Research & Testing
VMware, Inc. unveiled expanded cloud workload protection capabilities to deliver security for containers and Kubernetes. The new solution will help increase visibility, enable compliance and enhance security for containerized applications from build to production in the public cloud and on-premises environments. Comprehensive cloud platform “Containers and Kubernetes are enabling organizations to develop and modernize applications faster than ever, but the innovation is also expanding t...
Globally renowned sensor solutions specialist, HENSOLDT has successfully passed the Factory Acceptance Test of its new airborne multi-mission surveillance radar, PrecISR. In an online demonstration conducted, the PrecISR 1000 airborne multi-mission surveillance radar proved its capabilities to the customer, QinetiQ GmbH, an international provider of airborne special missions operations, based out of Möchengladbach, in Germany. PrecISR 1000 airborne multi-mission surveillance radar The ra...
Energy is the pulse of day-to-day life, but the drive for net zero will require a massive change in the way one creates and use it. With new technologies and complex integration needed, it is increasingly clear that there is one important factor in making the future integrated energy systems work: data. That is the thinking behind the 14 January All-Energy/Dcarbonise webinar sponsored by UK Research and Innovation (UKRI) and chaired by Laura Sandys CBE, Chair of the Government’s Energy D...
Acronis, a globally renowned company in cyber protection and data security solutions, has announced an update of its Acronis True Image 2021 that incorporates a professional-grade vulnerability assessment tool into the personal cyber protection solution. Scanning operating systems and applications Individuals and home office users can now scan their operating systems and applications for exploitable vulnerabilities and get recommendations on effectively closing those security gaps. Users can...
CRITICALSTART, a cybersecurity provider of Managed Detection and Response (MDR) services, announces it is now providing enhanced security services to all of Arkansas' public colleges and universities by partnering with the Arkansas Research and Educational Optical Network (ARE-ON). ARE-ON is a member of the Quilt, a non-profit national coalition comprised of 38 of the country's most advanced regional research and education institutions. ARE-ON and its members comprise a community of thought lea...
A substantial focus of the security industry is on the selection and installation of security systems, and there is no doubt that this is a critical element of the process. However, in order to ensure that security systems such as access control, video surveillance, intrusion detection and panic alarms deliver on ‘game day’, an equal if not greater emphasis has to be put on the actions that are taken after the installers have closed the doors on the truck and driven away. This arti...
Leonardo has chosen Atos, a globally renowned company in digital transformation, cloud and cyber security solutions, as the technological partner for the development of the supercomputer that will be installed in Genoa, in one of the six Italian Leonardo Labs, the Group’s new laboratories dedicated to advanced research and technological innovation. Supercomputer for Genoa Lab “The supercomputer that we are developing in Genoa will significantly strengthen both the Company’s capabilities and on a national scale in supercomputing, Big Data, and autonomous and intelligent systems” said Alessandro Profumo, Chief Executive Officer (CEO) of Leonardo. Alessandro adds, “This project will contribute significantly to the positioning of Italy among the top five nations in the world of computing capabilities in the sectors of public and industrial research.” Atos-integrated computer center The new computer center, integrated by Atos, will be one of the first in Europe, and the first in Italy, to be equipped with the latest generation NVidia A100 accelerators. The supercomputer will count on a battery of over one hundred supercomputing units, for a total computing power greater than 5PFlops (5 million billion floating point operations per second), connected by a high-performance network and a storage system equipped with the latest hardware and software technologies, for a storage capacity of the order of 20Pbytes (20 million Gigabytes). Collaboration on quantum computing research projects Leonardo and Atos will also be able to collaborate on further research projects related to quantum computing Leonardo and Atos will also be able to collaborate on further research projects related to quantum computing. Leonardo’s supercomputer, developed together with Atos, will be the nerve center of the Genoese headquarters of Leonardo Labs, the new corporate research and development laboratories dedicated to innovation in Leonardo’s traditional sectors and to the development of new technologies in the longer term. The Labs are being built in the proximity of Leonardo’s main industrial sites in Italy and abroad with the aim of facilitating technology transfer and maximizing the benefits for the surrounding territories, and strengthening collaboration with local institutions. Leonardo Labs in Italy Leonardo has recently launched its international recruitment call for 68 young and talented people for Leonardo Labs, who will join in six specific research areas (Artificial Intelligence and Autonomous Intelligent System, Big Data Analytics, High Performance Computing, Electrification of Aeronautical Platforms, Materials and Structures and Quantum Technologies) and which will be part of the teams that are being set up in the six Labs sites, present, in addition to Genoa, and in the areas of Milan, Turin, Rome, Naples and Taranto in Italy. The new laboratories will also allow a continuous flow of talent to ensure flexibility and renewal, both of skills and professional abilities, on the basis of an internationally adopted model by which young international external researchers will work together with experts and researchers across Leonardo’s Divisions.
