registration Physical check-ins happen with a unique QR code assigned to each visitor once they've passed the screening process. Security: It's fully integrated with all Proxyclick security features, including access control integration possibilities with Nedap, Lenel, C-CURE 9000, S2, Genetec, etc. Compliance: Data retention periods can be automated for any visitor information collected during the screening process. Effective visitor management system We've been able to use Proxyclick quite efficiently in how we manage visitors" "We're dealing with a combination of distribution centers, warehouses, manufacturing facilities, and admin sites. We've been able to use Proxyclick quite efficiently in how we manage visitors," said Deborah Pangallo, AVP of Facility Safety at L'Oréal. Deborah adds, "We've been able to quickly change our visitor workflows and develop health and safety questionnaires, present them to management, and roll it out to all 34 sites." User provisioning and single sign-on authentication The Touchless Check-in can be implemented quickly with Proxyclick's user provisioning and single sign-on authentication. This is especially important for global enterprises with large headcounts needing quick and easy onboarding for their employees. "We understand that a safe return to work is a priority worldwide," said Geoffroy De Cooman, Proxyclick's Co-Founder and Chief Product Officer. He adds, "It starts with implementing the right technology at the front desk so you don't have to sacrifice efficiency and privacy." This new release comes on the heels of significant company momentum. This past January, the company closed a US$ 15 million Series B funding round led by Five Elms Capital with participation from Series A investor JOIN Capital.
Ping Identity, the Intelligent Identity solution for the enterprise, announced the availability of its Workforce Identity Solutions in AWS Marketplace. These cloud-ready solutions enable enterprises to secure remote work and boost employee productivity by providing the ability to easily extend access across Software-as-a-Service (SaaS), legacy applications, cloud applications and more for seamless login experiences. With AWS Marketplace availability, Amazon Web Services (AWS) enterprise customers can now quickly procure and deploy all of Ping’s Workforce Identity Solutions to empower employees to work virtually from anywhere, while providing a centralized authentication service to access their AWS infrastructure. Access management solutions Ping’s Intelligent IdentityTM platform helps improve workforce productivity, security and agility while enhancing access security to enterprise apps, APIs and data. Ping’s robust Workforce Identity Solutions empower enterprises with on-premises and hybrid IT environments to efficiently and securely migrate to the cloud while streamlining the user experience. “AWS Marketplace streamlines the selection and procurement process for identity and access management solutions on AWS,” said Chris Grusz, General manager, AWS Marketplace, Amazon Web Services, Inc. “We are delighted to welcome Ping’s Intelligent Identity Platform to AWS Marketplace to help enterprises quickly implement their security posture without sacrificing the user experience.” Fast purchase experience At GSK, the user experience is king, but at the same time, that experience has to be secure" "At GSK, the user experience is king, but at the same time, that experience has to be secure. With Ping, we've increased security. while making users happier," says GlaxoSmithKline's Brian Lewis, IAM Solutions Architect. Ping’s Global Partner Network can also resell Ping Identity via the AWS Marketplace Consulting Partner Private Offers programme (CPPO), which allows AWS customers to procure Ping’s solutions from an AWS Partner Network (APN) Consulting Partner who has knowledge of their business and receive the same fast and friction-free purchase experience they’re accustomed to in AWS Marketplace. Strengthen security of remote work “Ping Identity is committed to working with AWS and our global partner network to enable today’s enterprises to enhance security of their AWS environments,” said Loren Russon, Vice President, Technology Alliances, Ping Identity. “Expanding our AWS Marketplace listings to include all of our Workforce Identity Solutions and giving our partners the ability to resell Ping via AWS Marketplace Private Offers are more important milestones in helping our global customers boost employee productivity, strengthen security of remote work, and increase business agility.”
