Safetrust, a globally renowned virtual credential solutions provider, has announced bringing Touchless Mobile Access and WiFi options to the millions of HID iCLASS SE and multiCLASS SE readers deployed currently with their new SABRE MODULE. Touchless Mobile Access The 30-second plug-in makes the SABRE MODULE the fastest way to enable touchless mobile access at the door, turnstile or elevator, while using existing readers. SABRE MODULE enables hands-free access authentication from a configurab...
Check Point® Software Technologies Ltd., a provider of cyber security solutions globally, announces the acquisition of a new cloud-based technology that delivers secure remote access created by Odo Security. This technology will integrate with Check Point´s Infinity architecture, and become the easiest and most secure solution for enterprises need to enable employees´ secure remote access to any application. The COVID-19 pandemic has driven enterprise adoption of mass remote wor...
Barco, a globally renowned professional visualization solutions firm, has announced the release of WallConnect Cloud, a new cloud-based remote monitoring and management platform for its video walls portfolio. WallConnect Cloud WallConnect Cloud allows system integrators to monitor and diagnose their installed base of video walls, enabling them to remotely check the status, diagnose and control a number of critical parameters. This results in higher operational efficiency, faster problem-solvin...
Security researchers at Check Point have seen a global increase in cyber-attacks against education and research institutions, after conducting a research study on organizations in the USA, Europe and Asia regions. The USA saw the highest increase in education- and research-related attacks, according to Check Point researchers. In July and August 2020, the average number of weekly attacks per organization in the USA education sector increased by 30%, from 468 cyber-attacks to 608, when compared...
Hikvision, an IoT solution provider with video as its core competency, has announced its new generation of wireless alarm systems – the AX PRO – delivering comprehensive alarm solutions for both residential and commercial applications. The newly launched AX PRO product family includes a compact panel hub for a wide range of detectors and peripherals, covering intrusion detection, video verification, smoke detection, flood detection and home automation. Developed with both the instal...
Installations around the world by Ultimate Visual Solutions (UVS) have completed more than one million hours of uninterrupted operation since COVID-19 lockdown began in March. The security video wall technology experts currently have almost 250 installations in 18 countries, ranging from the UK and US to Vietnam and Tanzania. UVS Managing Director Steve Murphy said all the sites had operated continuously since lockdown began in March. The company, based in Burney, launched a full suite of...
SMART SHOOTER, a designer, developer, and manufacturer of innovative fire control systems that significantly increase the accuracy and lethality of small arms, announces that it has successfully completed another step in testing the SMASH Hopper in different configurations. SMASH Hopper, SMART SHOOTER's Light Remote-Controlled Weapon Station (LRCWS), was mounted on Plasan Re’em’s Armoured Toyota Hilux and successfully shot and hit several moving ground and air targets from more than 300 meters. Mounting on vehicles Weighing approximately 15 Kg, SMASH Hopper is a modular and rapidly deployable LRCWS that provides “One Shot – One Hit” capability while controlled by an operator from a safe distance or from inside a protected vehicle. SMASH Hopper is ideal for deployment on various lightweight manned and unmanned vehicles & platforms, with a wide range of applications. Offering day and night capability with automatic scanning and target detection, SMASH Hopper is ideal for multiple mission scenarios including force protection, border security, anti-drone, remote ambush, as well as low profile operations at complex urban environments. Increased accuracy Michal Mor, Smart Shooter CEO: "We were happy to collaborate with Plasan Re’em for the development of capabilities in this market segment, and appreciate the professional work they did in the integration and installation of the SMASH Hopper on their modified armored 4x4 vehicle. This is another step in a series of trials for different configurations and applications of the SMASH Hopper, and once again, we were thrilled to see how every bullet finds its target.” Yaakov Ben-Ari, Plasan Re’em CEO: "Integrating SMART SHOOTER's SMASH Hopper lightweight RCWS that provides “One Shot – One Hit” capability on Plasan Re’em modified armored 4X4 vehicle creates a tiebreaker solution that dramatically increases accuracy, lethality, and survivability of small arms. Ideal for special forces, law enforcement units, and border security, this integrated solution brings essential added value to its users, especially in scenarios where weight, time, and precision play an indispensable role."