Telaeris, a handheld badge verification and emergency mustering solutions provider for physical access control systems (PACS), has announced its XPressEntry software integration with Maxxess eFusion access control software. XPressEntry - eFusion integration Maxxess access control customers can now use a variety of XPressEntry compatible handheld badge readers to quickly muster employees during an emergency evacuation, verify identity, perform medical screenings at entry points, record entries and exits where door readers are not practical, and much more. “We welcome Maxxess and their powerful eFusion software to the family of XPressEntry access control integrations,” said Dr. David Carta, Chief Executive Officer, Telaeris. He adds, “Securing commercial and government facilities are important work, especially in these new COVID-19 times. The added functionality and flexibility plus Coronavirus screening that XPressEntry bring is helpful for safety and security professionals around the world.” Remote reader solution for secure verification Nancy Islas, Maxxess Systems President, said, “We are excited to offer our customers a robust remote reader solution for day to day secure verification of access control as well as advanced mustering applications for managing emergency situations.” The Telaeris integration enhances the Maxxess emergency management and coordination system" She adds, “The Telaeris integration enhances the Maxxess emergency management and coordination system and allows our customers to easily verify personnel anywhere in their building or on campus.” XPressEntry badge verification solution XPressEntry’s badge verification solution with commercial grade handheld badge readers is now able to be connected to the Maxxess eFusion system. XPressEntry maintains updated facility occupancy information and can quickly verify personnel and visitor badge information including name, photo ID, and permissions against the Maxxess eFusion database from anywhere with cellular and Wi-Fi connectivity. Emergency evacuation and employee mustering solution It also delivers an emergency evacuation and employee mustering solution, verifying that personnel and visitors are accounted for and safely evacuated during emergency situations. In addition, XPressEntry now supports validating personnel and visitor health status information before entering work areas to support COVID19 workplace safety protocols. XPressEntry is globally renowned for handheld badge verification with integrations to most access control systems now, including Maxxess eFusion. XPressEntry handhelds proudly read more badge technologies than any other handheld in the industry including iClass, Prox, Indala, DESFire, Mifare, and PIV and can simultaneously poll for both HF and LF credentials. XPressEntry has also been penetration tested and certified as secure using appropriate security protocols and encryption.
Klaus P. Hruschka, Head of Technology Sales at sensor specialist HENSOLDT, has been appointed to the board of trustees of the Fraunhofer Institute FKIE (Fraunhofer Institute for Communication, Information Processing and Ergonomics) in Bonn-Wachtberg. As a renowned institute for application oriented research and practical innovation in information and communication technology, the FKIE works in close cooperation with strategic partners on the entire processing chain of data and information. The board of trustees of the Fraunhofer FKIE meets once a year and advises the institute management on the technical orientation and structural changes of the institute. Member of Expert Group For years, HENSOLDT has not only been working with the FKIE on a basis of trust, but also with other Fraunhofer Institutes such as the Fraunhofer Institute for High Frequency Physics and Radar Technology (FHR) and the Fraunhofer Institute for Optronics, Systems Engineering and Image Exploitation (IOSB), as well as the German Aerospace Center (DLR). Klaus Hruschka is also Chairman of the Security Committee of the German Federal Association of Security and Defense Industries (BDSV), a member of the Expert Group on ‘Innovation Gain’ and an active member of the R&T Committee. He is also a member of the Board of Trustees of the Carl Cranz Society.
Bugcrowd, the crowdsourced security company, released its 2020 Inside the Mind of a Hacker report, the study to date on the global hacking community. Among the report’s key findings, human ingenuity supported by actionable intelligence of the Bugcrowd platform were found to be critical ingredients to maintaining a resilient infrastructure. AI-powered solutions not enough In fact, 78% of hackers indicated AI-powered cybersecurity solutions alone aren’t enough to outmaneuver cyber attacks over the next decade. Nearly nine out of 10 hackers, 87%, say that scanners cannot find as many critical or unknown assets as humans. Hackers can adapt four to five low-impact bugs to exploit a single high-impact attack While 2019 was a record year for data breaches, the report found that hackers working on the Bugcrowd platform prevented $8.9B of cybercrime in 2019 and earned 38% more than they did in the previous period. In the next few years, hackers on the Bugcrowd platform are projected to prevent more than $55 billion in cybercrime for organisations worldwide. “Globally-distributed good-faith hackers are increasing in number and diversifying. Bugcrowd gives organisations the power to proactively leverage human ingenuity – the enabler of malicious cyberattacks – at-scale to prevent them,” said Casey Ellis, founder, chairman, and CTO of Bugcrowd. “While AI has a role to play in helping to reduce cyber risk, companies need to integrate crowdsourced security throughout their security lifecycle if they hope to outsmart and outmanoeuvre cybercriminals.” Limitations of machine intelligence Hacking as a profession is lucrative and highly attractive to young people “Hackers will always be one step ahead of AI when it comes to cybersecurity because humans are not confined by the logical limitations of machine intelligence,” said Jasmin Landry, Bugcrowd hacker. “For example, hackers can adapt four to five low-impact bugs to exploit a single high-impact attack vector that AI would likely miss without the creative flexibility of human decision-making. Experience allows hackers to recognize vulnerable misconfigurations that represent a true risk to organizations without all of the false positives that typically come with AI-powered solutions.” Nearly half of neurodiverse hackers (6%) experience Attention-Deficit/Hyperactivity Disorder (AD/HD) The Inside the Mind of a Hacker report analyzes 3,493 survey responses from working hackers, plus hacking activity on the Bugcrowd Platform between May 1, 2019 and April 30, 2020. In addition, the report incorporates data from 1,549 programs and 7.7 million platform interactions to provide a striking and in-depth view of emerging trends among Bug Bounty, Penetration Testing, Attack Surface Management, and Vulnerability Disclosure Programs. Younger and neurologically diverse hackers Hacking as a profession is lucrative and highly attractive to young people, with 53% of hackers under the age of 24. Remarkably, the report uncovered that 13% of hackers are neurodiverse and possess neurological advantages that help them provide extraordinary depth and dimension in security testing. Research found that hackers live on six continents and reside in more than 100 countries worldwide These unique strengths include exceptional memory skills, heightened perception, a precise eye for detail, and an enhanced understanding of systems. Nearly half of neurodiverse hackers (6%) experience Attention-Deficit/Hyperactivity Disorder (AD/HD) and thrive in environments of rapid change, such as security research, where creativity and out-of-the-box thinking are rewarded generously. Career Hacking in Emerging Countries Skyrockets The research found that hackers live on six continents and reside in more than 100 countries worldwide. Most notably, the report identified an 83% growth in respondents living in India and nearly three out of four hackers (73%) speak two or more languages. 93% of hackers primarily hack out of care for the well-being of the organisations with which they work Bugcrowd uncovered a growing social responsibility trend among businesses and hackers. 93% of hackers primarily hack out of care for the well-being of the organizations with which they work. Additionally, organizations made five-times the number of coordinated disclosures in the last twelve months. “The exponential growth of these disclosures highlights the value of transparency to stakeholders and demonstrates organisations are taking social responsibility more seriously than ever,” said Ellis. COVID-19 pandemic Increasing demand for career hackers The FBI reported a 400% rise in cybercrime after COVID-19 was declared a pandemic and organizations are investing more in bug bounty programs as a result. More than half of hackers (61%) have noticed an increase in available bug bounty programs to participate in due to widespread remote working conditions related to the COVID-19. Hackers (48%) believe the Healthcare industry is vulnerable to cybercrime during the unfolding crisis “We are in unprecedented territory – and COVID-19 has forced many businesses to accelerate digital transformation efforts,” said Ashish Gupta, CEO and president of Bugcrowd. “The rush to digitize businesses can create serious lapses in security and organizations are turning to bug bounty programs to proactively safeguard new products and applications against vulnerabilities.” Alternative polling methods not favored by hackers Like the larger security industry, career hackers also noted concerns about COVID-related fraud. Nearly half of hackers (48%) believe the Healthcare industry is vulnerable to cybercrime during the unfolding crisis, followed by Education and Community Support (17%) and Government and Military (16%). Additionally, as the government faces the potential impact of COVID-19 on the upcoming 2020 US Presidential election, 72% of hackers independently reported that they do not trust alternative polling methods, like electronic polling or mail-in ballots.