RAS Watch, the managed service operations and risk mitigation center, announced the launch of its contact tracing service to proactively identify and trace infectious disease outbreaks, such as COVID-19, within a business. The service combines the power of the RAS Watch remote monitoring services technology, targeted communications and emergency response, along with trained contact tracers, to mitigate the spread of infection across an organization. Limiting spread of diseases like COVID-19 As part of the new service, RAS Watch and its certified partner channel can work with organizations on best practices and to coordinate communications between employees when exposure or presumed exposure is identified to isolate, notify and reduce the risk of an outbreak. RAS Watch uses software technologies to streamline this process, as well as maintain compliance with relevant government-issued regulations. RAS Watch security operators are certified as contact tracers through the Johns Hopkins Bloomberg School of Public Health, which empowers them to communicate with people infected with COVID-19, identify those who may have been exposed and provide these individuals with guidance to limit the spread of the disease. Technology and industry databases RAS Watch uses traditional investigative techniques, combined with technology and industry databases, to source information for unknown individuals to continue the contact tracing process. “Private businesses and public entities have to find a way to protect their people from the threat that the COVID-19 outbreak brings to global operations, and contact tracing is an essential component of that effort as more and more people return to work,” said Ryan Schonfeld, Founder and CEO, RAS Watch. “RAS Watch is well positioned to offer this service as part of its comprehensive tools and analytics methods that aim to transition companies from being more reactive to proactive in the pursuit of protecting people from the kinds of threats that we’re seeing today and will continue to see in the future.”
Video wall and visual display providers Ultimate Visual Solutions (UVS) has seen a 10 per cent rise in the official quotations and detailed system proposals it has been asked to supply, despite the coronavirus lockdown. UVS Managing Director Steve Murphy said the increase, compared to the same period in 2019, was as a direct result of the full suite of remote access and online demonstration services which it launched at the start of the COVID-19 outbreak. UVS remote demonstration facility He said that the new way of working was already starting to translate into firm orders for a wide range of its products. These include a substantial order for a large UVS Lucidity video wall controller solution for a council CCTV project, where the final demonstration to the client was made at the start of lockdown using the UVS remote demonstration facility. Contracts also included eight new or renewed annual maintenance contracts for critical infrastructure or critical security sites Demonstrated the usefulness and effectiveness of the investment we made in the remote demonstration facility. Steve Murphy said: “During the ‘lockdown’ period from March 23 to May 31, UVS official quotations and detailed system proposals were 10% up in overall total project value against the same period last year.” “This has demonstrated the usefulness and effectiveness of the investment we made in the remote demonstration facility and the benefit it has brought to our clients, both integration partners and their end clients.” Video wall projects physical delivery During the lockdown period, UVS has continued to physically deliver major critical control room video wall projects, in strict accordance with all government and its own health and safety experts’ guidelines. These include: 24x 55-inch video wall system and Lucidity video wall controller for critical high-security project 16x 49-inch video wall system and video wall controller for critical high-security project 65-inch 4K screens for high security prison project Shipping a Lucidity controller for control room project to Vietnam and providing detailed remote, online product training to Vietnamese partner The remote access and online demonstration services, based from UVS’ new HQ in Burnley, are designed to provide peace of mind and support for key operational video wall technology. Remote Services by UVS The suite of remote services offered by UVS includes: Remote diagnostics and remote maintenance for UVS video wall technology which can offer quick analysis and resolution for most issues. UVS engineers using remote connection software, which is fully encrypted and which the client has control over, to carry out maintenance. For sites where the video wall controller does not normally have an internet connection, UVS is offering to supply a 4G data dongle as part of the contract (managed and paid for by UVS) to allow clients to give internet access as required. Assisting clients with reduced cost annual maintenance contracts. A live online demonstration facility to provide full video wall technology evaluations for partners and their clients who are in lockdown or self-isolation Technology visibility for visitors Technology which visitors can see in operation includes video wall solutions, displays, video wall controllers, control software, digital signage, integrated VMS (video management systems for security applications) AV over IP and KVM remote access options. UVS provides video wall displays and audio visual solutions to clients across the UK and the rest of the world. It is led by four senior colleagues who, between them, have more than 70 years’ combined Audio Visual, Control Room and Visual Solutions experience. It has also opened a new London demonstration venue at Woburn Place, a short walk from Euston Station.