Ava, a unified security company, announced the completion of the merger between Jazz Networks, a cybersecurity insider threat detection and response company, and Vaion, an end-to-end video security provider. Ava is now uniquely positioned to deliver unified cyber and physical security solutions to organizations worldwide. “The only way to protect against hybrid cyber and physical security threats is to have a solution that can connect the dots across both domains,” said Tormod Ree, CEO, Ava. “In April, we announced our vision, and over the past five months, we have been connecting those dots. Working with new partners and helping organizations across industries protect their most valued assets: online and offline.” Improve cyber hygiene Ava’s integrated cyber and video solution allows for separate analysis of data from all users, cameras, and servers. The human-centric cyber solution (formerly by Jazz Networks) employs a powerful combination of policy, education and machine learning sensors to prevent IP theft and sabotage, improve cyber hygiene, and accelerate threat hunting. The end-to-end video solution (formerly by Vaion) delivers proactive video security, and insight including integrated video and audio analytics uniquely powered by machine learning algorithms, intuitive installation processes, and a range of smart cameras. For maximum flexibility and agility, video can be viewed from anywhere with simple web and cellphone interfaces. “By identifying both cyber and physical security threats before they become incidents, organizations can take a more proactive security posture,” said Ree. Overall physical security Ava allows us to leverage possible insider threat information into our overall physical security picture" “Managing our physical and information security needs through a wider lens has become critical to protecting our entire operation,” said Bill Tom, Director of Information Technology and Cybersecurity of Grace Farms Foundation, whose part of its mandate is to combat Modern Slavery, Gender based violence and Environmental Crimes. “The Foundation carries out its work through the publicly available facilities and integrated programs of Grace Farms, an 80-acre property owned and operated by the Foundation with an even larger population accessing data. Ava allows us to leverage possible insider threat information into our overall physical security picture.” Information security officers The average total cost of a data breach in the U.S. has grown from $3.54M in 2006 to $8.19M in 2019, a 130% increase over 14 years. The pressure on chief information security officers (CISOs) and security teams, in general, has increased incrementally. It is imperative that organizations have a flexible, secure solution to prevent incidents from occurring rather than just documenting the damage reactively. “Ava is driving innovation in the unified security market,” said Espen Riska, Atea. “It is no longer enough to protect against either physical or cyber threats. Organizations must account for the full spectrum of risk.” Efficiently managing systems We are excited to partner with Ava to bring innovative unified security solutions to our mutual customers" As companies move toward a hybrid workforce structure with employees splitting time between working in-office and remote, organizations must reassess processes to keep IT staff from burning out, while at the same time efficiently managing distributed systems and assets. “You can’t build firewalls around remote employees, businesses must empower and educate staff to make the right choices,” said Ree. Unified security solutions “We are excited to partner with Ava to bring innovative unified security solutions to our mutual customers,” said Urban Jansson, Sales Manager, Cygate. “Ava brings a unique understanding of the market’s pain points. Beyond protecting against physical and cyber threats, Ava understands that businesses don’t always have the in-house resources to monitor operations 24x7. Ava’s cutting-edge use of machine learning and the cloud eases the burden on internal resources while proactively mitigating the risk.”
Dahua Technology, a globally renowned video-centric smart IoT solution and service provider, made new breakthroughs in the field of AI technology recently. Various indicators of its Gait Recognition Technology have once again broken the record of CASIA-B gait dataset: the average accuracy of Rank1 for NM (normal walking), BG (with a bag) and CL (in a coat) reached 97.4%, 94.0%, and 87.0% respectively, hitting another historical heights and maintaining its pioneering position. Gait recognition uses body shape and walking posture to identify a person, even if his/her face is occluded. It is one of the biometric recognition technologies with the greatest potential for long distance recognition scenarios. Gait recognition analysis Aiming to address the technical difficulties of gait recognition in clothing changing search, carrying changing search and cross-view search, Dahua Technology integrates innovation and application of multi-modal gait algorithms, local gait feature extraction, and spatio-temporal gait feature extraction technologies. Dahua Technology has been cultivating and innovating in the field of AI technology Combined with powerful model training and object recognition, it greatly improves the algorithm's robustness in special scene applications such as clothing changing, similar clothing, facial occlusion, and facial disguise, and thus making the gait recognition analysis more accurate and efficient. In recent years, Dahua Technology has been cultivating and innovating in the field of AI technology, and has continuously improved its core competencies that include algorithms and computing power. Fundamental AI capabilities So far, Dahua Technology has received numerous first-place recognitions in various global AI ranking categories including Scene Parsing, Binocular Stereo Matching, Remote Sensing Image Analysis, Person Re-identification and Visual Target Tracking Algorithms. It has accelerated the transformation of its AI technology achievements into real and actual production, maintaining its pioneering edge in the industry. Based on the construction of its fundamental AI capabilities and resources, Dahua Technology has released its new generation AI platform. It integrates computing centers, data centers and training centers in order to build its sustainable capabilities in the fully linked development of AI, including data management, algorithm training, cross-hardware platform optimization, integrated deployment, and automated testing. Intelligent business applications Dahua Technology combines industry development and diversified needs of users It provides guarantees for algorithm research and application, improves efficiency of AI research and development, and helps users build intelligent business applications and accelerate end-to-end AI industrialization. At the same time, Dahua Technology combines industry development and diversified needs of users, focusing on AI technology fields such as smart transportation, smart travel, behavior analysis, item analysis, navigation and positioning, multi-dimensional sensing, as well as smart coding and decoding. Digital and intelligent transformation It has accelerated the development and upgrade of its algorithms for application scenarios, quickly realizing the commercial coverage of smart products and solutions in the whole system, and empowering customers to innovate in a wide range of applications. These include public security, transportation, finance, communities, energy, education, manufacturing, construction sites and other industries, thus assisting users in achieving their digital and intelligent transformation. In the future, Dahua Technology will continuously adhere to the concept of "Empowering industries with AI" in promoting the in-depth integration of AI technology and various industry scenarios, fully utilizing the support and leading role of technological innovation in the sustainable development of hundreds of industries. The company will advocate popularization and application of AI and other new generation technologies in order to empower the digital transformation and upgrading of all industries.
Pulse Secure announced new features to its Network Access Control (NAC) solution, Pulse Policy Secure (PPS), that enhance endpoint and IoT device visibility, compliance, remediation, and threat response as organizations embrace expanded remote work flexibility with employees and their devices returning to a hybrid workplace. Available separately or as part of Pulse Access Suite Plus, Pulse Policy Secure (PPS) is an enterprise-class NAC solution that is easy to deploy, manage and scale. The update release includes over 30 new features and enhancements such as support for additional endpoint detection and response (EDR) and IoT / OT vendors including McAfee and Nozomi. With businesses slowly opening up more modified and social-distanced work settings and accelerating multi-cloud and hybrid IT resource use, organizations are experiencing increased attack vectors and exploits stemming from endpoint and IoT device exposures. Hybrid work environment What’s required to ensure user productivity and information security in today’s hybrid work environment is greater managed and unmanaged device oversight, expanded endpoint compliance and remediation capability, and means to unify remote and on-premise access control. In the “2020 Endpoint and IoT Zero Trust Security” Report, Cybersecurity Insider’s noted the following survey results: 66% saw an “increase to significant increase” in endpoint and IoT security incidents impact over the last 12 months, with the top 3 being malware, insecure network and remote access, and compromised credentials / weak authentication. 50% anticipate “high to likely” that their organization will become compromised due to an endpoint or IoT originated attack in the next 12 months. 48% have “moderate to unlikely means” to discover, identify and respond to unknown, unmanaged, or insecure devices accessing network and cloud resources. Threat response capabilities Pulse Secure ranked among the top 3 hybrid NAC vendors by global market share Modern Network Access Control solutions provide the agent and agentless visibility, contextual access policy control and integrated threat response capabilities necessary to prevent endpoint exposures that yield identity theft, malware and network compromise. Regulated industries, such as financial services and healthcare, need to be especially diligent in enforcing endpoint compliance and segregating IoT access. According to a recent market report by IDC, NAC is a mainstream market forecasted to grow 10.7%, reaching $1.9B by 2024. NAC has evolved from an admission control tool to enable real-time, on-premises endpoint, cellphone and IoT device discovery, assessment, enforcement and remediation capabilities. In this report, Pulse Secure ranked among the top 3 hybrid NAC vendors by global market share - offering 802.1X, non-802.1X agent-based agentless functions. High performance appliance The report’s “Who Shaped the Year” section highlights Pulse Secure’s capabilities: Pulse Policy Secure (NAC) offers the complete range of capabilities, including 802.1X and non-802.1X, agent and agentless Client, and network profiling with UEBA, which gives enterprises flexibility to deploy across a gamut of hybrid IT environments. This makes Pulse Secure's NAC ideal to support a wide range of use cases, such as: visibility only, full-featured 802.1X, agent-based BYOD (they offer a cellphone VPN and MDM), as well as agentless guest, IoT and IT/OT security. Having a built-in RADIUS server, high performance appliance (up to 50,000 concurrent sessions), centralized management (up to 400 appliances), and ecosystem integrations also provides benefits to NAC scalability and interoperability. Secure access technologies Modern NAC solutions are increasingly becoming a critical component of a multifaceted secure access program" As a Secure Access platform play, competing with Cisco, Fortinet and HP, Pulse Secure provides a portfolio of solutions available separately or as an integrated suite for hybrid IT. Pulse Secure offers all three primary secure access technologies recognized by IDC: VPN, NAC, and SDP. With unified Client, appliance, management and rules engine, this cross functionality allows corporate policy to be set across any combination of solutions. As the pandemic forces adopting organizations to prioritize securing the growing remote workforce, Pulse Secure is able to provide a comprehensive solution-set which does not requiring sacrificing the continuing need for on-premise security. Secure access program “Beyond the merits of device visibility and access enforcement, modern NAC solutions are increasingly becoming a critical component of a multifaceted secure access program, both supporting a wide variety of important uses and adding value through key integrations with other security technologies,” said Peter Finalle, Senior Research Analyst for IDC’s security team. “Pulse Secure is distinguished among Secure Access platform players as offering extensive hybrid NAC capabilities, device intelligence, scalability and key integrations while delivering user experience, endpoint security, and access management across NAC, VPN and SDP solutions.” New features enhance endpoint compliance Pulse Secure offers a portfolio of Secure Access solutions that provide exceptional usability and visibility “The latest release of Pulse Secure NAC continues to advance our deployment, usability and threat response capabilities while delivering enterprise-class functionality,” said Ganesh Nakhawa, Director of Portfolio Solutions at Pulse Secure. “With our unique means to offer a unified endpoint compliance and protected connectivity capabilities across cellphone, network and cloud environments, organizations can mitigate endpoint and IoT security risks while ensuring productivity no matter where employees work.” Pulse Secure offers a portfolio of Secure Access solutions that provide exceptional usability, visibility and Zero Trust policy orchestration to enable seamless, compliant user and device access to applications and resources across distributed network and cloud environments. Security posture assessment New PPS version 9.1R8 features and enhancements include: Endpoint security compliance enhancements with leading endpoint detection and response (EDR) vendors including new McAfee ePolicy Orchestrator (ePO) integration. This allows organizations to assign role-based access based on device attribute details provided by McAfee ePO, automatically install McAfee ePO client if not detected, and limit or block connectivity based on threat alerts received from ePO, such as non-compliant or compromised devices. Agentless device discovery and security posture assessment advancements, such as expanded passive device fingerprinting using TCP and SMB protocols, to enhance endpoint access control and reduce administrative classification tasks. Greater device visibility and threat response for Industrial Control System (ICS) environments based on increased IoT/IIoT device classifications, and automated access control based on threat severity notifications from IT and OT security vendors such as Nozomi. Management UI improvements that simplify and streamline administrative tasks such as new search and custom reporting options to expedite audits, investigations and operational insight. Government contractor applications Pulse Policy Secure has FIPS 140-2 Level 1 certification and is Common Criteria certified extensive deployment in government, military and government contractor applications. Used to satisfy NIST 800-53 controls and Comply-to-Connect requisites, the solution is certified on the U.S. DoD Unified Capabilities (UC) Approved Products List (APL) and for J Joint Warfighting IT Interoperability (JTIC). NAC Upgrade Program - Organizations can take advantage of Pulse Secure’s Trade-in Program to replace current NAC solutions from companies such as Forescout, Cisco, Aruba, and Fortinet.
Milestone Systems announced a webinar panel discussion of safety and security professionals, including representatives from Nemours Children’s Hospital Health System in Jacksonville, Florida, and The City of Calgary in Alberta, Canada. They will share insights and ideas on how to address change, support their core mission and assist other parts of their respective organizations. The webinar will focus on how these three different organizations are using their video management system to help ensure a safe environment for their employees, students, patients, and the general public. Integrators and developers The panel will be hosted and moderated by Tim Palmquist, Vice President of the Americas at Milestone Systems. “Our goal with this webinar is to bring together security professionals to help them share their thoughts, concerns, experiences and new best practices with their peers,” said Palmquist. “These are unprecedented times, and I’m sure their insights will be valuable to users of any industry, as well as integrators and developers within our industry.” Remote video monitoring Topics slated for discussion include remote video monitoring, social distancing, queue management, people counting, access control and other tools that may be beneficial. The 45-minute webinar will be streamed Tuesday, September 15, 2020 with a Q&A session immediately following.
As part of an ongoing policy to certify products to North American standards, Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced that the BoonAssist TQ manual revolving door has been tested and certified to confirm with UL Standard 325 and CSA 22.2, a standard established by UL (United Laboratories) for door, drapery, gate, louver, and window operators and systems. This certification assures Boon Edam customers that the product has been rigorously tested by a 3rd party and found to operate in a safe and predictable manner at any installed location. UL Standard 325 and CSA 22.2 (the harmonized standard in Canada) are the prevalent industry standards for ensuring the safe operation of revolving doors in the United States and Canada. Modern revolving door While all of Boon Edam’s products currently conform to CE (the European Union standard of safety and operation), the company continues to invest in UL certification for all door and turnstile products sold in the Americas to align with North American standards and ultimately streamline installation for their customers. The BoonAssist TQ is specified for many projects where user comfort and safety are considered essential When the users consider that manual revolving doors were invented in the 1870’s, the BoonAssist TQ is a completely modern solution due to its three unique features: it offers a low-energy, power assistance motor that reduces the force needed to push the door by up to 50%, it has speed control to ensure the rotation speed is always safe, and, the door wings always come to a stop with the wings pointed to the end posts of the throat opening (a.k.a., “quarter pointing”). Access control systems As a result of these three features, the BoonAssist TQ is specified for many projects where user comfort and safety are considered essential. In addition, the BoonAssist TQ can be upgraded with extra security options: a remote locking capability, an instantaneous panic-locking capability (in case of a threat trying to enter the building) and integration with access control systems to restrict access into public buildings during afterhours. “Boon Edam is driven to provide safe and secure entrances around the globe and we’re continuously investing to ensure our products exceed operational standards,” says Valerie Anderson, President and Managing Director at Boon Edam Inc. “When our entrances conform with UL standards, our North American customers gain peace of mind knowing that a reputable 3rd-party has rigorously tested and confirmed they will operate safely at any location.” Auditing and analytics UL was founded in 1894 and helps companies demonstrate safety and confirm compliance. Services offered by UL include: inspection, advisory services, education and training, testing, auditing and analytics, certification software solutions, and marketing claim verification.
We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line. How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location. Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.
COVID-19 has been a thorn in the side of countless companies within the security industry and far beyond. Here, we speak with Richard Huison, Regional General Manager for the UK and Europe at Gallagher Security, who summises his personal experience from these recent months and how Gallagher has adapted in the face of pandemic-induced adversity. How has the COVID-19 crisis impacted Gallagher on a day-to-day basis? Gallagher was actually well placed as a result of work already in progress with a number of visionaries and innovators within our business, such as our CIO Neville Richardson. They are determined to put the business on the front foot, making it more digital and proactive in delivering high speed change and we had already been migrating to Microsoft Teams before COVID-19 first reared its ugly head. It’s part of our philosophy to make our business and the solutions we create as stable, reliable and resilient as possible. Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world It means Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world. When lockdown was imposed, we set about prioritising our clients’ needs and delivering on our commitments as a critical supplier. The Gallagher leadership team quickly rolled out the means to stay connected, positive and safe as each region went into isolation. Effective communication, both internally and externally, has always been a critical success factor for our business. That hasn’t changed with the more remote and virtual nature of our communication now and, if anything, it’s even more important both for business continuity and for the personal wellbeing of each and every one of our colleagues. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done in new ways, such as using the emojis on Microsoft Teams. Perhaps the most striking example of this is our new European marketing manager Bethan Thompson, who joined Gallagher on 1 April, little over a week after lockdown was imposed in the UK. She has enjoyed the richest and most comprehensive introduction to the business from the safety of her own home armed with just a laptop and Teams. What can be the benefits of having employees working from home? There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done To be honest, before COVID, we didn’t disconnect enough, close the laptop, switch off our technology and allow ourselves NOT to respond instantly. But trust is an integral part of our culture at Gallagher and we can easily and effectively continue to champion the right balance and support for the team moving forward. How can employees ensure they keep a healthy work/life balance? Working from home can require some personal discipline around taking regular breaks and disconnecting from technology. I encourage all my colleagues to stay active and get regular exercise during the day. Taking time out allows you to process ideas with greater clarity, to be more creative, to plan your day and use your time more effectively – all of which is part of achieving that balance. And it’s important that we do switch off and close our laptop at the end of the day, which requires some discipline when you work for a business headquartered in New Zealand, where they are 11 hours ahead. It’s good to cultivate hobbies and welcome distractions that you are passionate about, to switch off from work more effectively. Personally, I love to be outside on a long dog walk with no technology. It’s liberating. Are you seeing that businesses are already beginning to think differently about their security? We have to remember why security is important. We all have a different view on how we should maintain business continuity. Yes, properties need a reliable detection and defense solution to resist the opportunist. With the mass migration to work remotely, business leaders are concerned that their IT systems are vulnerable to attack and we read daily about the growth in cyber-attacks. It’s common sense to protect your business with a suitable access control and intrusion detection system and the pandemic has proven to business the value of being truly resilient and able to still operate whatever circumstances ensue. What will be the biggest security challenges facing businesses over the next six months? In that timeframe, I don’t see us returning to how things were prior to the pandemic, so businesses will have to adapt to a new normal. We will have to adopt a more holistic view of security, encompassing safety, security and wellbeing, with our teams at the heart of that. In the new world, how can we maintain our teams’ safety at home, or limit them to certain floor space or introduce rotas for office attendance and keep surfaces virus free while they’re there? We need to be alert to where the next threat will come from and mitigate risk against both cyber and biological threat as we’ve seen a virus in either domain can be devastating. How is Gallagher meeting the evolving demands of the market? To be honest, Gallagher has always been ahead of the curve. We’ve been talking about competencies, compliance and resilience for decades, long before cyber became the buzzword. Everything we do is related to business resilience and continuity and security is baked in to our products and solutions at source, providing confidence and reliability for all of our customers.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe. In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace. Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security. “How do you support the business and, more broadly, societies and communities?” The new normal for security The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.” “We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks. “We just need to take a fresh look from a mix of perspectives.” “Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show Infrared cameras and access control technologies New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing. But what will such use of these technologies mean in the long term? Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing “We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company. “Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?” Manufacturer philanthropy Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good. “Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.” An accelerated timeline will raise the stakes even further. “All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto. “The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’” Public health versus individual liberty The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information. “There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.” The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection “There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly. “In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.” From smart security to more intelligent technology After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.” After the pandemic, the innovation climate will befit new technology adoption Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon. Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.” “Science and technology are morally neutral,” he said. “How we use them is not.” Intelligent automation over artificial intelligence Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse. Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm” “A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things. In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity. “Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realized in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorized party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorized locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realized) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorize monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security marketSmart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognizable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, and our mission is to give those administrators the best possible tools to do their jobs,” said Filip Kaliszan, CEO and co-founder of Verkada. “Whether it be monitoring the status of a server room, the temperature of a patient room in a hospital, or the air quality of a school, the SV11 gives facilities and staff unprecedented visibility and control over the sites they’re responsible for keeping safe and secure.” The SV11 is a simple-to-deploy, powerful sensing device that provides enhanced visibility into what is happening in a physical space. The cloud-managed device seamlessly integrates with Verkada’s enterprise video security solution, allowing organizations to review context and quickly associate sensor events with relevant video footage. Real-time insights and proactive alerts The interface delivers real-time insights and makes it easy to respond to proactive alerts or conduct investigations into past incidents. Customers across a range of industries, including healthcare, manufacturing, education, retail, and hospitality, have already deployed the SV11 to monitor: Air quality: Protect one's environment from invisible threats like gas and chemical leaks, or detect illicit activities like vaping and smoking. Temperature and humidity: Monitor changes in temperature and humidity that may damage expensive infrastructure, materials, or food and medical supplies. Motion and occupancy: Detect motion or occupancy in bathrooms, locker rooms, and other private areas where cameras are not appropriate. Noise levels: Detect activity or disturbances without violating privacy. Receive and manage alert notifications remotely “The ability to deploy Verkada's sensor in our network closets has provided us with complete visibility into what’s happening in those rooms,” said Rick Palandro, Security and Facilities Operations Engineer at Fox Rothschild LLP. “With Verkada, I'm now able to receive and manage alert notifications remotely the moment temperature rises above a specific threshold. I can instantly mobilize the team to respond to HVAC issues. We’ve shifted from a reactive approach that often resulted in damaged equipment to a proactive one that ensures our equipment is always operating properly.” Monitoring preventative and predictive maintenance Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing" “Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing that helps us stay ahead of the curve on environmental improvements across our plant facility,” said Frank McKinney, COO and Plant Manager of Carolina Ingredients. “By pinpointing where we can set up both preventative and predictive maintenance, we can closely monitor and optimize air quality, efficiency of our HVAC units, and behaviors in the plant, which enables us to more effectively manage the business and deliver quality ingredients and superior blending services that support our customers.” Integration with video monitoring solution "We installed the environmental sensor across campuses in areas like bathrooms that are difficult to properly monitor and are therefore likely places for inappropriate activity such as vaping," said Marty Oliver, Director of Technology at Godley Independent School District. "Paired with Verkada's video monitoring solution, the SV11 provides a new level of visibility into what's happening in those spaces without infringing on students' privacy, giving principals, superintendents, and office administrators a more holistic understanding of student activity in school." Environmental sensor The introduction of the environmental sensor follows accelerated business growth in Q2 2020, highlighted by: Sixty-five percent quarter-over-quarter revenue growth (compared to Q1 2020), including new deployments with Holiday Inn Express and Suites, Rubrik, NextGen America International expansion with new Sales operations in Sydney and Latin America and deployments with Heinemann Australia, Lifeview Residential Care, and Transportes Canales A projection to double headcount by year-end 2020 (compared to year-end 2019) Expansion of its global channel partner program to more than 1,500 resellers The launch of its Access Control solution, which oversold in the first quarter of general availability and surpassed projected sales by more than 400 percent The release of the Bullet Series of hybrid cloud cameras as well as new features as part of a COVID-19 Response Suite, including People Heatmaps, Person of Interest Notifications, and Crowd Notifications Smart buildings The launch of the SV11 is the next step towards Verkada delivering on its vision to power the modern, integrated building. With security cameras at its core, Verkada is expanding its product offering with new applications such as access control and sensors to deliver the infrastructure that runs safer, smarter buildings.
Today’s medical institutions have a large number of patients who require constant supervision, risk malpractice and patient negligence claims, need to ensure hygiene compliance, and find solutions for the high security and video storage costs. When faced with limited high administrative costs, government funding, or recession, intelligent video security solutions can help hospitals relieve the pressure. Choose Ava Unified Security (formerly Vaion) to reduce liability claims, detect threats proactively, improve operational efficiency, and provide surgery documentation for educational purposes. Why Ava? Anomaly detection and analysis in real-time Ava’s pervasive, integrated video analytics use self-learning to give an enhanced understanding of all of the user’s cameras’ feeds. The staff can use the dynamic Video view with Spotlight that brings only the relevant feeds to their attention. In unusual activity cases, the operators can immediately respond when a high-risk patient leaves his room unattended or visitors are wandering in prohibited areas. Increased situational awareness Add maps of the user’s facilities and rooms to keep track of high-risk patients, visitors, and staff and their exact location. Maps include Smart Presence, a capability that lets the users track them as they move through their facilities. Combine with access control to locate patients and staff in critical moments. Administrators can also have a clear picture across their locations to improve patient care and daily operations. Quick search within minutes for insurance claims Operators can find visual evidence to prove or disprove liability claims fast and accurately or if hygiene protocol compliance is followed correctly. Smart Search allows personnel to search by appearance, events, objects, similarity, or image. The vcore VMS integrates with access control systems through the generic access control API. It is possible to get a clear picture of historical entries and exits of patients and staff and the video associated with it. Sharp images and integrated audio analytics Equipped with directional acoustic sensors, Ava vcam Dome and Pano notify security and healthcare professionals instantly when loud noises, screaming, glass breaking, and gunshots occur. The cameras also deliver unmatched video quality required to provide recordings for scientific presentations, research, and education. vcam is suitable for different settings, from parking lots and storerooms to patient wards and operating rooms. Key benefits, delivered: Build from existing investment while retaining privacy Integrates with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video and metadata storage remain securely on-premises Full site survivability and local access Safe and reliable environment Capture every detail at all times with discreet security cameras Monitor high-risk patients at all time with remote monitoring Enable preventative action through immediate response time Improve operations and services Save storage and money Automatically decrease storage demands from all of the user’s recordings Reduce bandwidth consumption on critical links with AI-based optimization Support both on-premises and cloud within a single deployment Up to 200 cameras per Ava vserver appliance - small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons Simple and flexible licensing With a simple licensing model, Ava always includes services and software upgrades. The users no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Custom Consoles announces the completion and delivery of Steelbase Lite desks and a MediaWall video monitor display mounting system for the Agricultural Development Bank of Ghana (ADB). Commissioned by Virtual InfoSec Africa, the new installation is situated at ADB's headquarters in Ghana's capital city, Accra. "We were looking for a production partner with a good understanding of video technology, able to produce robustly built and ergonomically efficient control room furniture," says Bondzie Acquah, VP Operations at Virtual Infosec Africa. “With its long experience of the security business and proven ability to meet the demands of heavy industry, Custom Consoles was the logical choice both for the desks and the display mounts. Based on SteelBase Lite and MediaWall, we were able to integrate a complete system into a compact 8 by 5-meter room while at the same time ensuring that all staff could function safely and effectively. Computer equipment is housed in ventilated desk frames with easy front and rear access via black-finished lockable doors for routine technical maintenance." Video display screens Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use by up to four operators. Two 24-inch video display screens are mounted in front of each work position on individually adjustable support arms. The desk is located 70 centimeters forward of a 5.2-meter wide MediaWall giving a clear view of eight 55-inch Samsung video display screens mounted in a four wide by two high configuration. Front to back depth of the MediaWall is just 50 centimeters. The second desk is a single-bay dual-screen unit measuring 1.5 meters wide by 1-meter front-to-back. This is configured for use by a supervisor. Both desks are finished in rust-colored Marmoleum with black PVC edging and silver anodized aluminum legs. The supervisor's desk faces a 76-centimeter high printer support unit with a 60 by 60-centimeter top surface, height-adjustable shelf and integral cable tray. Control room consoles "SteelBase, SteelBase Lite and MediaWall continue to be in strong demand for a very wide range of process control, security and corporate applications," says Custom Consoles' Sales Manager Gary Fuller. "We are very pleased to have worked with Virtual InfoSec Africa on this project and look forward to partnering with them in the future." A variant of Custom Consoles' long-established SteelBase series, SteelBase-Lite is a compact structured desking system which can be configured from 1.2-meter wide powder-coated modules and Marmoleum finished work surfaces, providing a self-assembly hard-wearing ergonomic solution for control room consoles. Panels and ventilation SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams. Additional design features of the SteelBase Lite range include hinged removable access doors, 19-inch equipment racking, heavy cable management, power distribution panels and variable-speed ventilation fans. Worktops can be configured to suit individual client requirements. All elements of SteelBase and SteelBase Lite are guaranteed against component failure for five years of normal use. SteelBase-Lite is designed to conform to ISO 9241 part 5, ISO 11064 Part 4 and EN 527 Parts 1, 2 and 3. MediaWall monitor displays First announced in 2006, Custom Consoles' MediaWall allows flat-screen monitor displays of practically any width to be constructed from standard horizontal and vertical support elements. MediaWall can be used as a fully self-supporting structure or coupled directly to the studio wall. Individual screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the boundary of the monitor panel. All wiring is fully concealed and can enter or leave the structure at any desired point. MediaWall is available in any required element widths.
When talking about penguins, people normally think of snowy Antarctica. However, many would be surprised to know that Africa is also home to penguin families. The African penguin is a unique species that has been classified endangered from a population of over a million in the 1920s to only 13,300 breeding pairs left in South Africa currently and could be extinct in the wild by 2030. Saving African penguins Historical factors of guano scraping for agricultural fertilizer destroyed the African penguins’ breeding habitat, leading to predation during the crucial fledgling stage. An estimated 13 million-plus penguin eggs were harvested as a delicacy that caused the initial crash in numbers. In addition, the African penguin also faces issues of predation by gulls/seals/sharks, oiling, marine pollution, and a lack of fish due to overfishing in their crucial hunting grounds. Hikvision and DICT partner to protect African penguins At the initial phase of the conservation project, Hikvision cameras and solution were deployed at APSS Since 2006, the Dyer Island Conservation Trust (DICT) has been rescuing birds and providing nests to help them during the fledgling stage, which improves the breeding success. In 2015, DICT opened the African Penguin and Seabird Sanctuary (APSS) with a fully equipped lab and the vet on standby. Now, Hikvision has partnered with DICT to protect the African penguin. At the initial phase of the conservation project, Hikvision cameras and solution were deployed at APSS, which makes it possible for the public to view the feeding and rehabilitation process, and bring the conservation message of the African penguin to a wider audience. Hikvision cameras installed at APSS “We have always wanted to share the daily work we do at the APSS with a larger audience. Through the use of cameras, this will be possible. The planning of this project started in 2019. At the time, little did we know that the lockdown caused by the epidemic would prohibit visitors from temporarily viewing the penguins. So being able to view the penguins from one’s home will mean we don’t have to forget about our feathered friends,” said Wilfred Chivell, the Founder of DICT. Ping Yu, Cape Town Branch Manager of Hikvision South Africa, elaborated on the partnership, stating “Hikvision is committed to using technology for good. We are very pleased to be able to support the efforts of APSS’s critical conservation work.” PTZ cameras for non-invasive wildlife observation Hikvision’s cameras have the latest technology that provides multiple views and high-quality images Hikvision’s cameras have the latest technology that provides multiple views and high-quality images. The pan-tilt-zoom functions of Hikvision products are ideal for non-invasive wildlife observation, part of the efforts to ensure future breeding populations. In the next phase of the project, DICT plans to deploy Hikvision cameras on Dyer Island, once a thriving colony that had 25,000 breeding pairs of the African penguins in the 1970s. They are now less than 1,500 pairs left. Deploying Hikvision cameras on Dyer Island Due to the sensitive nature of the island, it is not open for the public, but with the use of Hikvision cameras, people can observe the penguins as they interact in their natural habitat. This will help with scientific monitoring and bring the island to the general public, and the video technology and solution provided by Hikvision are expected to improve the conservation work from a few other aspects: It can help to evaluate the nesting and breeding on Dyer Island. It is an innovative method to identify possible injured or compromised birds without causing unnecessary disturbance to breeding birds. The staff and volunteers can immediately treat any birds, thereby increasing their survival rate. It is a useful tool for island rangers to spot trespassers on the island. Hikvision is committed to exploring how innovative technology can secure the sustainability and biodiversity of the world.
Loughborough University has selected the ASSA CLIQ® Remote system from the ASSA ABLOY Door Hardware Group to help secure its plant control rooms. With more than 18,000 students at Loughborough University for 2018-19, the award-winning ASSA CLIQ® Remote technology has been used across the site for a range of different applications, including teaching laboratories and offices. Its success as a security and access control solution has led to it being extended to cover the university’s plant control rooms too. Providing an easy-to-use electromechanical locking system, the ASSA CLIQ® Remote solution uses high-end micro-electronics and programmable keys and cylinders to offer flexible control over access rights. ASSA CLIQ® Remote solution Loughborough University can program and update each key remotely, removing or granting access privileges for the key holder in real-time. This allows only those with the necessary authority at the university to enter a plant control room. Furthermore, the system removes the security risks associated with lost or stolen keys, eliminating the time and cost spent on replacing a mechanical lock. For staff that have access to these areas and then leave the university, their access rights can be easily be removed by using the system’s simple, web-based interface, ensuring ex-employees and contractors never pose a security risk. ASSA CLIQ® Remote also provides a full audit trail for assured peace of mind around who has accessed the plant control rooms and - because the locks are powered by a battery inside the programmable ASSA CLIQ® Remote key - no extra wiring is required when installing the system. Wireless electronics locks Phil Sheppard, Senior Clerk of Works at Loughborough University, said: “For us, a big advantage to ASSA CLIQ® Remote is that its electronics effectively extend the patent of the key indefinitely. The system cannot be copied, which means ASSA CLIQ® Remote provides a long-lasting access control solution.” “The audit capabilities of the system are also really useful, ensuring we know exactly who accessed a plant control room, and when. The system can be extended really easily as well, which has been another key reason why we continue to use ASSA CLIQ® Remote to meet our access control needs across the university.” “Ultimately, by working with a trusted manufacturer such as ASSA ABLOY, we can be safe in the knowledge that only authorized individuals can access the university’s plant control rooms.” Secure access control solution Sean Falkinder, National Sales Manager for ASSA CLIQ® Remote, adds: “We have provided a range of solutions for Loughborough University over the years, and the use of ASSA CLIQ® Remote for the university’s plant control rooms is just the latest success story. We’re delighted that the technology is able to provide such a safe and secure access control solution for the site.”
Staff safety and customer service will be boosted across Sydney’s rail network with the deployment of SafeZone®, the safety, security and emergency management solution from CriticalArc. The ground-breaking technology will enable Sydney Trains to manage a wide range of situations, including mitigating risks to staff and customers and strengthening the capacity to respond to incidents and emergencies across the network. For example, SafeZone will put up to 2,500 of Sydney Trains’ front-line staff directly in touch with security control room teams, letting them summon immediate assistance at the touch of a button. High safety standards The investment in SafeZone will cover over 175 stations across the greater Sydney area and is the latest step in a modernization drive to transform Sydney Trains’ operations, with more than a million customer journeys taken on the network every weekday. SafeZone enables staff to call for assistance and receive optimized response at the touch of a button, via their assigned smartphone. This capability is as valuable on crowded city platforms at rush-hour as it is on more remote suburban stations where staff may be working alone late at night. “Sydney Trains is committed to fulfilling our duty of care to all of our staff and enhancing our high safety standards in order to maintain and enrich customer service levels on station platforms,” explains Mark Edmonds, Manager of Security Capability, Network Operations. Real-time situational awareness Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events “Employing proven technology such as SafeZone will help us solve day-to-day challenges, further improving the safety of our staff and helping them work more effectively to continue to deliver world-class service.” Across its transportation network, Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events. This makes possible a wide range of security management functions, such as sending targeted alerts to specific individuals and groups. It enables control room operators to pinpoint the location of individuals needing help so they can initiate the most efficient and rapid emergency response. Primary safety concern “This visionary deployment by Sydney Trains will have a significant impact on the safety and wellbeing of staff and thus will produce dividends with regards to customer service and satisfaction, and the potential for streamlined operations moving forward,” says Glenn Farrant, CEO, CriticalArc. “With staff safety a primary concern for all rail operators internationally, implementation of this technology by Sydney Trains represents a significant step forward for the sector and will be the blueprint for many implementations to follow.”
Round table discussion
Cloud systems are among the fastest-growing segments of the physical security industry. The fortunes of integrators can improve when they embrace a recurring monthly revenue (RMR) model, and cloud systems are expanding the services and features manufacturers can provide, from remote diagnostics to simplified system design. But for all the success of cloud systems, there remains confusion in the market about the exact definition of “cloud.” Or does there? We asked this week’s Expert Panel Roundtable: What is “the cloud?” Is there agreement in the market about what the term means?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?