Digital Guardian announced that it has released a new research report, The DG Data Trends Report, which assesses the risk of sensitive data loss during the COVID-19 crisis. The research is based on aggregated and anonymized data from nearly 200 customers of Digital Guardian’s Managed Security Program around the globe. It represents a wide range of organization sizes and industries, including financial services, manufacturing, healthcare, and business services. As they continue to work from home, employees from these companies regularly interact with regulated and structured data as well as unstructured intellectual property and trade secrets. The data set analyzed was from January 1 – April 15, 2020 and comparative data was evaluated from January 1 – February 29, 2020 (before the global onset on COVID-19) vs. March 1 – April 15, 2020 (after the COVID-19 pandemic came to the forefront). Sensitive data loss This enabled Digital Guardian to compare data egress patterns before and after the work from home transition took place and gauge its impact on the risk of sensitive data loss, now and in the future. Key Findings: There was a 123% increase in the volume of data downloaded to USB devices by employees after the pandemic declaration and working from home became widespread. 74% of that data had been classified by organization data governance policies. Cloud storage and USB devices became the most preferred egress paths after the COVID-19 emergency declaration, accounting for 89% of all data egressed. Data egress via all paths (email, cloud, USB, etc.) was 80% higher in the first month following WHO’s COVID-19 pandemic declaration. More than 50% of the data egressed was classified. From March 11 - April 15, employees uploaded 336 TB of data to the cloud, a 72% increase from January and February combined. After the WHO’s declaration, Digital Guardian’s Managed Detection & Response analysts also saw a 62% increase in malicious activity from external attackers, a number that corresponded to a 54% increase in incident response investigations required. USB device usage Our research indicates remote employees are egressing classified data at unprecedented rates" IT and security professionals should pay particular attention to the significant uptick in USB device usage as they inherently increase the risk of sensitive data loss due to their portability and likelihood of being misplaced, lost or stolen. “Organizations have accepted that the economic and health effects of COVID-19 will be with them for the foreseeable future and working from home will remain a requirement for many of their employees,” said Tim Bandos, VP, Cybersecurity, Digital Guardian. Data security enforcement “Our research indicates remote employees are egressing classified data at unprecedented rates across all egress paths. Executives and security teams would be wise to consider implementing solutions that provide visibility into this behavior, and a means to control it, in order to avoid a potential data breach.” The DG Data Trends Report contains more in-depth information, including statistics on additional data egress channels and points of risk that were monitored, a primer on data security enforcement actions, examples of COVID-19 phishing attacks, as well as recommendations to protect remote workforces.
The COVID-19 crisis causes a burden for companies that have to finish their testing and certification programs because of standards that will be superseded. Examples are the EN 60950-1:2006 and EN 60065 that are used for conformity testing of fire and security products for the Low Voltage Directive 2014/35/EU. Euralarm, therefore, urges to postpone the end date of the co-existence period of the EN 60950-1:2006 and EN 60065 with nine months. Test houses and notified bodies affected by COVID-19 Like others, the fire safety and security industry has to deal with the exceptional circumstances that are caused by the COVID-19 pandemic. The pandemic not only affects the members of Euralarm but also the external resources that work for them such as test houses and notified bodies. As a result of the crisis the available (internal and external) resources are reduced significantly, causing delay and increasing project timescales. Postponing LVD standards testing and certification By the end of this year, the EN 62368-1 certification for the safety of electrical and electronic equipment will come into force By the end of this year, the EN 62368-1 certification for the safety of electrical and electronic equipment within the field of audio, video, information and communication technology, will come into force. To make sure the existing products will comply with EN 62368-1 certification standards, many manufacturers have to convert and/or adapt the products. Because of the COVID-19 crisis manufacturers have already postponed these conversion/adaption projects or are experiencing disruption of the internal testing programs. Others have been informed that outsourced testing would not be performed according to the planned schedule. Meeting requirements of the Low Voltage Directive 2014/35/EU It is, therefore, quite impossible for manufacturers of fire safety and security products to have all their product portfolios compliant to the EN 62368-1:2014 certification standard, before the deadline of December 20th, 2020. This date was fixed by the European Commission long before the pandemic started. In order to allow these companies to finish their testing and certification programs and therefore, guarantee that the products will fulfill the essential requirements of the Low Voltage Directive 2014/35/EU (Commission Communication 2018/C 326/02 of 14.09.2018), Euralarm has urged the European Commission to consider postponing the end date of the co-existence period from December 20, 2020 to September 20, 2021.
IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment. Impact Of Technological Developments While market growth rates have been consistent, technological developments have dramatically impacted the market in 2018. The most prominent trend involves mobile credentials, which are poised to revolutionize the longstanding business model for access control system sales. The mobile credentials market was still in its infancy in 2018, but many end-users are already anticipating a transition to these credentials by installing compatible readers in their systems. By 2020, over 10 percent of all new readers sold in the market will be compatible with mobile credentials. Access Control As A Service Other trends to watch in 2019 and beyond include Access Control as a Service (ACaaS), which allow end-users to avoid the need to invest in costly on-site IT infrastructures to support their access control equipment. ACaaS solutions will be particularly popular to support small and mid-sized projects that service less than fifty doors. In addition, Bluetooth Low Energy (BLE) beacons will support geopositioning in an increasing number of the world’s most advanced access control systems. Through geopositioning, the exact location of specific personnel can be identified at any site in real-time. The top fifteen access control vendors represent more than half of the total size of the global access control market, but there are pockets of opportunity for new vendors, particularly to accommodate small and mid-sized projects. The mobile credential and ACaaS markets will also be highly competitive in 2019 and should attract an influx of new market entrants.
Part 3 of our Intercoms in Security Series: Zenitel’s Call Access Panel manages intelligible critical communications through a security operations center or control room Greater connectivity, security software enhancements, more customization, and better sound quality are some of the enhancements driving the intercom market.An advantage now offered on Code Blue’s emergency speakerphones include self-diagnosing software that monitors the status of the phones and their components — microphones, buttons and speakers — and delivers instant notifications if there is ever an issue. Code Blue phones also come with full duplex capabilities with echo cancelling, sometimes known as open duplex, which allows the caller and first responder to communicate simultaneously and eliminates buzzing and static. IP-Based Networking Systems Code Blue also builds its phones to open standards like Session Initiation Protocol (SIP), which allows calls to be easily processed with a wide variety of systems and software solutions, says David Fleming, Chief Design Officer for Code Blue Corp.Networking has impacted the intercom market, with the advent of IP-based systems. The corporate network now makes it possible to share information and to control units from a few yards to thousands of miles away, according to Bruce Czerwinski, U.S. General Sales Manager, Aiphone Corp. For example, central command center guards can monitor and allow entrance to any networked satellite or unmanned facility 24/7. Multi-Site Communications Networks have also spawned mobile apps that allow roaming guards to use smartphones and devices to maintain total control of an intercom system while away from the master station and on the Wi-Fi. And network paging is another recently added communications tool, valuable for routine announcements or emergency instructions. "Voice is becoming the killer app for serving the safety and security needs of employees and customers" “We’re now able to offer large-scale multi-site communications using intercom systems,” says Czerwinski. “That’s not just connecting a few buildings on opposite sides of a campus quad, but all those separated by state lines, even across the country.”As markets and customers served by intercom products continue to evolve with new needs requiring new solutions, intercom companies continually poll the market and develop new and interesting solutions for these needs.All-In-One Physical Access Control SolutionBecause intercom manufacturer 2N’s products are often used as part of a physical access control system, convenience and security are key attributes. Bluetooth technology will be employed heavily. 2N has just introduced its Bluetooth access control reader for both standalone access control and integrated into 2N’s VERSO door station.The technology is based on Bluetooth Low Energy (BLE) technology, which offers long-range detection (up to 10 metres), low energy consumption and ‘banking’ level security. It can be combined with other technologies — near field communication (NFC) and radio-frequency identification (RFID) — for an all-in-one solution.Mobile Video App For Door Intercoms 2N has also launched a mobile video app/service. It enables a consumer’s smart device to be used as an interface to the door intercom, allowing video calls from anywhere in the world, door access control, and as an ‘always on’ video and audio surveillance system. Notifications can be launched automatically; for example, if someone approaches the homeowner’s door, porch, or surrounding area. A low-cost all-in-one door station — Base — has been released for the residential and small business space, including HD video, audio, and door control but in a simpler-to-install and lower-cost format. Zenitel’s Customer Intercom Station Kit enables customers to build their own stations In the spring, 2N is releasing a Z-wave networked door control solution that’s easy to install and extends the reach of an access control system.Off-The-Shelf Communication DevicesJim Hoffpauir, President of Zenitel North America, says the intercom company offers a choice of either off-the-shelf communication devices or components to enable customized stations to be built based on a customer’s aesthetics or form and/or function needs. Users also must be heard and be understood, says Hoffpauir. “We spend millions of dollars in research and development on the intellectual property that defines and sets the standard for intelligible voice audio in the communications industry,” he says. “And we focus on embedding that capability with strategic alliances in access control, video and unified communications.”“Voice is becoming the killer app for serving the safety and security needs of employees and customers,” says Hoffpauir. “We want to create new interoperable solutions such as our networked HD Video Door station that acts as a communication device as well as an access control station.” It has two-way communication for 24/7 video identification and support for IP phone or unified communications through SIP. Intelligible Critical Communications Solutions Zenitel’s Call Access Panel manages intelligible critical communications through a security operations center or control room. The panel has a small footprint with pre-programmable buttons for instantaneous emergency or mass notifications to all intercom stations or IP public address, alarms, or horns. And it is SIP-compatible for unified communications. Changes in hardware and software are transforming the intercom market, as are changes in how systems are combined and configured. There is also a trend toward more discernment in terms of audio quality and system performance. Including an evaluation ‘scorecard’ in a request for proposal (RFP), for example, can ensure there is a clear way to evaluate systems being considered. “We are teaching the market there can be a legitimate scorecard on intelligibility,” says Dan Rothrock, SVP of Global Strategic Alliances, Zenitel North America. “You may not know you have bad audio until something bad happens, and it’s too late.” Read part 4 in our Security Intercoms series here