We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line. How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location. Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.
COVID-19 has been a thorn in the side of countless companies within the security industry and far beyond. Here, we speak with Richard Huison, Regional General Manager for the UK and Europe at Gallagher Security, who summises his personal experience from these recent months and how Gallagher has adapted in the face of pandemic-induced adversity. How has the COVID-19 crisis impacted Gallagher on a day-to-day basis? Gallagher was actually well placed as a result of work already in progress with a number of visionaries and innovators within our business, such as our CIO Neville Richardson. They are determined to put the business on the front foot, making it more digital and proactive in delivering high speed change and we had already been migrating to Microsoft Teams before COVID-19 first reared its ugly head. It’s part of our philosophy to make our business and the solutions we create as stable, reliable and resilient as possible. Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world It means Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world. When lockdown was imposed, we set about prioritising our clients’ needs and delivering on our commitments as a critical supplier. The Gallagher leadership team quickly rolled out the means to stay connected, positive and safe as each region went into isolation. Effective communication, both internally and externally, has always been a critical success factor for our business. That hasn’t changed with the more remote and virtual nature of our communication now and, if anything, it’s even more important both for business continuity and for the personal wellbeing of each and every one of our colleagues. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done in new ways, such as using the emojis on Microsoft Teams. Perhaps the most striking example of this is our new European marketing manager Bethan Thompson, who joined Gallagher on 1 April, little over a week after lockdown was imposed in the UK. She has enjoyed the richest and most comprehensive introduction to the business from the safety of her own home armed with just a laptop and Teams. What can be the benefits of having employees working from home? There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done To be honest, before COVID, we didn’t disconnect enough, close the laptop, switch off our technology and allow ourselves NOT to respond instantly. But trust is an integral part of our culture at Gallagher and we can easily and effectively continue to champion the right balance and support for the team moving forward. How can employees ensure they keep a healthy work/life balance? Working from home can require some personal discipline around taking regular breaks and disconnecting from technology. I encourage all my colleagues to stay active and get regular exercise during the day. Taking time out allows you to process ideas with greater clarity, to be more creative, to plan your day and use your time more effectively – all of which is part of achieving that balance. And it’s important that we do switch off and close our laptop at the end of the day, which requires some discipline when you work for a business headquartered in New Zealand, where they are 11 hours ahead. It’s good to cultivate hobbies and welcome distractions that you are passionate about, to switch off from work more effectively. Personally, I love to be outside on a long dog walk with no technology. It’s liberating. Are you seeing that businesses are already beginning to think differently about their security? We have to remember why security is important. We all have a different view on how we should maintain business continuity. Yes, properties need a reliable detection and defense solution to resist the opportunist. With the mass migration to work remotely, business leaders are concerned that their IT systems are vulnerable to attack and we read daily about the growth in cyber-attacks. It’s common sense to protect your business with a suitable access control and intrusion detection system and the pandemic has proven to business the value of being truly resilient and able to still operate whatever circumstances ensue. What will be the biggest security challenges facing businesses over the next six months? In that timeframe, I don’t see us returning to how things were prior to the pandemic, so businesses will have to adapt to a new normal. We will have to adopt a more holistic view of security, encompassing safety, security and wellbeing, with our teams at the heart of that. In the new world, how can we maintain our teams’ safety at home, or limit them to certain floor space or introduce rotas for office attendance and keep surfaces virus free while they’re there? We need to be alert to where the next threat will come from and mitigate risk against both cyber and biological threat as we’ve seen a virus in either domain can be devastating. How is Gallagher meeting the evolving demands of the market? To be honest, Gallagher has always been ahead of the curve. We’ve been talking about competencies, compliance and resilience for decades, long before cyber became the buzzword. Everything we do is related to business resilience and continuity and security is baked in to our products and solutions at source, providing confidence and reliability for all of our customers.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe. In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace. Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security. “How do you support the business and, more broadly, societies and communities?” The new normal for security The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.” “We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks. “We just need to take a fresh look from a mix of perspectives.” “Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show Infrared cameras and access control technologies New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing. But what will such use of these technologies mean in the long term? Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing “We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company. “Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?” Manufacturer philanthropy Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good. “Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.” An accelerated timeline will raise the stakes even further. “All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto. “The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’” Public health versus individual liberty The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information. “There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.” The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection “There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly. “In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.” From smart security to more intelligent technology After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.” After the pandemic, the innovation climate will befit new technology adoption Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon. Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.” “Science and technology are morally neutral,” he said. “How we use them is not.” Intelligent automation over artificial intelligence Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse. Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm” “A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things. In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity. “Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realized in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorized party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorized locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realized) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorize monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security marketSmart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognizable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorized from unauthorized people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. Everyone treasures their leisure. The right access solution can help one do it safely without putting a burden on those responsible for one’s security. We treasure our leisure. The right access solution can help us do it safely without putting a burden on those responsible for our security. Controlling access to outdoor sites and visitor attractions Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote - far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software one can access from anywhere, matches or exceeds the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within one’s system exactly like standard interior locks. Intelligent electronic key systems are also budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems let one roll out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Center in Wales attracts tens of thousands of tourists every year. Both mechanical and electromechanical locking protect a site which houses critical infrastructure and watersports facilities - with disparate security needs. Here electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed when keys are lost. Permissions are simply deleted from the system software. In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labor-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. Carrying one programmable key able to open doors, windows and padlocks makes the security team’s rounds easier It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours - for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector When Edvard Munch’s painting “The Scream” was stolen from an Oslo museum in 1994, thieves left a note which read: “Thanks for the poor security”. Securing museums - open spaces with priceless contents - presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction - and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimizes the number of keys in circulation - with obvious security benefits. Companion software makes key tracking straightforward: one always knows who exactly is carrying credentials, can refine or amend those permissions quickly and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Museum access control in action London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries Electromechanical locks now control access through 56 doors, forming part of a security ecosystem which incorporates traditional mechanical locks, too. Using intuitive management software, security managers ensure every staff member accesses only the right areas. Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose - CLIQ® from ASSA ABLOY - also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be “subtle, but ever present,” according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. This was the checklist facing France’s Musée Maurice Denis: the museum is inside a listed 17th-century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside and outside the main building; waterproof padlocks protect CCTV camera housing on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th-century warship Vasa demand Sweden’s highest level of locking: Class 3. Yet the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity According to one study completed two decades ago, one spends 87% of one’s time indoors. The number is probably higher now - and includes a huge chunk of one’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here over 170 shops, a cinema, sports center and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Yet a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorize and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail - who accessed which lock, and when - takes a couple of mouse clicks. CLIQ also cuts Festival Place operational costs. The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever one gathers to enjoy leisure - indoors or outside - CLIQ enables easy access control for all openings with just a simple, single, programmable key. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Perusahaan Gas Negara (PGN) is a company in Indonesia for the transportation and distribution of natural gas. The total length of distribution pipelines of this company is 3,187 km, serving around 84 million customers. As the owner and operator of four transmission pipelines, PGN is responsible for guaranteeing security along the entire chain of conservation and distribution of gas and for delivering products and services in accordance with the needs of consumers. Securing gas supply lines During the transport phase, the gas is pushed through the pipelines at very high pressure. When it reaches the end-users, however, its delivery pressure must be adjusted so that it falls within an acceptable range (as detailed in the contractual delivery specifications). This is to prevent consumers from being exposed to the full transport pressure reached within the pipeline. A meter and regulator station is used to regulate the Natural Gas outlet pressure, and reduce it to an acceptable value. To this end, PGN has developed a meter and regulator station (the Master Control Station) that works via remote control, directed from the control room. This project plays an active role in the PGN's commitment to achieving Operational Excellence in process management, with the focus on optimizing safety, improving efficiency and on maximizing reliability throughout the gas supply chain operations. PTZ cameras and remote monitoring To guarantee reliability and security of the control function, it is necessary to monitor the process using specialized CCTV equipment for hazardous zones. 10 PTZ units from the MPXHD series have been chosen for the realization of this surveillance system, because of their reliability in providing perfect video footage and their compliance with the security standards for operation in hazardous areas. The PTZ units are used to directly monitor the metering and regulating operations remotely from the master control room.
