Remote video surveillance
Utility, Inc., (Utility Associates, Inc.) announced the United States Patent and Trademark Office issuance of patent 10,812,755 for additional BodyWorn camera technology. Patent for BodyWorn cameras The patent covers mounting a BodyWorn camera in a holster that is embedded inside a body armor vest, duty shirt, winter coat or other garment with the camera lens fastened and aligned to provide a clear field of view through an opening in the garment. Embedding the camera within an article of clot...
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enh...
It's a very common purchase for people to seek a smart security camera to remotely link them to their home while at work. Now the emphasis has shifted, with a lot more people working from home, business owners should consider a surveillance device to deter would-be thieves, protecting valuable equipment crucial for businesses to operate successfully. A robust security camera setup can aid existing security staff, and give business owners peace of mind out...
The new Wisenet TNV-8010C 5-megapixel corner mount camera has been built to make it impossible for a ligature to be tied around it, as well as very difficult for someone to rip it off a wall. Although primarily intended to assist police, prison and mental health institutions in preventing inmates and patients from self-harming within secure room environments, the vandal-resistant and water-proof TNV-8010C also offers a robust solution for other demanding applications, such as the monitoring of...
The COVID-19 pandemic has provided a double challenge to physical security systems integrators. For one thing, they have had to adapt their own businesses to survive and thrive during the pandemic. On the other hand, they have also been faced with new challenges to serve their customer’s changing needs. Global pandemic effects One integrator company, North American Video (NAV) took the now-familiar steps most companies confronted to adapt their business model to operations in a global pa...
Arcules, the globally renowned provider of unified, intelligent security-as-a-service solutions, has announced the addition of its new Edge Cloud solution to its platform, which will address the changing needs of an organization’s video surveillance and security data capture and storage. Arcules Edge Cloud solution With the introduction of the Arcules Edge Cloud solution, businesses now have the ability to store all video data locally to address low-bandwidth challenges and usage for the...
Claroty, the pioneer in operational technology (OT) security, announces new enhancements to the Claroty platform, making it the industry’s first OT security solution to offer remote incident management as a fully integrated capability that spans the entire incident lifecycle. The platform now enables cybersecurity teams to detect, investigate, and respond to security incidents on OT networks across the broadest attack surface area securely and seamlessly from any location. Standard operating environment IT and OT networks were already becoming more interconnected due to digital transformation, and the COVID-19-induced shift to remote work has accelerated their convergence even more. These combined forces have created an acutely expanded attack surface and volume of alerts for cybersecurity teams to manage. IT and OT networks were already becoming more interconnected due to digital transformation According to Gartner, “For those organizations whose cybersecurity operations capabilities are tuned to monitor events from their standard operating environment, the abrupt shift to a predominantly remote operating model could see events of cybersecurity interest being missed by the cybersecurity operations team. This will in large part be a result of the relocation of workers to new premises or to a remote working mode that suddenly expands the scope and complexity of the operating environment.” Variable work environment “Arming cybersecurity teams with the ability to detect, investigate, and respond to not only asset-based attacks, but also to identity-based attacks, is at the heart of the new enhancements to The Claroty Platform,” said Grant Geyer, Chief Product Officer of Claroty. “Our customers can now further evolve their OT security posture, strategy, and workflows for a variable work environment, while enduring adversarial activity and whatever else they might encounter on the network.” With its newly enhanced Secure Remote Access (SRA) 3.1 and Continuous Threat Detection (CTD) 4.2 components, The Claroty Platform now spans all three stages of the incident lifecycle. Remote user activity This reinforces the importance of quick detection and identification of unauthorized activities Detection: More than half of OT and IT security professionals say their organizations are now more of a target for cybercriminals since the pandemic began, according to Claroty’s recent survey report. This reinforces the importance of quick detection and identification of unauthorized activities. The Claroty Platform gives teams an early advantage with the ability to identify and differentiate authorized remote user activity from unauthorized ones that could impact process integrity. When users receive an alert from CTD, Claroty’s Wisdom of the Crowd capability utilizes information from similar events across Claroty’s customer base to provide context into the potential impact of the alert, enabling users to respond more effectively and efficiently. Demanding quicker identification Investigation: The increase in both teleworking and malicious activity demands quicker identification in a remote setting. Claroty’s enhanced platform arms SOC teams with full visibility into remote user activity, insight into how indicators detected on the network have manifested in other areas, the ability to investigate incidents from any location, and greater context around the business criticality and process values of assets involved in such incidents. This minimizes the need for onsite staff while optimizing investigations with enriched assets, including both live SRA sessions including full-length video recordings, as well as threat alerts with reputational context from the Claroty community. Expediting remedial activities 62% of IT and OT teams have found it more challenging to collaborate Response: Even as IT and OT networks have become more interconnected since the pandemic began, 62% of IT and OT teams have found it more challenging to collaborate. The Claroty Platform bridges this gap with its integrated interface and the ability to disconnect potentially harmful OT remote sessions, minimizing the need for onsite staff and expediting remedial activities. Integrations with ServiceNow and Swimlane enable teams to manage all IT and OT alerts from a single access point within the respective platforms. This allows organizations to adapt their OT incident response function and workflows for a remote or hybrid workforce. Greater operational resilience Collectively, these features allow teams to adapt their monitoring, inspection, and response management from on- or off-site premises without compromising efficiency or effectiveness. The result for the business is reduced exposure to risk and greater operational resilience. “Receiving vulnerability alerts in real-time is a must-have for our multinational mining, metals, and petroleum operations,” said Thomas Leen, VP Cybersecurity of BHP. “The Claroty Platform allows us to quickly identify which of our assets have led to vulnerabilities and prioritize the actions we need to take in order to reduce and eliminate potential risks to the business.”
GeoVision has announced the release of its GV-Decoder Box Ultra, a compact, easy-to-install video decoder that allows digital monitors to display live views from ONVIF IP cameras. GV-Decoder Box Ultra Optimized for decoding H265 and H264 video streams, GV-Decoder Box Ultra supports displaying 64 IP videos in sequence or in 4, 6, 8 and 9 matrix view. The security administrator can monitor live events, take snapshots when necessary, and pause a channel when any event or incident occurs. GV‐Joystick V2 can be installed to control speed dome cameras if needed. GeoVision Decoder Box Ultra offers a cost-effective way of displaying live videos on a screen without the need of a PC. Key features include: 4K UHD TV HDMI video decoder Decode up to 64 IP streaming Sequence view and Matrix 4/6/8/9 PTZ control with GV-Joystick V2 (optional) Auto-discover ONVIF IP camera Integrated GeoVision solutions Integrated in GeoVision solutions Together with GV-Mobile Server, GV-Decoder Box Ultra can display fish-eye image in Quad, 360° and Dual 180° views. The motion matrix feature also provides live view pop-ups upon motion events only. With GV-Control Center, live views from IP cameras can be projected through GV-Decoder Box Ultra directly onto a monitor. It is an ideal solution for assigning video channels to security posts with no PC.
The renowned intelligent video redaction tool, Pixelate by Ocucon, has been updated with a range of AI features that makes protecting members of the public in CCTV footage quicker and easier, while giving more control to the end-user. Pixelate 3 with auto-detection Pixelate 3 has introduced auto-detection and additional functionality, such as a zoom in/out ability, as well as improving on the existing ground-breaking features of this web-based software, including: GDPR compliance – Including auditable log of video redaction and UK processed data Intelligent automated redaction – Built on AI, this feature quickly blurs out individuals Suitable for all types of camera footage, including body-worn cameras Quick upload via easy-to-use web-based portal with new, updated user dashboard Significantly reduced redaction time compared to manual video redaction methods Intelligent video redaction service The update has come as the demand for subject access requests for CCTV footage is set to increase, with the general public’s awareness of GDPR laws continuing to rise. Any member of the public can request footage of themselves, however other individuals featured in the footage must be concealed, blurred, or pixelated to hide their identity. Whereas existing outsourced redaction services are time consuming and costly, Ocucon’s intelligent video redaction service allows users to quickly redact CCTV files via Pixelate’s secure web-based portal for a fraction of the cost, with monthly subscriptions starting from as little as £20 per month. Deploying AI technology Gary Trotter, Co-Founder and CEO of Ocucon said, “We are proud to launch this latest version of Pixelate. After listening to feedback from our clients, the team has worked tirelessly to create a smoother, quicker, and easier experience for users to redact people and sensitive information in CCTV footage.” Ocucon is currently delivering a number of confidential pilots for major supermarkets and retail chains He adds, “Pixelate truly is unique in its offering and Ocucon continues to research and develop AI technology that will only make GDPR compliance even easier and smarter in the future.” Cloud-based storage and retrieval platform Since its launch in 2018, Pixelate has redacted over 8,500 faces in 1,429 minutes of footage across 367 different videos. Customers who already use Ocucon’s powerful, cloud-based storage and retrieval platform also have full access to Ocucon Pixelate and can select video clips to redact from within the cloud. Recognized by top business awards for its digital technology innovation, Ocucon combines intelligent data analytics with the facility to store, analyze and retrieve unlimited amounts of HD video surveillance footage from within the Ocucon cloud-based portal. Since its launch, Ocucon has seen significant interest in both the UK and US, and is currently delivering a number of confidential pilots for major supermarkets and retail chains.
Honeywell announced the release of Pro-Watch® Integrated Security Suite, a software platform designed to help protect people and property, optimize productivity and ensure compliance with industry regulations. The platform provides complete visibility of all connected systems and the scalability of the software makes it easy to grow with the changing needs of a business. Pro-Watch Intelligent Command is a web-based user interface that provides organizations complete situational awareness of their security system to protect people, property and assets. The compliance-driven, enterprise security software platform combines access control, video surveillance, intrusion detection and other business critical functions into a single user interface to help to optimize productivity and reduce operational costs. Scaling enterprise security systems Pro-Watch Intelligent Command is a key element of the Pro-Watch Integrated Security Suite It allows end users to easily scale their enterprise security systems and is easy to deploy. Pro-Watch Intelligent Command is a key element of the Pro-Watch Integrated Security Suite. It can also help companies comply with new guidelines like social distancing and wearing masks to create healthier and safer building environments. “While security has always been important, to protect people, data or property, now more than ever it’s critical to have complete visibility into all systems to reduce risks,” said Rick Koscinski, Sales Director, Honeywell Commercial Security. “Pro-Watch Intelligent Command is a powerful, yet approachable, solution that brings all security elements together to help facilitate rapid decision making and mitigate risks.” Pro-Watch Intelligent Command simplifies system maintenance with remote, bulk camera firmware upgrade & password updates for cameras which in turn increases productivity by reducing operation costs and at the same time helps facilitate regulatory compliance. Enhanced compliance and cybersecurity Pro-Watch Intelligent Command also enables compliance with the most stringent industry regulations It includes end–to-end TLS 1.2 between video and access systems for enhanced Cyber compliance cybersecurity, as well as enhanced data privacy through anonymisation selective masking. Pro-Watch Intelligent Command also enables compliance with the most stringent industry regulations. It also enables operators to respond rapidly and effectively to alarms or incidents by providing an incident workflow package that allows Standard Operating Procedures (SOPs) to be configured, reducing both compliance exceptions and security risks. Features of Pro-Watch Intelligent Command Pro-Watch Intelligent Command is designed to support the complexities of a global, multi-site enterprise organization but is flexible enough to support a single building. Additional Pro-Watch Intelligent Command benefits: Meets business needs: Improves situational awareness for video and access systems in a unified interface. Monitors multiple devices: Enables users to load building, city or regional maps into the system, allowing users to access cameras and readers to see alerts and video footage. Incidents and associated workflows can also be configured in the system, allowing SOPs to be monitored. Generates valuable reports: Reduces costs by streamlining the generation of compliance and business intelligence reports. Mapping, alarms, workflows, dashboard reports, and auditing capabilities for the site’s security solutions are available from a single interface. Provides versatile tools: Features new and enhanced video analytics and management tools, providing high-quality evidence of compliance with regulations. Integrates with other systems: Integrates easily with third party systems to reduce costs and increase operational efficiency. Safety and Security Honeywell creates trusted, proven security solutions that protect and connect buildings, businesses and people. From access control, video surveillance and intrusion detection, the company offers robust, global integrated solutions for organizations to help protect staff and property, optimize productivity and comply with strict industry regulations all while reducing operational costs. Honeywell’s goal is to keep people and places safe through software and products that are created with a secure-by-design approach.
Interface Security Systems, a managed service provider delivering business security, managed network, and business intelligence solutions to distributed enterprises, announced it is now offering interactive remote video monitoring service with automated voice-down options to help its retail and restaurant customers promote social distancing and mask-wearing guidelines on their premises. A growing number of retailers and restaurants are reporting increased incidents of agitated customers and in-store violence during this health crisis. The physical distancing measures introduced in stores and restaurants, limits on the number of customers allowed inside, the mandatory wearing of masks, and restrictions on some products to reduce panic buying, have contributed to an increase in retail worker abuse. Live video and two-way audio With automated voice down messages, businesses can make public announcements to remind customers and employees about proper social distancing and mask-wearing guidelines. The messages are scheduled throughout the day and play through an organization’s existing audio system. Each message can be customized to directly address the principal challenge of the moment. When store or restaurant associates witness patrons not following health and safety guidelines, they also have the option to simply press a button and have a trained security professional intervene via live video and two-way audio from one of Interface Security Systems’ Five Diamond rated Command & Control Centers. Interactive remote video monitoring solution “Many of our customers have asked us to help them audit and assist with social distancing and health policy enforcement in their stores to remove some of the pressure on their associates. Our interactive remote monitoring technology enables us to safely enforce these policies and proactively avoid disputes,” said Brent Duncan, Chief Revenue Officer at Interface Security Systems. The Voice Down aspect of an interactive remote video monitoring solution is also a strong deterrent to both internal and external crime as employees and customers are clearly made aware of a security presence either during scheduled or random announcements.
Installations around the world by Ultimate Visual Solutions (UVS) have completed more than one million hours of uninterrupted operation since COVID-19 lockdown began in March. The security video wall technology experts currently have almost 250 installations in 18 countries, ranging from the UK and US to Vietnam and Tanzania. UVS Managing Director Steve Murphy said all the sites had operated continuously since lockdown began in March. The company, based in Burney, launched a full suite of remote service access and online demonstration services to help clients during the coronavirus outbreak. Video wall technology Murphy added: “The services are designed to provide peace of mind and support for key operational video wall technology but the reliability of our installs has meant there have been no major issues. As part of our customer service, we have also dealt with a number of service queries for example, one client had an issue with a Windows update. These were all efficiently dealt with by either phone support or via remote connection support and in one case a short onsite visit.” Remote services The suite of remote services offered by UVS includes: Remote diagnostics and remote maintenance for UVS video wall technology which can offer quick analysis and resolution for most issues UVS engineers using remote connection software, which is fully encrypted and which the client has control over, to carry out maintenance For sites where the video wall controller does not normally have an internet connection, UVS is offering to supply a 4G data dongle as part of the contract (managed and paid for by UVS) to allow clients to give internet access as required Assisting clients with reduced cost annual maintenance contracts A live online demonstration facility to provide full video wall technology evaluations for partners and their clients who are in lockdown or self-isolation Technology which visitors can see in operation includes video wall solutions, displays, video wall controllers, control software, integrated VMS (video management systems for security applications) AV over IP and KVM remote access options. Audio visual solutions UVS, which has its headquarters at Business First Burnley Business Center, provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. It is led by four senior colleagues who, between them, have more than 70 years’ combined Audio Visual, Control Room and Visual Solutions experience. It has also opened a new London demonstration venue at Woburn Place, a short walk from Euston Station, to cope with increased demand for its technology.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
By now your organization should know the drill. To keep your enterprise safe from unauthorized access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vulnerabilities that require immediate and constant attention to stay safe in a hostile security world. Protect Against Burst Attacks You may be aware of DDoS, or distributed denial of service attacks. In fact, Cisco writes that these online attacks — where high-volume traffic floods a system’s servers, making web traffic extremely slow — grew 172% in 2016. But in the last few years, Cisco documents how "burst attacks", a type of DDoS attack that floods traffic in short bursts at random times over a prolonged period, has skyrocketed. They claim that in one study, 42% of the companies faced a burst attack in 2017. Burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack According to Radware, on-premises DDoS protection needs to adapt to counter these often less than one-minute attacks. While the majority of these solutions detect burst attacks, they write that "most of them limit the rate of bad (and legitimate) traffic to a certain threshold, resulting in a high level of false positives." One big challenge is burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack. They recommend adopting two key solutions: 1) a behavioral DDoS protection system that utilizes machine learning algorithms to identify the patterns of burst attacks, and 2) measuring the degree-of-attack (DoA) surface, which looks at the bandwidth or rate of a specific type of traffic and the percentage of a given type of traffic out of the entire distribution of traffic. If an attack rates high in both the bandwidth and percentage parameters, then it gets a high DoA surface score, showing that a burst attack likely occurred. Prioritise Network Infrastructure Nefarious actors have been exploiting both enterprise level and small/home office and residential routers For companies with in-house information technology staff, network infrastructure usually gets plenty of attention. Proper configuration, maintenance and security are often key considerations for infrastructure due to its importance to the business. What about smaller entities? Do you have a small switch or router you either purchased or leased from your internet service provider? If so, when was the last time you updated it? In Alert TA18-106A, the United States Computer Emergency Response Team (US-CERT) shares information dating all the way back to 2015 on how nefarious actors have been exploiting both enterprise level and small office/home office and residential routers and switches. If you haven’t changed passwords and updated the software/firmware on these devices yet it should be near the top of your priority list. Hide Sensitive Web Pages From Search Engines Search engines are an easy first step for someone looking to exploit your environment. They can conduct searches of your known web presence, looking for pages which might not have been meant for the general public but are still accessible. Using robots.txt pages can be excluded from search engine crawlers. Entrepreneur.com suggests checking out a tutorial from SEObook.com to learn more about how you can do this. Keep in mind this will only deter the most basic attackers as more sophisticated attackers will conduct manual searches. Update Passwords On Your IoT Devices Data at rest is important, but data in transit is just as important to encrypt, particularly sensitive information It is shocking how many IoT devices are used in our daily lives, such as security and video conference cameras, cars, and smart sensors, but also contraptions you probably forgot are now connected to the internet, such as garage doors, appliances, etc. Tom’s Guide gives a good list of the many things you should remember to update. Use Encryption To Protect Data In Transit Encryption your data at rest – when it is stored somewhere – is incredibly important. However, your encryption efforts should not stop there. Data in transit is just as important to encrypt, particularly sensitive information. This could include communication between your websites and applications or even just communications within your company. Unencrypted information is at risk to an eavesdropper on your network. To prevent the data from being usable to potential eavesdroppers, ensure you are using encrypted connections such as HTTPS, SSL, TLS, FTPS, etc.
From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs And Autonomous Systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies being used for security and safety benefits is progressing at a rapid pace. Let’s look at some of the exhibitors in the 2019 Unmanned Security Expo: Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations. Indoor environments, which are confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response Compact Surveillance Radar (CSR) System SpotterRF provides the world’s most advanced compact surveillance radar (CSR) system for affordable wide-area, all-weather perimeter security and small force protection. Incorporated in 2009, the company attained profitability quickly and is ahead of forecasts. Dedrone has remained at the front of the issue of drone threats, integrating installations to military bases, stadiums, public events, and private individuals. The company has expanded its operations to include a new office in Washington, D.C, and has continued to upgrade its DroneTracker software. DroneTracker is the industry’s first airspace security solution that includes automated summary reporting for instant diagnosis of drone airspace activity. Airspace Security And Drone Tracker Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider. Founded in 2007 in Israel, Magos first specialized in advanced radar solutions for the military and defense markets. In 2015, Magos’ technology was declassified, allowing the company to focus on developing best-in-class systems for the commercial security market. Today, Magos radars are used in over 30 countries in critical infrastructure, data centers, electric utility sub stations, and oil refineries as well as in other commercial verticals like vineyards and car lots. Now, Magos is positioned to see increased adoption of its solutions in the U.S. Patriot One Technologies Inc. develops solutions to detect concealed weapons, utilizing novel radar technologies. Their innovative radar technology provides first responders and security personnel valuable time in active threat scenarios. The technology offers stand-off detection of concealed threats typically employed in public locations. These are just a few of the exhibitors in the Unmanned Security Expo. They represent technologies that will help to shape the future of the security marketplace.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow drones to fly autonomously, using global positioning systems (GPS), vision sensors and algorithms to constantly analyze what the drone “sees” through an on-board camera. The system can work with any camera that provides an adequate image for real-time vision algorithms. Perimeter Security At ASIS Tyco Integrated Security invited Percepto to display its technology in the large integrator’s booth at ASIS. “It was the first show where we targeted perimeter security,” says Ariel Avitan, Percepto’s Chief Commercial Officer. “Tyco took us under their wing. We had about 100 conversations at the show. After about 10 minutes everyone understands the business logic behind the solution. You have to talk to the end users to understand that your concept is validated.” Percepto is in the contractingphase with TycoIS and alsohas a number of other pilotprojects, including energycompanies in Europe TycoIS is also working with Percepto on several pilot projects to demonstrate and fine-tune the technology. Percepto is in the contracting phase with TycoIS and also has a number of other pilot projects, including energy companies in Europe. “Our challenge is robustness,” says Avitan. “The technology is trustworthy. We just need to make sure the system is. And the industry needs to identify applications where we can provide more value.” Autonomous Drone Performance Percepto’s products include a hardware base station to control the drones, and the PerceptoCore module is installed on board the drone to allow it to interface with the base station. The core is pre-loaded with multiple task applications that enable the drone to perform tasks relevant to its purpose – autonomously. The “core” can be installed on almost any size or type of drone, whatever the manufacturer. In addition, Percepto provides an interface that integrates with existing systems in the security department’s control room. Cloud management software enables remote access and management of multiple drones. The software collects, analyses and presents data, while streaming live video on an ongoing basis. Perimeter security is just one application where drones will be deployed in the near future. Having a drone stationed on-site, charged and protected by its hub, enables fast reaction to any need in the field, day or night. Additional sensors and other equipment can be added to drones to detect gas leaks, thermal energy, or smoke, and even to provide life safety capabilities. Lighted drones with voice messaging could be used to direct employees or the public to the best exit route in case of a mass evacuation. 24/7 Perimeter Security Using drones to patrol 24/7 addresses the needs of perimeter security. Adding more sensors and providing additional data to operators helps expand the system’s utility and increase return on investment (ROI), says Avitan. “These applications are a tremendous benefit for security,” he says. “We actually find that adding safety and inspection applications is a good way to increase security. When you have a drone that knows how to provide ROI, it saves tons of money. It’s always about security, but above that we want to add value and increase ROI.” In addition to perimetersecurity, drones will soonbe used to inspect thethousands of solar panelsat solar energy sites In addition to perimeter security, drones will soon be used to inspect the thousands of solar panels at solar energy sites. Drones with cameras can detect the presence of dust or other factors that lower solar-panel efficiency, or cracks or malfunction of the actual panels. Thermal imaging on board a drone can detect which panels are under-performing. Drones could also be used to provide alerts if a transformer or cabling overheats in a power plant or critical infrastructure application. Restrictions On Drones The U.S. Federal Aviation Commission is evolving its position on autonomous drones. Drones are restricted from populated areas, can only fly at certain altitudes, and must be equipped with lights if flying at night. Currently, applications require that there be an unmanned autonomous vehicle (UAV) pilot on site, maintaining “line of sight” with the drone, who can take control if needed. However, the requirement for the UAV license has been lowered to allow certification with an online course. There have also been some exemptions granted for the line-of-sight requirement (e.g., railroad inspections). “We include control mechanisms now to be compliant, and when the barriers come down, we are ready for that,” says Avitan. Many global jurisdictions are following the FAA’s lead, although some countries do not regulate drone traffic. Avitan says he expects regulators to allow drones to fly autonomously beyond line of sight in specific closed facilities in the next 12 months. Based on the pilot projects, Percepto will fine-tune the system, streamline manufacturing and launch a fully commercialized system by Q1 2017. Avitan expects to have up to 100 units deployed in 2017, and up to 1,000 units deployed in the next 18 to 24 months. Like I said: Sooner than you think.
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defense system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor center. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
Interface Security Systems, a pioneering managed services provider that delivers managed network, business security and business intelligence solutions to distributed enterprises, recently provided Thrive Restaurant Group, one of Applebee’s largest franchisees in the US, with scalable network, communications and security services. Business security systems platform The new solutions include a next-generation secure SD-WAN architecture with network upgrades, 4G/LTE wireless capability, unified communications as service (UCaaS) with cloud-based VoIP and a secure and standardized business security systems platform. As a significant update to Thrive’s outdated legacy systems, the new Interface solution unclogs productivity bottlenecks and gives the flexibility the restaurant chain needs to address changing customer preferences. Managing multiple network and voice providers We needed a partner we could count on to manage our network, voice, and security for all locations" With 81 restaurants across the United States, Thrive found itself struggling with challenges common to many geographically distributed businesses, including managing multiple network and voice providers, dealing with outdated CCTV hardware, and a lack of accountability from vendors. “With 81 restaurants across ten states, we needed a partner we could count on to manage our network, voice, and security for all locations,” explains Brian Houchin, Director of IT for Thrive Restaurant Group. Troubleshooting technical issues When it came to managing vendors, Thrive simply had too many. Troubleshooting technical issues was challenging as it was difficult to pin accountability on a specific vendor. In addition, tracking invoices, service credits and administering multiple vendors was an inefficient and time-consuming exercise every month. Outdated hardware and changing regulations also posed a challenge. Unreliable CCTV equipment left the restaurants, employees and customers vulnerable to security risks on-premises. Constantly evolving Payment Card Industry (PCI) compliance rules meant Brian Houchin had to devote hours of his limited bandwidth to keep up with the latest changes and updates, so that Thrive could avoid major penalties and security threats. With the COVID-19 pandemic significantly disrupting Thrive’s business, restaurant staff found it challenging to handle sudden spikes in call volumes, as they had to work with a legacy phone system that was not scalable. The lack of 4G wireless coverage, outside of the restaurant premises made curbside pickup and take-out services impossible to manage. Secure, scalable network and communications Thrive turned to Interface to implement a secure, scalable network and communications backbone that would unclog the productivity bottlenecks and give the flexibility the restaurant chain needed to cater to changing customer needs. Interface implemented a next-generation secure SD-WAN architecture with network upgrades to guarantee seamless connectivity between all of Thrive’s locations. To deliver a better guest experience for customers calling in with their orders and enabling curbside pickup and payment, Interface rolled out a 4G/LTE wireless network that also doubled up as a backup when the primary network failed. UCaas with cloud-based VoIP implemented With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance. Interface also implemented unified communications as service (UCaaS) with cloud-based VoIP and auto-attendant features for Thrive’s locations to seamlessly route high volumes of customer calls to their dedicated order center. “We wanted to take the call-in experience out of the individual restaurants and put it into the hands of professionals who weren’t in a hurry to get off the phone,” explains Brian Houchin, adding “The VoIP service from Interface lets us take additional orders, dramatically improving our customer experience and increasing revenue.” Deploying secure video surveillance platform To solve the limitations of Thrive’s legacy CCTV infrastructure, Interface delivered a secure video surveillance platform with easy remote viewing from any location and simplified access management to boost restaurant security. Thrive’s partnership with Interface has allowed the restaurant group to focus more on their growth strategy and long-term plans. By consolidating their SD-WAN, UCaaS, CCTV and 4G/LTE services with Interface, Thrive gets real accountability without having to deal with the vendor run-around. Perhaps the greatest advantage is Thrive’s ability to aggressively expand, confident that Interface’s 24/7 managed services will always be ready to support their growth. “We’ve had a chance to test out multiple vendors for network, communications and business security and Interface definitely has provided us the best experience,” concludes Houchin.
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organization is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Center helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Center, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organization to support customers by optimizing spend, mitigating risk and enhancing their security programs. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritize technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Center are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organization’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Center near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Center, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Center (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Center (RTCC) The Real Time Crime Center (RTCC) already uses Security Center to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Center’s IT department also set up an event-to-action rule in the Security Center platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Center, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Center (RTCC). Bill adds, “We love working with the Genetec Security Center security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
When talking about penguins, people normally think of snowy Antarctica. However, many would be surprised to know that Africa is also home to penguin families. The African penguin is a unique species that has been classified endangered from a population of over a million in the 1920s to only 13,300 breeding pairs left in South Africa currently and could be extinct in the wild by 2030. Saving African penguins Historical factors of guano scraping for agricultural fertilizer destroyed the African penguins’ breeding habitat, leading to predation during the crucial fledgling stage. An estimated 13 million-plus penguin eggs were harvested as a delicacy that caused the initial crash in numbers. In addition, the African penguin also faces issues of predation by gulls/seals/sharks, oiling, marine pollution, and a lack of fish due to overfishing in their crucial hunting grounds. Hikvision and DICT partner to protect African penguins At the initial phase of the conservation project, Hikvision cameras and solution were deployed at APSS Since 2006, the Dyer Island Conservation Trust (DICT) has been rescuing birds and providing nests to help them during the fledgling stage, which improves the breeding success. In 2015, DICT opened the African Penguin and Seabird Sanctuary (APSS) with a fully equipped lab and the vet on standby. Now, Hikvision has partnered with DICT to protect the African penguin. At the initial phase of the conservation project, Hikvision cameras and solution were deployed at APSS, which makes it possible for the public to view the feeding and rehabilitation process, and bring the conservation message of the African penguin to a wider audience. Hikvision cameras installed at APSS “We have always wanted to share the daily work we do at the APSS with a larger audience. Through the use of cameras, this will be possible. The planning of this project started in 2019. At the time, little did we know that the lockdown caused by the epidemic would prohibit visitors from temporarily viewing the penguins. So being able to view the penguins from one’s home will mean we don’t have to forget about our feathered friends,” said Wilfred Chivell, the Founder of DICT. Ping Yu, Cape Town Branch Manager of Hikvision South Africa, elaborated on the partnership, stating “Hikvision is committed to using technology for good. We are very pleased to be able to support the efforts of APSS’s critical conservation work.” PTZ cameras for non-invasive wildlife observation Hikvision’s cameras have the latest technology that provides multiple views and high-quality images Hikvision’s cameras have the latest technology that provides multiple views and high-quality images. The pan-tilt-zoom functions of Hikvision products are ideal for non-invasive wildlife observation, part of the efforts to ensure future breeding populations. In the next phase of the project, DICT plans to deploy Hikvision cameras on Dyer Island, once a thriving colony that had 25,000 breeding pairs of the African penguins in the 1970s. They are now less than 1,500 pairs left. Deploying Hikvision cameras on Dyer Island Due to the sensitive nature of the island, it is not open for the public, but with the use of Hikvision cameras, people can observe the penguins as they interact in their natural habitat. This will help with scientific monitoring and bring the island to the general public, and the video technology and solution provided by Hikvision are expected to improve the conservation work from a few other aspects: It can help to evaluate the nesting and breeding on Dyer Island. It is an innovative method to identify possible injured or compromised birds without causing unnecessary disturbance to breeding birds. The staff and volunteers can immediately treat any birds, thereby increasing their survival rate. It is a useful tool for island rangers to spot trespassers on the island. Hikvision is committed to exploring how innovative technology can secure the sustainability and biodiversity of the world.
With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network during a time of social distancing. IT professionals can quickly review the cyber posture data in case of a cyber-breach. Razberi Monitor™ provides secure, remote visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Remote monitoring The tool simplifies the monitoring and support of a multi-site enterprise security system, predicts and prevents problems for security professionals while providing a centralized view that benefits both IT and Physical Security departments. We have listened to the surveillance industry and created our software platform to enhance relationships" According to Tom Galvin, Chief Product Officer, Razberi Technologies, "We have listened to the surveillance industry and created our software platform to enhance relationships and align Physical Security and IT departments. Razberi Monitor allows security professionals to be proactive by predicting problems." Aligning network and surveillance departments Razberi Monitor's software platform, paired with Razberi's video recording and switch appliances, has enabled Tropical Shipping to save on the cost of sending maintenance crews to check on potential issues in their US and Caribbean facilities. "Our network is highly distributed across the US and Caribbean with up to 125 users viewing camera feeds at one time. Razberi Monitor has helped us increase our camera uptime assurance and align our network and surveillance departments," said Chad Nelson, Director of Security, Facilities and Cargo Compliance, Tropical Shipping. "They now have a clear view of all operations, and it puts me in the driver's seat to be able to provide specific alerts to each port remotely, quickly and more efficiently than sending a tech to troubleshoot."
Round table discussion
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
Once again, ISC West has come and gone. The show continues to please exhibitors and attendees. Reviews are generally glowing and enthusiastic. For all its successes, however, there is a certain repetition from year to year – a lot of the same players, the same technology trends (not to mention the same venue every year, but who doesn’t like Vegas?) But even among the repetition, there is usually at least one element that is surprising. Perhaps it’s the unexpected elements that keep us all coming back. We asked this week’s Expert Panel Roundtable: What surprised you most at ISC West in 2017?