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centers, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrollment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labor. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrollment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity Authentication In common access control systems, access is authorized either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organizations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customization of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also known as red teaming). The session, titled “We Sneak into High Security Buildings and Get Paid for It,” will be presented by Michael Glasser, President, Glasser Security Group. He has two decades of experience providing security design strategic planning, implementation oversight, auditing and penetration testing. “Penetration testing determines whether people and systems are providing the protection you think they are,” says Glasser. Various system components should come together into a solution that works for the client. People, technology and architecture are all components of successful security systems. His motto: “Stop guessing and starting testing." Test-driving security systems “You can compare it to driving a car,” says Glasser. “You want to be sure the brakes work and the engine works, but then somebody has to test-drive the car.” Stop guessing and starting testing" The concept of penetration testing goes back to the Cold War, when the military had “Red Teams” and "Blue Teams,” competing squads that used their skills to imitate attack techniques enemies might use. More recently, the term “pen testing” has become common in the cybersecurity industry, often referring to “white hat” hackers that test the effectiveness of cybersecurity measures. Applying the concept to physical security in corporate America brings the concept full circle. “People think their controls work, but they realize they really need to see if it all works together,” says Glasser. Pen testing in corporate America “You can go to any military base or nuclear power site and you see pen testing,” says Glasser. “But often it doesn’t happen in corporate America.” Sometimes physical pen testing is approached as an extension of cybersecurity testing because addressing physical threats is an element in cybersecurity, too. “It’s the same service, except to make sure the physical house is in order,” says Glasser. Glasser’s session will be among the SIA Education@ISC East presentations scheduled at the education theaters on the show floor at ISC East, Nov. 20-21 at the Javits Center in New York. The process If you believe the movies, Glasser’s job is all fun and excitement, like a “bunch of kids having fun.” The reality is more mundane, he says. “People think it’s fun, but it’s work, not fun.” The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities before attempting a break-in. Research is based on threat modeling: What is a company worried about? Who is the bad guy? What do they want to do? What are the threats? The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities Among other tools, Glasser uses Open Source Intelligence (OINT), which is collection and analysis of information gathered from public, open sources, such as media, the Internet, public government data, etc. Glasser comes from a physical security industry family – both his mother and father were employed in the security industry – and he attended his first ISC East show in the 1990s when he was 11 years old. As a security consultant and security expert witness for more than 20 years, he has previously spoken at GSX and various ASIS International events.
From New York to California, city and state governments throughout the United States are second-guessing the use of facial recognition technologies by police departments and other government entities. San Francisco was among the first major cities to issue a ban on ‘secret surveillance’ tools such as facial recognition. Now backlash against public use of facial recognition appears to be gathering steam, and some technology trials have faced additional scrutiny. Oakland, California, has joined San Francisco in banning use of facial recognition. Oakland’s diverse population has led to concerns about facial recognition systems that are prone to misidentify people of color. Limiting the use of facial recognition technology The policy would limit use of live facial recognition to situations of credible terrorism threatsNearby Berkeley, California, is considering its own prohibition of facial recognition systems by city government. Somerville, Massachusetts, has banned city departments from buying or using facial-recognition technology for any purpose. A Detroit civilian oversight board and the Board of Police Commissioners are reviewing a formal policy that would require other evidence to be used along with biometric search results to confirm a suspect’s identity. The policy would also limit use of live facial recognition to situations of credible terrorism threats. At the state level, Massachusetts and Michigan are considering moratoriums on use of facial recognition, and a bill in California would forbid police use of facial recognition in body cameras. There is a law in Illinois that requires companies to get consent from customers before collecting biometric information. Installing cameras and facial recognition system Lockport Schools in western New York state have recently drawn attention to their planned use of facial recognition. The school system plans to install dozens of surveillance cameras and a facial recognition system using $1.4 million of a state grant. The Aegis system (by SN Technologies in Canada) creates an ‘early warning system’ that informs staff if it detects individuals who are not allowed in the schools. The school system plans to install dozens of surveillance cameras and a facial recognition system The system will screen every door and also use object recognition to detect 10 types of guns. An initial implementation of the program this summer is meant to troubleshoot the system, train officials on its use, and discuss procedures with law enforcement in the event of an alert. Full implementation is planned in the fall. Abuse of facial recognition system However, New York State Education Department has asked Lockport Schools to delay use of facial recognition technology on students pending further evaluation, and a bill introduced in the New York State Assembly would halt use of the technology for a year for further study. The city of Orlando and Orlando Police Department are testing facial recognition technology to address public safety Abuse has also been a concern. A report from Georgetown Law’s Center on Privacy and Technology details widespread abuse of the New York Police Department’s facial recognition system, including image alteration and use of non-suspect images. The charges raise questions about the propriety of how expanding technical capabilities of facial recognition systems are implemented. Testing facial recognition for public safety The city of Orlando, Florida, and Orlando Police Department are testing facial recognition technology to address public safety, partnering with Amazon Web Services. One pilot ended in June 2018, and the most recent ended on July 18, 2019. Orlando has no immediate plants regarding future pilots. Light bulb-sized cameras were affixed to traffic signal poles along the city’s palm-tree-lined avenues. If a camera ‘sees’ someone, it sends a live video feed to Amazon’s facial ‘Rekognition’ system, cross-referencing the face against persons of interest. Only images of Orlando police officer volunteers were used for the test. Recently Congress has become attentive to privacy concerns and, now, the Senate is considering a bill that would limit businesses from collecting and tracking facial recognition data without consent.
Coming off a successful ISC West show, Honeywell is sharply focused on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine Learning-Based Analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralize decision making, and allow customers to manage it all from anywhere. Solutions For Vertical Markets Honeywell Commercial Security is focused on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalized systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behavior as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing Technology For Sports Security The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
Students of all ages in state schools are entitled to a safe learning environment. If students don't feel safe, they are not able to stay focused during classroom lessons and activities. That’s why Narre Warren South. P-12 College has upgraded its security with the installation of a sophisticated SALTO access control and ID pass system. Located south east of Melbourne, Australia, Narre Warren South P-12 College is a unique school on one campus with two sub schools, Primary, (Prep to Year 6) and Secondary, (Years 7 to 12). It follows the P-12 Curriculum which is designed to provide diversity and pathway opportunities, ensuring students maximize opportunities that exist after school and ensure people achieve their learning goals in a fun and supportive learning environment. Mechanical Key System The College previously used a mechanical key system for its security needs Home to over 2000 students and 200 staff, cultural diversity is a feature of the College with at least 50 ethnic groups being represented speaking 68 languages. A third of the College’s student population come from families where the language background is other than English. The College previously used a mechanical key system for its security needs; however this was increasingly complicated to manage as keys multiplied, and it was difficult to guard against key duplication and copying. Another negative was the cost of re-keying and replacing locks to maintain security if keys were lost or not handed back. Security Arrangements The College also had a number of challenges when it came to managing and limiting traffic flow through the staff car parks, both inside and outside school hours. To alleviate such problems, the College decided to look into upgrading its security arrangements and called in local security specialists Eclipse Security Systems. Director Greg Flood takes up the story. “We met with Brett Dyer, (the College’s Property and Maintenance Manager), and explained how SALTO solutions are in use around the world in educational environments including universities, university housing, schools, research institutes, academies, kindergartens and more where they provide security, access control and campus management.” Cost-Effective Package Brett liked the fact that SALTO could offer a solution that was education proven" “Replacing keys with smart access control would give the school much more control over its security. For instance installing smart online wireless locks on main entrance doors would enable the school to incorporate these doors into its lock down procedure. At busy student drop off and pick up times in the morning and afternoon, the school gates could be automated to improve traffic flow and ease congestion.” “And since Narre Warren South P-12 like almost all state schools hire out their sports, meeting facilities etc to third party groups outside of school hours, the new access control solution would make it much easier to manage access for such short term visitors. Brett liked the fact that SALTO could offer a solution that was education proven and offered a secure, flexible way to have all the above benefits and more in a versatile, cost-effective package that was future proof and gave a great return on the schools investment dollars.” Scheduled Automatic Locking Most external doors have a mix of offline and online SALTO XS4 escutcheons" “The removal of the old system and the upgrade to smart locks was smooth and straightforward, and we’ve now retro-fitted in excess of 100 doors and automated a number of perimeter gates. Most external doors, plus the addition of a number of internal office doors across all the blocks, have a mix of offline and online SALTO XS4 escutcheons, as well as control units and wall readers.” “The most important thing for us is to ensure that we are doing everything we can to safeguard our children. Our new access control system furthers this goal” says Brett Dyer. “We went with Greg’s recommendation of SALTO for its functionality and value for money. We particularly like how easy it is to use and program, especially the issue and management of contactless smartcards for external user groups." "The scheduled automatic locking and unlocking of external doors and gates is a huge time saver, and so far we’re pleased with the product and the capabilities it now gives us.”
To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, a new smart IoT industrial park in Hangzhou has been put to use by Dahua Technology, a video surveillance solution provider. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Efficient Information Integration The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialized requests and ever-changing reality.The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production(preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning high-end devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools, etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. Fast Processing According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. Dahua Smart Industrial Park provides the great benefit of internal synergy The faster speed also applies to the development of new molding, since Dahua Smart Industrial Park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organizing system is supported by topnotch equipment, such as MAKINO high-speed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005MM, while also supporting CAD / CAM / CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days.Higher quality results in less likelihood for products to malfunction especially when they are used in critical situations Time- And Cost-Saving Solution By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors, etc., all of which proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, not-allowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons: first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, Dahua has put together an effectively closed loop for quality control in the manufacturing process. Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example: it can process components, in metric size, as small as 03015(0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry.Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process Enhanced Vision And Intelligent Analytics Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high-definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognize flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.In the future phase, this industrial park is expected to be more intelligent to enable a safer society and smarter living Safe Society And Smart Living Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialized needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialized use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one. And in the future phase, it is expected to be more intelligent, to realize client-centered flexible production and to enable a safer society and smarter living.
ip.access has announced a collaboration with Imaginet, a provider of IT network and security solutions, to implement a rapidly deployable disaster response network in Makati City, the Philippines. Makati City, part of the Metro Manila region, is the main financial hub and has a population of 6 million people. Built on a drained mangrove swamp, the city’s infrastructure is at a high risk for significant damage in the event of an earthquake, typhoon or other natural disasters. In the event of a disaster it is likely that communications infrastructure would be affected – hindering efforts to direct the population to safety and locate people trapped in collapsed buildings. To improve the city’s preparedness for natural disasters, the local Disaster Risk Reduction & Management Office (DRRMO) worked with Imaginet to implement a rapidly deployable mobile network. Deployed via four command vehicles, the network will allow first responders to communicate with the population and report back to the central command office.The ip.access team has an inherent understanding of disaster situations, with extensive experience working in harsh environments Ensuring Disaster Preparedness Basing the network on 2G technology, to ensure that signals would be capable of penetrating collapsed buildings and enabling communication through SMS messaging, ip.access was tasked with designing, installing and testing the network in a tight six-week window. Following a successful commissioning period, the four command vehicles were first deployed in December 2017. Commenting on the partnership, Blair Duncan, CEO at Imaginet, said, “This was a challenging technical undertaking. As such, we needed confidence that we were working with a partner that could deliver a high quality solution. In that respect ip.access were an ideal partner – the team has an inherent understanding of disaster situations, with extensive experience working in harsh environments. We knew that we could rely on them to equip our vehicles with the robust and reliable radio network the DRRMO requires should a disaster strike.” Small Cell Solutions Nick Johnson, CTO at ip.access added, “We have a wide range of award winning commercial off-the-shelf (COTS) small cell solutions that can be easily integrated and operated within a wide range of specialist deployment scenarios – including in disaster response settings.” “Communication is critical in a disaster situation, so the fact our proven solutions deliver five nines availability with exceptional reliability makes them ideal for applications like the vehicle-borne network in Makati City.” Due to the success of the vehicles, the Makati City DRRMO is now looking to increase its fleet to nine vehicles to enable more flexibility and more robustness in its disaster readiness.
Concern for safety of the lab staff prompted IHEP to seek a more securely automated system The Institute of High Energy Physics (IHEP), the Chinese Academy of Sciences (CAS) is a comprehensive research base with its main efforts focused on high energy physics, R&D of advanced accelerator technologies, advanced synchrotron radiation technologies and applications. Advanced Scientific Research Facility technologies and high-tech products with sophisticated science and technologies like radio frequency, UHV, microwave, precision magnet fabrication, etc. The developmental fields cover accelerator technology, nuclear medical instrument, nuclear instrument and meter technology, industrial automation technology, information technology, precision machining, etc. IHEP contains 11 laboratories. The research efforts are centered on high energy physics, cosmic ray and high energy astrophysics, theoretical physics, accelerator physics and technology, synchrotron radiation and free electron laser and nuclear analysis technology and application, etc. Large scientific tools include Beijing Electron Positron Collider (BEPC), Beijing Spectrometer (BES), Beijing Synchrotron Radiation Facility (BSRF) and Beijing Free Electron Laser (BFEL.). Solution Beijing Access Control Technology “We were seeking an advanced method of managing access control and for higher security,” said Li Tie Hui of The Accelerating Control Center in China. Access to restricted lab areas was being manually managed by staff – individuals requiring access to the lab had to physically use a key located in a central control unit. The key then had to be returned to its location and all staff had to evacuate the lab in order for the lab operations to initiate. The lack of a sophisticated security procedure generated a high risk of people remaining in the lab and potential exposure to radiation. Concern for safety of the lab staff prompted IHEP to seek a more securely automated system. "Convenience, safety and process automation were key considerations when we selected HID products" Solution Beijing Access Control Technology Co., a local access control solutions provider, won the project out of nine bidders to exclusively develop an advanced safety and security system featuring HID RFID access control technology integrated with networked security, custom software, video surveillance, and a fire prevention/detection system. HID ProxPro® Card Readers “Convenience, safety and process automation were key considerations when we selected HID products. We had HID cards and readers at other IHEP facilities and knew those existing products were providing the kind of security needed at the lab,” said Hui. Manual access to each door of the lab is now accompanied by an HID reader with sound and a separate LCD. The HID® reader outputs an identification number that furnishes the customized system with a higher level of security and shows the identification of the entrant, time of day and how many people remain and/ or exit in and out of the restricted lab area, displaying their names on the LCD screen. Once a departure confirmation is complete by flashing on a “departure confirmation” reader, the remaining name on the LCD screen disappears. HID access control technology controls entry into the lab, prohibiting anyone from entering while the lab is operating. In addition, HID ProxPro® card readers were modified to overcome power disturbances created by the radioactive lab environment, delivering a reliable solution for the environmental challenges at the Institute of High Energy Physics
Two models of MOBOTIX IP camera were selected for the wind tunnel, as advised by R. Pierre Digital NEWTON S.r.l. is an independent testing laboratory established in 2000, recognized and certified by international bodies such as Accredia, FIA - Fédération Internationale de l’Automobile, SFI-USA, SNELL-USA, Italcert, Istituto Masini, TÜV Rheinland International, TNO and SNCH - Société Nazionale d’Homologation et de Certification for tests of motorcycle helmets and auto racing helmets (Formula 1 and WRC), children’s helmets for kart racing, HANS devices for Formula 1 drivers, devices to protect the head, eyes (goggles, masks, and visors) and body (riding, bike, and touring helmets) and for certification tests on high-performance seats. Wind Tunnel Project In addition, the Ministry of Infrastructure and Transport considers the laboratory’s equipment to be suitable for all tests required by Regulation 22 concerning helmets and visors for motorcycle drivers and for some of those concerning the approval of two- or three-wheeled motor vehicles. The Newton laboratory has recently completed the installation of a 280kW subsonic wind tunnel: this is a closed return, Göttingen-type wind tunnel, designed to be used with either an open or a closed test chamber, depending on the specific testing program. The electric power needed is produced by a generator integrated into the structure. Thanks to the testing activity carried out within the laboratory, products obtain the certifications required by various Italian authorities (which vary according to the sector to which the tested product belongs) in order to be considered adequate, and consequently put on the market. “The idea of building an actual wind tunnel came about mainly to deal with the problem of ventilation inside the helmets,” explains Luca Cenedese, director of Newton. In fact, it seems that having solved the problem of head protection parameters, today there are large international groups focusing mainly on the study of comfort, concentrating mostly on thermal stresses and the analysis of how these phenomena affect the reaction and concentration abilities of automobile, motorcycle, and bicycle racers. “In existing wind tunnels, everything was focused on the machine, not on the helmet. So we decided to prepare by building ourselves a medium-sized wind tunnel that could also satisfy these new requirements. Today, with a wind speed of about 250 km per hour, we test helmets, bicycles, magnetic sirens for police cars and also traditionally large objects - for example subway cars or high-velocity train cars - that by utilising the principle of aerodynamic similarity, are proportionately reduced in scale,” continues Cenedese. Comparing Data And Images Built a few years ago, the Newton wind tunnel has now found approval from old and new clients from different sectors. The wind tunnel allows continuous and very effective activity. To obtain the greatest performance and offer something extra to our clients, Newton needed to identify a system that would permit keeping track of all inspection and test activities. “We work with the engineers who come to our laboratories during the testing phase to design and modify the prototypes currently being made while the product is being tested. Some tests last for many hours: we soon realised that we would have had surprising results if we had had a system available that allowed continuous recording.” "Network-integrated cameraswere needed that could not only communicate with each other but also be accessible remotely" The software used for tests inside the wind tunnels produce an enormous amount of numerical data: that is, numbers relating to performance that characterize an object, especially force, pressure, and temperature. The experts at Newton have augmented this type of numerical information, produced and processed by a PC, with a second, new perspective: the display of images produced by MOBOTIX cameras during the products’ testing phase. And thanks to the combination and comparison of numerical data and images, Newton can now provide its clients with much more accurate measurements, achieving levels of qualitative detail never before seen. Need For Network-integrated Cameras The years dedicated to this type of activity and the studies carried out in the Newton laboratories led to the awareness that the measurement of data, in and of itself, is very simple. Rather, the real problem is managing the amount of data produced by the system, which is quite often very difficult to read and make intelligible, so as to understand the various phenomena that occur in the products tested in the wind tunnel. To deal with this need, the idea was therefore to integrate the images by using video surveillance cameras. An idea that can now be described as a real pilot project, in other words a one of a kind application. “We could not rely on images taken with traditional movie cameras, because the test sessions often last for many hours and we needed images that would allow us to observe the phenomena from many angles at the same time. In addition, network-integrated cameras were needed that could not only communicate with each other but also be accessible remotely.” Two models of MOBOTIX IP cameras were chosen: one with a 360-degree view, and one AllroundMono model Quality, Timeliness And Immediacy With MOBOTIX Thanks to the support and advice of distributor R. Pierre Digital, two models of MOBOTIX IP cameras were chosen: one with a 360-degree view placed on the ceiling, perpendicular to the product test position, to offer a panoramic view; and one AllroundMono model, positioned at the side but movable as needed, which offers different details and angle shots within the same shot. Thanks to the high quality of the images from the two MOBOTIX cameras, the Newton engineers can guarantee the end user that they can take very timely action in the test phase of their products, managing any anomalies and malfunctions in real time and making the necessary changes. The advantage of MOBOTIX IP cameras is that they are also accessible remotely: a very significant plus since many of Newton’s clients come from abroad, and often some of their staff follow the product test operations remotely, thanks to a system access login offered to the client. “By combining data and images, we achieved surprising results in the test phase. When we analyze the data, if we see that the data changes, we go to retrieve pictures of the moment when the data changes and we can immediately understand the phenomenon. For example, during a test on a bicycle and a cyclist, the team’s engineers were simultaneously checking the numerical data regarding the bicycle’s efficiency and, from the images produced by the camera, the position of the cyclist at the moment when the efficiency was greatest. We are not information systems engineers, and in this sense, we were helped a lot by not having to use image management software: the images are processed on board the cameras and the result compared to other systems is surprising”, concludes Cenedese.
Airbus Defense and Space aims to validate the use of smartphones in different operational situations Airbus Defense and Space and its partner RIKS (the State Infocommunication Foundation), the technical operator of Estonia’s national Tetra network, is performing a field trial of the Tactilon Agnet smartphone application - formerly known as TSA - for two months. Voluntary civil defense and governmental organizations want to confirm Tactilon Agnet’s ability to fulfill the operational requirements for typical mission-critical communication. The field trial combines the use of public broadband networks and Tetra services. Airbus Defence And Space Solutions For the field trial, Airbus Defense and Space has provided a service cloud environment and delivered an RCS9500 integrated radio dispatching system, an automatic vehicle location solution, a Tetra base station, several Tetra radios, and different types of smartphones equipped with the Tactilon Agnet application. The application enables smartphone users to make instant group calls (push-to-talk feature) and send messages to Tetra users as if they were equipped with Tetra devices. Challenging Test Environment During the field trial, Airbus Defense and Space and RIKS aim to validate the use of various types of smartphones in different operational situations. In addition, both Airbus Defense and Space and RIKS want to collect information about how mission-critical Tetra communication features have to be operated in an LTE environment. To push the LTE-based Tactilon Agnet application to its limits, RIKS has set up, in cooperation with commercial operators, a challenging and complete test environment that includes not only a regular LTE network on the 800 and 2600 MHz frequencies, but that also includes a mobile LTE base station that is connected to the core network via broadband satellite link. Demand For Broadband Group Communication “As we observe an increasing demand for broadband group communication with multimedia features among mission critical users, Airbus Defense and Space offers a unique solution called Tactilon Agnet. It provides fully-fledged, seamless and secure integration of Tetra radio users with those who use Tactilon Agnet on their smartphones,” explains Olivier Koczan, Head of Secure Land Communications at Airbus Defense and Space. He points out that RIKS and Airbus Defense and Space are “clearly on the verge of introducing mission-critical communication features of the next generation”. Estonia’s public safety organizations have communicated within a nationwide Tetra network from Airbus Defense and Space since 2007. In 2015, the company delivered critical communication solutions enabling the use of LTE networks, which will also be used to test the Tactilon Agnet application. This solution provides high availability and secure access through commercial LTE network services.
Round table discussion
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?
Best Practices Guide: Analog Video To CloudDownload
Delivering a Smart, Secure and Healthy Workplace with CloudDownload
Are Your Technology Providers Keeping You In The Dark?Download
Capture New Opportunities With Computer Vision And Video AnalyticsDownload