OPTEX Teams up with Mobile Pro Systems to create a Rapid Security Deployment Solution for a high-end condominium builder in Extreme Weather Conditions. The solution was required for a large construction site for Cove Properties, one of Alberta, Canada’s premier luxury condo builders. Weather conditions With many developers and construction companies building throughout the year, they're forced to battle a myriad of different weather conditions including rain, sleet, snow and extreme cold. On top of this, they still face the inevitable problem of theft and vandalism. Theft of tools, machinery, new materials and scrap material cost contractors millions of dollars per year and leaves the construction companies and their sub-contractors with the effect of having to deal with their losses. The general contractors and developers feel the chain reaction as well, as they have to deal with higher insurance premiums and weeks and months of project delays. To avoid the major effects of construction site theft, Cove Properties turned to 2020 Digital Security Solutions of Alberta, Canada for help. Cove’s requirements included a mobile solution capable of wireless communication that could be moved from site to site with surveillance, motion detection, lighting and remote monitoring capabilities. In addition, it had to survive the harsh outdoor elements of Northern Canada. Powering network and surveillance solution 2020 Digital Security Solutions took all of Cove’s requirements into consideration and found the perfect solution in the PowerSentry by Mobile Pro Systems. The PowerSentry is a self-sufficient, temporary, semi-permanent or permanent surveillance solution. Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole Built as a “power platform”, it can power anything from surveillance, security, communications and/or network technologies. And with its universal mounting options, the PowerSentry can be mounted to a pole, a wall or tripod or can be easily hooked over a fence or roof parapet for superior mobility. It accepts 90-277VAC to minimize re-wiring and is equipped with a high quality Lithium-Ion battery pack as a backup power source due to loss of power or power outages. In addition, the PowerSentry has a unique remote system status and control software called Power Broker, which monitors the PowerSentry’s battery voltage, current power usage, displays active map GPS monitoring, intrusion detection reporting, warning and flood lighting control and horn/speaker control. Motion-activated floodlights To help solve the limited daylight obstacle, 2020 DSS had two 8,000 lumen LED flood lights mounted to the chassis of the PowerSentry. The LED floodlights are motion activated and have a pre-determined setting of how long they will stay on. The lights can also be turned on and off manually through the Power Broker software. “Due to the short amount of daylight during the winter months, the flood lights will help light the site in the evening hours and after hours if there is a breach in the perimeter,” said Gene Telfer, president of 2020 DSS. The perimeter and the interior of the construction site is protected by an Optex RedScan laser perimeter detection device which was connected to the PowerSentry and mounted 8’ below providing a 200’ horizontal area of detection. “We decided to mount the RedScan below the PowerSentry instead of on it because we will get a wider detection range and a firmer detection trigger,” Telfer said. Optex Redscan laser detectors With abnormal cold temperatures hitting the Northern United States and almost all of Canada, the first test was in late December into early January when normal temperatures fell to -40°F and -60°F with the wind chill. “The systems are working great and we haven’t had a system go down at all,” Telfer said. According to Telfer, Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole that made installation very quick and easy. They are using Milestone video management software that integrates with the cameras and Redscan laser detectors for visual verification and event response in one platform.
A high school campus in an Atlanta suburb underwent a complete remodel. Temporary modular buildings were set up on a large area of the campus to act as classrooms during the year-plus long construction. Due to the temporary structures, accessible HVAC units and threat of vandalism, a stable and reliable solution was needed that would also be easy to both install and move if necessary. Wireless passive infrared detectors An integrator was selected who then teamed up with Optex to create a reliable, effective security solution that included iSeries battery-powered, wireless passive infrared detectors. This allowed for a simple, inexpensive yet effective way to protect the assets inside the structures, as well as the HVAC units on the exterior. The detectors protecting the perimeters of the site were set up to trigger strobe lights that alert an on-site guard to the location of any breach, while the system as a whole is monitored by the district's security team. Because the integrator chose to install a battery-powered, wireless option, any of the units can also be relocated if needed, based on changing site conditions or future security needs. Crime prevention at perimeter The temporary campus now maintains a secure perimeter and campus that detects intruders and prevents theft and vandalism. With the battery-powered system in place, the end user has multiple levels of protection and can respond quickly to alarms before any damage is done. Benefits and features of the iSeries battery-powered, wireless outdoor PIR detectors from OPTEX include: No trenching or wiring required allows for a quicker and less expensive install. End user will experience less downtime to business operations. iSeries version includes Inovonics EN1941 transmitter and batteries pre-installed, allowing for a quicker set-up time on job site. Dual PIR feature greatly increase stability outdoor and drastically reduces any false or missed alarms. Units can be easily relocated based on changing site conditions. Outdoor multiple detection pattern Optex’s outdoor PIR detectors (excluding the LX series) utilize the Multiple Detection Pattern technology, where two double-layered detection patterns (upper and lower) have to be activated to generate an alarm condition. This reduces false alarms, particularly those caused by temperature changes, light reflection and small animals. The size judging function virtually eliminates false alarms due to small animals and other moving objects such as vehicles. By utilizing originally developed pyro-elements, it creates a configuration area consisting of 94 high density detection zones. Also, the detection pattern technology requires both detection areas have to be activated in order to generate an alarm condition making it more tolerant to false alarms caused by small animals or pets.
Check Point has introduced CloudGuard Cloud Native Security, a fully-automated cloud platform that enables customers to seamlessly protect all of their cloud deployments and workloads, and manage security through a single pane of glass. CloudGuard streamlines and simplifies cloud security, preventing the most advanced 6th generation cyber-attacks from impacting organizations’ cloud environments, and enables them to take full advantage of the speed and agility of cloud. Rapid migration to the cloud is the biggest cause of breakages in enterprise security architectures, according to the SANS 2020 Cybersecurity Spending Survey, with over half of respondents citing increased use of public clouds as the leading cause of security disruption. The COVID-19 pandemic has magnified this, as companies scramble to support mass remote working. Their current security controls cannot cope with the speed, scale and complexity of cloud deployments, leaving them vulnerable to attacks and breaches. Security across cloud implementations “Cloud security can be challenging; however, the real challenge is multi-cloud, as IDC data continually shows that over 80% of organizations have multiple cloud providers. The goal is one set of policies to rule them all,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “Check Point's multi-cloud security platform looks to unify security across private and public cloud implementations, essentially making cloud security agnostic of the resident software define compute environment.” Check Point CloudGuard addresses these challenges, delivering comprehensive and easy to manage cloud security platform. It gives frictionless deployment and control of the advanced security protections to any cloud environment and workload, and enables security processes to be automated to meet DevOps’ demands for rapid deployment and agility. “Security is continually cited as a barrier to enterprise cloud deployments, because traditional security controls are not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of Product Management, Check Point. “CloudGuard solves this problem, giving organizations the advanced cloud-native security across their cloud estates, together with holistic visibility and easy, automated management and enforcement of security policies.” CloudGuard’s Unified Cloud Native Security Fully integrated security with advanced threat prevention: Prevents APTs and zero-days from infecting clouds and workloads with unified security, and workload runtime protection, including firewalling, IPS, Application Control, IPsec VPN, Antivirus and Anti-Bot, powered by the industry’s real-time, cloud-based threat intelligence. High-fidelity cloud security posture management: CloudGuard gives unified, at-a-glance visibility across organizations’ multi-cloud environments, enabling continuous analysis and control of their cloud security posture from CI/CD to production environments. Automated security for any workload in any cloud: CloudGuard delivers true cloud-agnostic security, enabling organizations to automatically secure any workload, anywhere with auto-provisioning, auto-scaling and automated policy updates. It enables holistic, single-console security management as well as run time protection for serverless and container-based applications, in multi-cloud environments. Supporting Partner and customer quotes: “Check Point CloudGuard has been a saving grace for Gas South. It is the only solution that gives us secure, stable, complete access to our critical applications and services in Azure,” said Rajiv Thomas, Senior Systems Engineer, Gas South. “When deploying a multi-cloud environment, you need to have a consistent tool that plays across all the platforms,” said Sreeni Kancharla, VP & Chief Information Security Officer, Cadence. “Using the cloud-agnostic CloudGuard service, I only need to train an individual on one set of tools and he can manage our total cloud environment very effectively.” Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group at Microsoft Corp. said, “Where people often thought about security as a solution to deploy on top of existing infrastructure, events like COVID-19 showcase the critical need for truly integrated cloud security for organizations of all sizes. Solutions like CloudGuard running on Microsoft Azure help to empower our customers through a unified platform which has become a business imperative as more organizations embrace cloud-based protections.”
viisights, the developer of innovative behavioral understanding systems for real-time video intelligence based on AI, announced that it has deployed a smart city traffic monitoring system in the city of Ashdod, leveraging the NVIDIA Metropolis intelligent video analytics framework. “This project signifies how smart cities like Ashdod increase safety, mobility and quality of life by state-of-the-art traffic monitoring driven by computer vision-based on AI,” said Asaf Birenzvieg, co-founder and CEO of viisights. “viisights traffic monitoring capabilities are based on our revolutionary video understanding technology that helps in analyzing hundreds to thousands of real-time traffic video streams and alerting on complex traffic situations, including accidents, hazards and predicting and managing traffic congestion. We see this project as an example of how a city can be really smart and as a validation of the growing demand for our behavioral understanding solutions.” Intersection blocked Using NVIDIA GPUs and the DeepStream SDK within NVIDIA Metropolis, viisights’ innovative traffic monitoring system provides highly scalable and cost-effective solutions for real-time analysis of thousands of video streams. viisights video intelligence system deployed in Ashdod provides real-time advanced behavioral understanding of traffic actions and events in live video streams by monitoring intersections, crossroads, roads and streets. This enables municipalities to quickly address events of interest such as accidents, disturbances to traffic (for example, vehicles stopping in a junction or on a sidewalk), road hazards (for example, people getting in and out of vehicles in dangerous areas) and monitor traffic flows and report on various statistics. viisights technology protects public privacy by only analyzing general behavior patterns of individuals, groups, vehicles and traffic-flows. It does not identify faces or license plates. Car collision information This cutting-edge, first-of-its-kind technology from viisights assists municipalities to secure traffic flow, prevent blockage and attend to road hazards, while also enhancing their essential role in securing the life and safety of inhabitants; first responders can arrive faster at scenes of life-threatening situations, minimize injuries, and attend to dangers in traffic and more. “We are extremely proud to be at the forefront of smart city technology by being the first city in Israel to define and use this behavior recognition technology for the benefit of Ashdod citizens,” said Gamliel Edri, technologies & CCTV control room department manager for the city of Ashdod Municipality. “The viisights’ system strengthens our ability to ensure the safety and security of our citizens and even save lives. We look forward to broadening our successful collaboration with viisights to other parts of the city.”
Round table discussion
Cloud systems are among the fastest-growing segments of the physical security industry. The fortunes of integrators can improve when they embrace a recurring monthly revenue (RMR) model, and cloud systems are expanding the services and features manufacturers can provide, from remote diagnostics to simplified system design. But for all the success of cloud systems, there remains confusion in the market about the exact definition of “cloud.” Or does there? We asked this week’s Expert Panel Roundtable: What is “the cloud?” Is there agreement in the market about what the term means?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload