Genetec Inc., a technology provider of unified solutions for enhanced security, operations and intelligence, announces its first ever attendance at BETT, the global meeting place for education buyers that attracts over 34,000 attendees. It will be exhibiting at the London ExCel on Stand NM65 from 22-25 January 2020. At the show Genetec will be exhibiting its technologies on an interactive stand that ensures visitors can get a true feel for the solutions and their capabilities. Representatives f...
AES Corporation, the manufacturer of wireless mesh communication products and services designed for your monitoring needs, announces the appointment of Laura Wall to the position of Director of Product Management. Laura is the newest member of AES Corporations Leadership Team. She is an experienced and highly collaborative product management leader who specializes in conducting extensive market research. Her expertise in Voice of the Customer (VOC) data collection and strong analytical skill se...
IDIS is poised to extend its deep learning capabilities, and to lead the sector with more advanced projects in the Middle East, with the launch a powerful line-up of Edge VA bullet and fixed domes featuring essential on-board analytics, to be showcased at Intersec (19-21 January in Dubai) on stand SA-A28. Crucially, the new camera range will allow users to leverage the power of IDIS Instant Meta Filtering, with the ability to access and search video data, stored on IDIS NVRs, through the totall...
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are th...
Bird Home Automation Group, a provider of IP video intercom technology, announces a partnership with SIP solution provider AV LinkPro. Through this strategic partnership, Bird Home Automation now offers an easily deployed option for its DoorBird product line, specifically its MDU video intercom stations, to make calls to IP, cellular and landline phones. Since its founding in 2014, Bird Home Automation has formed partnerships with many other industry pioneers to meet the demands of its customer...
AAEON Atlas helps increase safety, energy efficiency, and cut costs for Smart Cities thanks to the power of Intel Movidius Myriad X. AAEON, globally renowned provider of Smart City solutions, announces AAEON Atlas, a rugged outdoor edge node built to provide cities with flexible solutions for AI and edge computing. Featuring the Intel Movidius Myriad X, AAEON Atlas offers real-time processing for a range of Smart City applications. AAEON NanoCOM-APL board AAEON Atlas is based on the compact A...
Omnitron Systems, a provider of Power Over Ethernet (PoE) and fiber network products, introduced its new 100Watts RuggedNet Industrial GHPoEBT and OmniConverter Commercial GHPoEBT IEEE 802.3bt Switch product lines. The new compact Gigabit products include 60 and 100Watts per port and are ideal in applications requiring fiber or copper data connectivity to multiple remotely high-powered devices such as PTZ surveillance cameras, Wi-Fi access points and 5G devices. Multi-mode fiber ports The managed models feature In-band management via Web, Telnet, SSH or SNMP Both product lines feature 60 and 100Watts models with multiple 10/100/1000 copper ports; all support the legacy 802.3af (15Watts) and 802.3at (30Watts) IEEE standards. Models are available with multiple single or multi-mode fiber ports (SFP, LC, SC, ST) that can be daisy chained or configured to provide protection and redundancy for critical applications. Unique dual-device mode facilitates “splitting” the switch into two isolated and independent switches creating two separate isolated networks. Both the RuggedNet and OmniConverter products are available in managed (GHPoEBT/Mi and GHPoEBT/M) or unmanaged (GHPoEBT/Si and GHPoEBT/Sx) models. The managed models feature In-band management via Web, Telnet, SSH or SNMP with IEEE 802.1x, RADIUS, TACACS+ and Access-Control Lists. Out-of-band management is via dedicated serial port. Security and fault tolerance “In addition to the high 100Watts per port power, the new products are designed to provide security and fault tolerance to survive and maintain operation in spite of other network devices or cabling malfunctions,” said Sankar Ramachandran, Omnitron’s Product Marketing Director. He noted that “Providing multiple means to survive network faults and immediately sending user fault-notifications were designed into the products to enhance network performance and uptime.” RuggedNet feature DIN-rail mount clip and operate at industrial operating temperatures The products feature multiple network fault protection mechanisms including dual power sourcing, Link Aggregation protection (LAG), Rapid Spanning Tree, Industrial Media Redundancy Protocol (MRP) as well as remote device heartbeat monitoring, link-fault detection and automatic remote PoE Power Reset. These protection mechanisms coupled with alarm and trap alert email and SMS text notifications improve network reliability and rapid recovery during critical network events. External AC to DC power adapters The RuggedNet models feature a DIN-rail mount clip, single or dual DC power input, alarm relay contacts and operate at Industrial (-40 to 75 deg. C) operating temperatures. The OmniConverter models are designed to be shelf, wall or DIN rail mounted and are powered using external AC to DC power adapters. Models are available to operate at commercial (0 to 50 deg. C), wide (-40 to 60 deg. C) and extended (-40 to 75 deg. C) operating temperatures. The RuggedNet and OmniConverter products are designed and manufactured in the USA. They are TAA compliant and feature a limited 5-Year Warranty and 24/7 technical support.
Datrium, pioneer of the secure multicloud data platform for the resilient enterprise, unveils new capabilities for the recently announced Datrium DRaaS with VMWare Cloud on AWS solution. DRaaS now offers instant Recovery Time Objective (RTO) restarts from Datrium backups on Amazon S3—the lowest RTO with VMware Cloud of any Amazon S3-based DR system. Additionally, a new feature, DRaaS Connect, extends instant RTO DR to any vSphere environment. DRaaS Connect is available for two different vSphere deployment models. Cloud-Based disaster recovery DRaaS Connect for VMware Cloud offers instant RTO disaster recovery from an SDDC DRaaS Connect for VMware Cloud offers instant RTO disaster recovery from an SDDC in one AWS Availability Zone (AZ) to another. DRaaS Connect for vSphere On Prem integrates with any vSphere physical infrastructure on-premises. Now all VMware users, both on-premises and in the cloud, have access to cost-effective, reliable, cloud-based disaster recovery with instant RTO. Unlike most cloud DR approaches, Datrium DRaaS with VMware Cloud on AWS is focused on VMware Cloud on AWS. It requires no conversion to alternative virtual machine or cloud formats, which compromise RTO and require fundamental retraining on a separate type of cloud administration. It also defends against ransomware; by offering direct access to older backups deduped on S3, it can offer a more complete, robust offering for the widest variety of outages. VMware-Based applications This combination of on-demand compute and low-cost backup storage give it exceptional economics. It offers VM images as runnable snaps to VMware Cloud as a live datastore, so failover is a matter of restarting VMs, not copying them back and rehydrating them from a separate archive which can take days – an additional compromise to RTO. Business-critical workloads are no longer limited to on-premises infrastructure"“In the increasingly hybrid world of IT, business-critical workloads are no longer limited to on-premises infrastructure,” said Steven Hill, senior analyst at 451 Research. “Protecting these portable, VMware-based applications calls for a disaster recovery strategy like Datrium’s new DRaaS platform that’s capable of providing instant RTOs—regardless of where the workloads and backup data reside—and can leverage the resilience and efficiency of S3-based object storage without a performance penalty." Enterprise data center According to the State of Enterprise Data Resiliency and Disaster Recovery 2019 report, announces, ransomware is plaguing the enterprise data center, with nearly 90% of companies considering ransomware a critical threat to enterprise business, and this is driving the need for DR. The research also found that the public cloud is increasingly being considered as a DR site. The vast majority of respondents (88.1%) said they would use the public cloud as their DR site if they would only have to pay for it when they need it. The cloud offers greater ease of use and cost-efficient DR, solving several pain points that are holding organizations back from responding to DR events including the complexity of DR products and processes as well as high associated costs. Traditional backup-Based approaches Datrium DRaaS provisions an on-demand SDDC in VMware Cloud on AWS for recovery Datrium DRaaS with VMware Cloud on AWS is the first broadly available DRaaS solution for VMware Cloud based on backups on low-cost Amazon S3. It offers instant mass restarts of thousands of VMs from recent snapshots or backups even more than seven years old. The only cost during normal business operations—i.e., when not testing or deploying DR—is that of storing ongoing backups, which are automatically deduplicated, compressed and encrypted. In the event of a disaster, Datrium DRaaS provisions an on-demand SDDC in VMware Cloud on AWS for recovery. All the snapshots in S3 are instantly made executable on a live cloud-native NFS datastore mounted by ESX hosts in that SDDC, with caching on NVMe flash. Unlike traditional backup-based approaches to DR, Datrium DRaaS delivers the industry's fastest RTO because there is no rehydration time required to copy backup data into an SDDC before restarting the virtual machines. Providing disaster recovery services Datrium DRaaS enables backups to be projected as a live datastore for DR in a simple, cloud-native design. Datrium DRaaS with VMware Cloud on AWS will now provide disaster recovery services for any vSphere infrastructure on-premises including SANs, NAS, HCI and DHCI, and any VMware workload in the public cloud. DRaaS Connect, lightweight software for any vSphere infrastructure and a new feature of DRaaS, will enable customers to start protecting VMs in minutes. DRaaS Connect for vSphere On Prem extends Datrium DRaaS to any vSphere on-premises DRaaS Connect for vSphere On Prem extends Datrium DRaaS to any vSphere on-premises infrastructure and provides efficient replication of vSphere snapshots into DRaaS deduplicated, compressed, encrypted snapshot storage on Amazon S3. It will be managed by a DRaaS cloud-based control plane to define VM protection groups and their frequency, replication and retention policies. On failback, DRaaS will return only changed blocks back to vSphere and the local on-premises infrastructure through DRaaS Connect. AWS availability zone DRaaS Connect for VMware Cloud will enable DRaaS to orchestrate failover from a VMware Cloud SDDC in one AWS Availability Zone (AZ) to another AWS AZ. Snapshots of running VMs in the active AZ will be stored in the DRaaS repository on AWS S3. In the event of a disaster, these snapshots can be instantly restarted on ESX hosts in a different AZ, all based on well-defined runbook policies. Both DRaaS Connect options will be available in Q1 2020. “Datrium DRaaS with VMware Cloud on AWS is radically transforming DR with its cloud-native design,” said Tim Page, CEO of Datrium. “It delivers failproof instant restart from ransomware and other types of disasters for any vSphere environment with unprecedented on-demand economics. It’s like pressing the easy button for DR.” New technology partnerships Datrium DRaaS with VMware Cloud provides VMware vSphere customers a low cost approach to disaster recovery Datrium also announces new technology partnerships and channel partnerships to drive accelerated adoption and expansion of Datrium DRaaS across the IT landscape. Datrium DRaaS with VMware Cloud provides VMware vSphere customers a low cost, fast and failproof approach to disaster recovery. Together, with AWS, Datrium offers long-term data retention, using Amazon S3 economically to help enterprises stay resilient in the face of disaster. Datrium DRaaS is now available through Datrium’s channel partners including Champion Solutions Group, Mindsight, PTS Data Center Solutions and Technologent. Data management services "We talk with many enterprises who cannot afford the high cost of today's DR solutions, but require some way to protect their data centers from disasters and ransomware," said Mike Piltoff, senior vice president at Champion Solutions Group. "Datrium DRaaS with VMware Cloud on AWS will be a gamechanger for our customers because it is the first cloud DR solution where customers only pay for DR infrastructure when they need it rather than all the time. It is a cost-effective, easy and reliable DR solution. Datrium DRaaS expands our horizons with new data management services with a very attractive ROI. We’re excited to offer it to our customers.” Reducing disaster recovery time Datrium DRaaS was the only solution we found that could reduce our disaster recovery time from days to hours" "We strive to be thought leaders in the Honolulu community so improving our disaster recovery plans while investing efficiently was an IT imperative in 2019,” said Matthew Yetter, IT Manager, Honolulu Federal Credit Union. “Datrium DRaaS was the only solution we found that could reduce our disaster recovery time from days to hours while simultaneously reducing our risk by getting our data backed up off-island to the cloud with cloud economics. On-demand DRaaS with VMware Cloud on AWS delivers cost efficiency we have never seen before and resulted in an ROI of less than 12 months.” Developing and delivering transportation solutions "Mindsight has partnered with Datrium because they have brought to market one of the most transformative and disruptive data centre technologies we have seen in a decade," said Jason Wankovsky, vice president and CTO at Mindsight. Datrium DRaaS met all our demanding requirements while reducing our TCO by 80%" “Developing and delivering transportation solutions for riders, drivers, and residents across 34 cities requires highly available and secure IT systems even during disasters,” said Michael Beerer, Senior Section Manager - Information Systems, Orange County Transportation Authority. “Our DR solution had to have low RTO for our users and the high reliability and security of a leading government service that could be audited, tested and verified regularly. Datrium DRaaS met all our demanding requirements while reducing our TCO by 80%.” Providing instant recovery “For more than 20 years, PTS has helped IT teams solve some of their most difficult challenges,” said Pete Sacco, president and founder of PTS Data Center Solutions. “Ransomware attacks are making headlines on a daily basis and we want to ensure our customers are protected if they get hit or if disaster strikes.” We’re pleased to partner with Datrium to help bring disaster recovery into the 21st century" “We’re pleased to partner with Datrium to help bring disaster recovery into the 21st century. Together, we’re delivering a cost- effective, failproof solution that provides instant recovery from ransomware with VMware Cloud on AWS or one of our own data centers.” Demanding risk reduction and cost efficiency “Today’s DR requirements have become demanding and critical to our enterprise customers,” said Marco Mohajer, president of Technologent. “Datrium’s DRaaS, in conjunction with VMware Cloud on AWS, is a simple and seamless solution to any organization, regardless of size. The ability to rapidly have your systems back up and running with near-zero RTO and RPO is a giant leap forward for disaster recovery. It’s no longer about restore, it’s just a matter of rebooting.” “Oil and gas is a regulated business that demands risk reduction and cost efficiency. Cloud backup and disaster recovery is critical to our IT success,” said Josh Rein, Network Manager, Ultra Petroleum. “The efficiency of Datrium’s DRaaS is great because I can instantly restart my entire data center on VMware Cloud on AWS from my backups on AWS S3—I get the best RTO in business for the least cost. Failproof one-click orchestrated failover and failback with auditable reports and ransomware recovery significantly reduce our business risk.”
Delivering public space CCTV via mobile applications, from emergency response through to dealing with antisocial behavior, has always been technically challenging. Hackney Council’s Civil Protection Service Manager, Andy Wells, recently saw an opportunity to introduce two existing suppliers to each other, to collaborate in developing an industry first mobile CCTV solution – and one that would provide significant advantages over traditional CCTV fit outs. Commenting on the development of the new mobile CCTV solution, Adrian Kirk, Director at 360 Vision Technology said: “360 Vision’s ruggedized Predator PTZ camera is used widely in public space surveillance due to its IK10 certification, for shock impact and vibration. This makes it a safe, ‘fit for purpose’ solution for deployment to camera columns in an urban environment. ‘Rugged at the roadside’ is a phrase being widely used these days." Roof-mounted pneumatic mast systems We are grateful to Hackney Council for their input and hope they get results in helping to protect the public" “The Predator’s IK10 certification and heavily engineered gearing in its pan and tilt mechanism makes it a great choice for mobile applications. At Andy’s suggestion, we partnered with Woodway Engineering, who are another great British manufacturing business, that specialize in roof-mounted pneumatic mast systems.” Initially the system was designed to deploy lighting solutions for emergency services and other applications, but it has now been adapted to provide a vehicle roof mounted pneumatic CCTV mast system. Unlike traditional CCTV van conversions, it doesn’t require the vehicle to be permanently adapted, with large areas within a van’s space being taken up by the mast rig set up - which causes permanent damage to the vehicle’s structure. Versatile CCTV solution This new approach allows the system to be removed and reinstalled onto a new vehicle, providing a better return on investment, by minimizing costs associated with the initial installation, as well as costs associated with the host vehicle. Hackney Council have 360 Vision Technology Predators deployed which are still providing great service Debbie Taylor, Director of Woodway Engineering commented: “Collaborating with another UK manufacturer to deliver a versatile CCTV solution that can save costs and increase return on investment over current methods of fitting out a vehicle for mobile CCTV applications is exactly the type of innovative British design and manufacturing business we are all about. We are grateful to Hackney Council for their input and hope they get great results in helping to protect the public in Hackney.” Innovative and meticulous engineering approach Andy Wells at Hackney Council concluded by saying: "When we saw the Woodway mast at the Emergency Services Show, we recognized the innovative and meticulous engineering approach Woodway use - we also saw a good fit for 360 Vision's approach to making cameras." “Hackney Council have 360 Vision Technology Predators deployed which are now coming up to 8 years old and still providing great service; yielding a great return on investment. Combined with the Woodway system, we have a very capable mobile CCTV Van which is being used across multiple operations, from Forward Command Point at major incidents, to ASB patrols. It is helping us to ensure that Hackney is one of the best protected places to live in London.”
Redvision’s all-new, analog X-SERIES, rugged dome uses Sony’s next-generation, 2MP, STARVIS sensor. It directly replaces the previous RVX30 analog model and will be available to order under the same model number from November. “Many security-integrators consider Redvision’s X-SERIES™ to be the industry benchmark, rugged dome camera,” explained Paul Hucker, Director of Redvision. “With several analog components being phased out by suppliers, we were under pressure to use a low-end camera solution in the RVX30 to maintain supply. Instead of compromising, we collaborated with Sony to use their STARVIS camera block; widely regarded as the best performing block on the market. Configured as a dome or PTZ An optically correct, flat window protects the camera, without compromising image quality" "Although this left us with a gap in supply, we felt it was a better option than compromising the quality of our brand. Installers will be impressed with the performance of the new RVX30. It has exceptional low-light capability, at 0.01 Lux in color and 0.0015 Lux at night in mono, with an illumination distance of 150m using Infra-Red and 120m with white light. Like all X-SERIES™ cameras, it can be configured as a dome or PTZ using its removable cover, depending on bracket selection." "An optically correct, flat window protects the camera, without compromising image quality. An optional, silicone, long-life wiper removes rain and surface water, for optimal visibility in outdoor and challenging conditions.” Multiple alarm options The RVX30 series has 100 programmable pre-sets, 8 tours, 24 programmable privacy zones and multiple alarm options. Advanced pre-set and tour technology ensures the camera reaches pre-set positions correctly focused, with ideal light settings, following an alarm or during a tour. The RVX30 has an operating temperature range of -25º up to +60ºC. Mount options include pedestal, swan, wall and pendant, to suit all applications. The camera is marine plated before being finished in light gray or black as standard, or to order in any RAL color. The X-SERIES™ is successfully used in many applications including public space, local authority, hazardous, marine, defense, high security, town center and rapid deployment systems.
Scheduled to be held from 19 - 21 January, 2020, INTERSEC 2020 in Dubai will showcase the latest products in security, safety and fire protection. Bosch Building Technologies will display its innovative security, safety and communications products on booth SA-C26 in Saeed Arena. IP 3000i cameras with smart video Bosch introduces another industry first with the all-new range of IP 3000i cameras. The latest portfolio includes a range of four form factors that offer high quality, 24/7 performance with reliable surveillance features for standalone installations or general surveillance. Micro dome, mini dome, bullet and turret cameras are the available options with resolutions of up to 5 MP for indoor and outdoor use. Furthermore, they also offer something never seen before in such competitively-priced cameras, which is built-in Essential Video Analytics as standard. This new range of IP cameras offers smart solutions that were until now not available in a cost-effective video surveillance solution. MIC 7100i IP camera Bosch MIC IP cameras are supremely rugged, constructed from anti-corrosive metal, and can function at -40ºC to +65ºC No matter how tough conditions get, a video security operation must always go on. That is why Bosch has taken extreme measures to develop its MIC IP family of extremely rugged moving cameras even further. MIC IP cameras are built to perform in practically any environment. The housing of the new 7100i has been enhanced with a ruggedized, corrosion-resistant design that makes it perfectly suited for challenging applications where cameras are exposed to extreme conditions. Bosch MIC IP cameras are supremely rugged, constructed from anti-corrosive metal, and can function at -40ºC to +65ºC. Even the built-in Intelligent Video Analytics technology is tough enough to provide maximum situational awareness, even in the most demanding environments. With Camera Trainer, a machine learning functionality, MIC IP cameras can recognize user-specific target objects, such as moving and non-moving object, to alert operators of unusual scene activity. The 4K UHD versions also provide extreme high-resolution for mission critical applications such as city surveillance and congested highways. This makes them ideal for monitoring highways, bridges, tunnels, ports, airport perimeters and more. Intelligent Video Analytics with Camera Trainer technology The new Camera Trainer technology brings machine learning to Bosch IP cameras, enabling integrators to tailor them to detect the objects and situations that matter most. The ability to identify user-defined objects and situations can be combined with the existing alarm rules and object filters of Intelligent Video Analytics for even more flexibility and accuracy. It substantially improves the level of security for people and property and opens up new customized applications and uses. For example, it could be used to separate vehicles clustered in front of traffic lights or to determine how long a vehicle has been parked in a bay. With Camera Trainer, video cameras can be taught to recognize and detect stationary objects or certain situations instead of being triggered by motion. AVENAR fire alarm panel Bosch’s new fire alarm panels AVENAR 2000 and 8000 are a competitive solution for small to large sized applications ranging from campus solutions to affiliate networked projects. It is a future-proof solution to support future market requirements and at the same time, it is compatible with the installed base. AVENAR panel is a Safety Management System providing fire detection and smart evacuation. It integrates also into 3rd party building management systems. AVENAR all-in-one 4000 combine visual and acoustic alarm complying with EN54-3 + EN54-23 standards. More than 125 devices per loop offer high project flexibility. The new wireless system has a radio range with up to 120m in buildings with many walls and up to 180m in buildings without obstacles. It offers high connection reliability thanks to meshed topology and dual-band frequency reducing potential maintenance costs. PRAESENSA IP public address and voice alarm system All components of PRAESENSA are networked, thereby ensuring the highest flexibility and scalability All components of PRAESENSA are networked, thereby ensuring the highest flexibility and scalability from small centralized to large decentralized systems. The Bosch OMNEO IP architecture supports Dante audio networking, AES67 and AES70 protocol. The innovative multi-channel amplifier architecture with intelligent power allocation across the amplifier outputs and integrated spare channel significantly improves the effective utilization of available power, regardless of the loudspeaker load in each zone. As a result, fewer amplifiers are needed, saving up to 50 percent on space, energy and backup battery power and leading to a very competitive cost of ownership. PRAESENSA offers special features for the highest level of data security and full network link redundancy with smart integration of functions and backup facilities. LB20 commercial loudspeakers The LB20 series compact loudspeakers have been designed from the ground up to ensure efficient installation for the contractor and excellent results for the end-user. The series includes 4-inch, 5.25-inch, and 8-inch 2-way models with a matching dual-10-inch subwoofer, making it easy to select a suitable model a specific space. All LB20 models offer Bosch-engineered components for superior sound quality, low-profile looks and robust reliability for a wide range of indoor and outdoor applications. These include retail environments, hospitality settings, such as bars, lounges, patios, pool areas and restaurants, conference and meeting rooms, fitness clubs, performing arts and sports venues and houses of worship. The series offers true weatherproof construction for outdoor spaces, confirmed by extensive and rigorous testing above and beyond industry norms. IP-based DICENTIS conference system Bosch has expanded the DICENTIS family with the DICENTIS Interpreter desk. Speaking the language of the interpreter is what the DICENTIS Interpreter desk is designed to do. By observing and interviewing expert interpreters and technicians worldwide, the desk has been optimized for the real-life needs of interpreters. The result: An interpreter desk that complies with the latest as well as future market requirements and provides the interpreter with maximum freedom to focus on the job through intuitive operation and best-in-class user experience. The installation and configuration of the system is quick and easy. The state-of-the-art IP technology provides the highest flexibility and enables smooth third-party integration into a future-proof solution.
New research commissioned by Check Point shows that GDPR is delivering a strong positive effect overall for European businesses – but with some significant variations between countries in terms of adopting GDPR measures. Check Point has also developed a new free online tool called GDPRate to guide businesses through the essential components of an effective GDPR compliance strategy. The study of 1,000 CTOs, CIOs, IT managers and security managers in France, Germany, Italy, Spain and the UK sought to understand how European companies have addressed the requirements of GDPR. It revealed that 74% of organizations overall (UK respondents: 58%) believe GDPR has had a beneficial impact on consumer trust, and 73% claim it has boosted their data security (UK: 54%). Strategic approach to data security 60% of the overall sample (UK: 53%) say their business has fully adopted all GDPR measures 60% of the overall sample (UK: 53%) say their business has fully adopted all GDPR measures, with just 4% still to begin the process (UK: 10%). When asked to rate their performance in dealing with GDPR requirements on a scale from 0 to 10 (0 is ‘not at all’ and 10 is ‘totally’), the average score was an optimistic 7.91 (UK: 6.55). GDPR has encouraged a strategic approach to data security: the research showed that 65% of CTOs, CIOs, IT & security managers believe their company has an organic and strategic approach to cybersecurity (UK: 39%). This strategic approach is defined as one where measures are applied from the bottom up – and this is being used to meet the obligations of GDPR. Meeting the security requirements The study reveals that significant progress has been made across Europe towards GDPR compliance. 53% of respondents said their organization set up a GDPR working group (UK: 37%). Another 45% allocated budget to cover the costs of implementing GDPR (UK: 33%), while 41% employed GDPR consultants (UK: 37%). From an IT perspective, the most common steps taken to meet the security requirements imposed by GDPR are: Adopting standard security measures (44% overall; UK: 31%) Initiating training for employees to increase understanding of data security risks (41% overall; UK: 29%) Implementing an access and encryption control system (41% overall; UK: 29%) The research also revealed the costs of addressing GDPR requirements. 27% of respondents invested between £42,629 and £127,886. A further 25% said their company’s investment was over £127,887. The country that invested the most to meet its GDPR requirements was Italy, with 34.5% of Italian organizations invested over £127,887, followed by Germany (31.5%). The UK invested the least, with only 12.5% of UK respondents saying their company’s investment was over £127,887. Ensuring sensitive business data It’s important for organizations to adopt robust frameworks to meet the demands of GDPR"Rafi Kretchmer, Head of Product Marketing at Check Point Software said: “What’s clear from this research is that many European organizations have made significant progress in implementing the steps required to become GDPR compliant. And quite a few are already seeing powerful benefits. But for many firms there’s still a lot that can be done.” “It’s important for organizations to adopt robust frameworks to meet the demands of GDPR, rather than simply shutting down access to tools and platforms that both employees and customers want to use – like mobile devices and the cloud. There are relatively easy-to-integrate methods of keeping data safe – such as document encryption and hard drive encryption. These approaches can ensure sensitive business data is protected, preventing data leaks and unauthorized access to data.” Protecting private data GDPR’s main aim is to protect private data, so cloud solutions came under scrutiny. Overall, 83% of those polled said their organization uses cloud solutions. But many are more cautious about how the cloud is employed following GDPR’s introduction. Just 7% of companies took the drastic measure of ceasing to use cloud solutions altogether as a result of GDPR. The three most-anticipated long-term benefits of GDPR were found to be: Helping organizations demonstrate their focus on customers’ data and increasing loyalty (45%) Making operations more efficient, especially regarding cybersecurity (44%) Providing a more comprehensive view on the information processed by the company (40%) Effective GDPR compliance strategy However, nearly 13% overall believe that GDPR won’t bring any benefits to their business at all. The countries most pessimistic about GDPR’s benefits were Germany and the UK, with 21.5% and 20% of respondents stating that GDPR will not bring benefits. Respondents from Spain (3.5%) and Italy (6%) were more optimistic about GDPR benefits. Check Point has also developed a new application called GDPRate to guide businesses through the essential components of an effective GDPR compliance strategy. The tool checks the organization’s readiness for the GDPR 14 security standards and requirements as it pertains to using security products to comply with these standards.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Traka’s innovative key and equipment management solutions have been installed at a new national distribution center for a top four UK supermarket. The new distribution center, fulfills orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centers are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorized personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centers are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorized colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organizations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorized ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbor for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbor in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbor complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analyzing people's behavior. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilizing outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilize BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending based on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic or often referred to as white-box solutions are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support all because of short-term savings. White-box solutions are not the only option. Security Integrators should utilize BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances offer a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties request that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-Critical configurations Choose from a portfolio of products from entry level to enterprise to mission-critical configurations as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issue. With post-sale support, save time and resources by not having to call multiple manufacturers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime tech & global on-site support warranty, in addition to a guaranteed response.
Leon Medical Centers is a privately-owned healthcare organization with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighboring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organizations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’ and its commitment to treating its patients with the ‘dignity, respect, compassion and human kindness that they deserve.’ Mobile video recorders Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011 In keeping with its commitment to exceptional service, Leon Medical Centers operates a fleet of 230 buses that pick up patients, take them to their appointments and return them home. To ensure their safety in transit and monitor compliance with its service philosophy, it relies on an integrated March Networks® RideSafe™ video surveillance solution. Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011. “We had another vendor’s equipment up to that point, but the system couldn’t support IP video,” said Erick Martinez, Leon Medical Centers’ Security Systems Manager. “At the time, we were using analog cameras and wanted to upgrade to higher definition video. We were also experiencing a lot of issues with hard drive failures.” Hybrid network video recorders In 2014, Martinez began upgrading to RideSafe GT Series Hybrid Network Video Recorders (NVRs), and now has 120 of the new mobile recorders in addition to almost 200 older March Networks mobile DVRs. The RideSafe GT Series recorders are available in 8, 12, 16 or 20-channel models with hybrid capability allowing end users to migrate from 100 percent analog to 100 percent IP video. An embedded Linux-based operating system, ruggedized design offering protection against shock, vibration, dust and moisture, solid state electronics, and internal battery backup make the RideSafe GT Series recorders ideal for reliable operation in punishing mobile conditions. A hard drive mirroring capability ensures redundancy and storage flexibility, while health monitoring proactively alerts system administrators to hard drive failures, irregular temperatures or synching issues with cameras. Safety of our passengers Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened" Each Leon Medical Centers bus is equipped with six March Networks cameras. Five of the cameras are mounted to capture interior views and the last is used externally to capture video of passenger entry and exit points. “Our focus is on the safety of our passengers,” said Martinez. “Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened. We also use the system to confirm compliance with our service standards. Our drivers are the first and last points of interaction with our patients, so if there’s an issue, we want to be able to review and rectify it.” In the event of an incident in transit, the driver is able to push a button on the dashboard to tag the associated video. Diagnostic imaging services When the bus arrives at one of the clinics, the tagged video automatically down-loads through a Wi-Fi hotspot to a server for immediate review by Leon Medical Centers risk management personnel. While in range of a Wi-Fi hotspot, the system also downloads health alerts and can also upload any scheduled software updates or new device settings. For routine video downloads, there’s hardly ever a need for Martinez’s staff to board a bus. “Wireless downloading saves us a lot of time,” he said. “It makes incident reporting much more efficient when we need to have an issue resolved. It helps a lot.” The seven Leon Medical Centers are one-stop-shop facilities with onsite labs, pharmacies, diagnostic imaging services and dental clinics. Traveling to multiple locations Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes This convenient service model enables patients to see their family doctor or a specialist, have blood work done, get an X-ray and fill prescriptions without having to spend time traveling to multiple locations. Each center has a café, where patients can have a coffee and socialize. And to help patients stay fit, Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes, seminars and other programs. Patients who require surgery or a hospital procedure are picked up and delivered by Leon Medical’s bus transportation service. On arrival, they’re greeted and escorted to their destination by staff from Leon Medical’s Hospital Service Centers, which are located within all of the major Miami-Dade County hospitals. Aside from the seven centers and four Healthy Living Centers, Leon Medical operates a fleet maintenance garage and a 300,000 square-foot corporate headquarters. Video management software Martinez says that the fixed facilities are also being equipped with March Networks 8000 Series Hybrid NVRs, which are managed using the same March Networks Command video management software powering the mobile recorders. Having a single software solution to access and manage video - regardless of whether it’s recorded on a bus or in one of the medical centers - means that Leon Medical Centers doesn’t have to train staff on multiple software systems. It also provides the organization with complete oversight of its clients and operations. Once again, it’s all about patient safety and service excellence. “If a patient loses a purse or a wallet, for example, we’ll be able to find it for them on one of our buses or in a clinic. Or if they have an issue with an employee, we’ll be able to review the video and take care of it,” said Martinez. Video surveillance infrastructure Martinez and his staff are trained to take full advantage of all the Command software functionality A Microsoft certified engineer, Martinez heads up a department solely focused on overseeing Leon Medical’s video surveillance infrastructure. “This department didn’t exist four years ago,” he said. “I was part of the IT department responsible for PC support. Mobile security was handled by transportation at the time. I thought it would be a good idea to create a separate department with IT expertise to look after mobile security, and senior management agreed.” Martinez and his staff are trained to take full advantage of all the Command software functionality. For example, they’re able to manage video viewing privileges to ensure users have access only to those cameras corresponding to their roles or responsibilities. They’re also able to take advantage of Command’s support for Microsoft Active Directory integration, which collects established user account information from Leon Medical’s corporate network directory. Patient safety and service excellence This allows them to select users from the company directory, assign a profile and customize their user interface to display the tools needed for their role. Looking ahead, Martinez and his team will be busy this year, as Leon Medical Centers continues to expand. We have four construction build-outs planned, including a four-story, 80,000 square-foot building" “We have four construction build-outs planned, including a four-story, 80,000 square-foot building and two parking garages - one six-floor and one seven-floor garage - so there will be opportunities for additional fixed video surveillance systems. Because we lease our buses for three years, we’re also always adding to our transportation fleet, so we’ll continue swapping out our 5308 recorders in favor of the newer GT Series.” “March Networks has served us well,” said Martinez. “Without a high-quality, reliable video surveillance system, we would have a much more difficult time fulfilling our commitment to patient safety and service excellence. It’s that simple.”
Each day, over 55,000 electrical substations in the United States funnel massive amounts of energy to homes and businesses across the country. An array of specialized equipment allows these facilities to keep up with demand, and each component must run smoothly to adequately transfer and distribute energy. Housing mission-critical assets vital to the community means that substations must track everything—from condition monitoring to intrusion and sabotage threats. Thermal imaging cameras, video classification analytics, and radiometric measurement offer unmatched maintenance and security insight for substations and help prevent costly issues that hurt the bottom line. AI and deep learning technologies Advancements in artificial intelligence technologies are expanding the capability of security systems Advancements in artificial intelligence and deep learning technologies are expanding the capability of security systems. As security solutions improve, customer expectations grow. Systems that were once limited to perimeter protection are now able to provide valuable process efficiency and maintenance information. Substations should consider integrating new technology that improves efficiency and safety as they move to satisfy NERC CIP-014 requirements. Problematic heating and cooling connections can plague substations. Overheating and burning a transformer is a costly, potentially multimillion-dollar error that can take several months to correct. Beyond damage costs, the abrupt loss of equipment can lead to extended service interruptions and significant revenue loss. The consequences of equipment failure highlight the importance of asset monitoring, asset resiliency, and predictive maintenance for substations. Radiometric thermal cameras Integrating cutting-edge technologies like radiometric thermal cameras and temperature trend analysis software allows facility operators to remotely inspect equipment and quickly detect issues, preventing overheating and fires. Image quality and software compatibility are vital in planning an asset monitoring ecosystem. To best serve both the security and condition monitoring needs of substations, thermal sensor manufacturer FLIR Systems and software developer Embedded Logix collaborated to create a multi-purpose solution. Security and asset monitoring For over 30 years, FLIR has developed security and asset monitoring solutions for utility providers For over 30 years, FLIR has developed security and asset monitoring solutions for utility providers. A full lineup of fixed and pan-tilt thermal cameras allow security operators to monitor assets and perimeters in complete darkness, smoke, fog, and harsh weather conditions. FLIR thermal cameras provide superior resolution, capturing sharp imagery and minute details for high-performance video analytics and immediate threat detection. Quick intervention during intrusions prevents escalation, and rapid detection with thermal imaging supports fast response time. Smart-LX Sensor Gateway Recognizing threats before they ever reach the fence line deters theft, vandalism, and assault, keeping facility personnel safe and reducing the risk of equipment repair and legal costs. As an industry leader in thermal imaging, FLIR looks to partner with other innovative solution providers to create more advanced technologies. Embedded Logix, a Detroit, Michigan-based test and measurement solutions provider for the utility, plastic, food, and metal industries emerged as an ideal partner to integrate smart analytics software into thermal sensors. Their Smart-LX Sensor Gateway is an open-architecture platform that features Smart-LX Analytics with support for infrared cameras, programmable logic controllers, and SCADA systems. It opened the door for a complete predictive maintenance solution. FLIR thermal cameras Partnering with FLIR means being in the center of the infrared universe" The Smart-LX system allows both maintenance and security personnel to leverage networked thermal imagers on a single platform. By 2012, Embedded Logix was FLIR’s exclusive smart sensor software partner for temperature trending in predictive maintenance, bringing the Smart-LX platform to FLIR thermal cameras. “Partnering with FLIR means being in the center of the infrared universe. We can’t imagine any better product lineup to feed data into our Smart-LX Analytics,” said Deborah McLeod, president of Embedded Logix. “We have bench tested many other brands over the years, but FLIR’s products always come out on top, and that is why we recommend FLIR cameras to our customers. When you combine Smart-LX Analytics with FLIR cameras you turn an incredible sensor into an extraordinary solution.” Smart-LX Analytics Embedded Logix Smart-LX Analytics read, process, analyze, and create a visualization of sensor readings, generating asset performance reports on trends and rules that can be sent to maintenance personnel for further assessment. The software adapts over time with customer input, relying on user feedback to create an expert system. The Smart-LX platform works with both legacy and new equipment, analyzing signals from all sensors and systems, and is capable of aggregating information into VMS, OSI PI, and SCADA platforms. The FLIR FC-R fixed thermal camera leverages a radiometric sensor for noncontact temperature measurement FLIR offers several high-performance thermal imaging solutions for Smart-LX integration, including the FLIR A310 and FLIR FC-R Series cameras. Dual thermal and optical sensors on the FLIR A310 PT offer reliable perimeter protection and automated condition monitoring while pan/tilt controls maximize coverage. The onboard radiometric thermal sensor measures slight changes in surface temperature, allowing the A310 PT to monitor hotspots on equipment and alert an operator if temperatures exceed preset levels. FC-R fixed thermal camera The FLIR FC-R fixed thermal camera leverages a radiometric sensor for noncontact temperature measurement. Onboard human and vehicle classification analytics offer reliable intrusion detection and work in tandem with external monitoring systems to quickly alert operators and security personnel. “FLIR’s innovative A310F, A310PT, and FC-R radiometric thermal cameras have been paramount in substation monitoring for years,” said Michael Chaffee, director of business development at FLIR. “With the addition of Embedded Logix and its SmartLX software, our customers can take FLIR thermal cameras to the next level. When combined, FLIR cameras and Smart-LX software create a data goldmine, allowing a more frequent analysis of substation assets right from the security control room.” Facility security FLIR and Embedded Logix systems revolve around facility security and asset monitoring FLIR and Embedded Logix systems revolve around facility security and asset monitoring. Installing different cameras and network components throughout a substation creates an ecosystem ready to detect and prevent issues. Most security and asset monitoring systems from FLIR and Embedded Logix begin with several FLIR FC-ID cameras along the perimeter of the substation, one A310 PT mounted in the center of the substation, FC-R or A310F cameras installed around high priority assets, and several Smart-LX Sensor Gateways. When the system detects an object of interest, FLIR FC-ID cameras trigger the A310 PT camera to track and zoom on the object for further threat assessment, allowing security personnel to quickly and safely gauge the situation. Condition monitoring thermal imagers can continuously survey any asset in their field of view. Fixed FLIR A310F camera Fixed FLIR A310F and FC-R cameras monitor specific equipment 24/7, while the A310 PT can focus on multiple areas, viewing transformer connections, incoming power transmission lines, switch gears, fans, and more. Generated reports compare the performance of similar assets across all stations Smart-LX Sensor Gateways control the A310 PT preset scanning to gather temperature information on equipment, triggering an alarm if a temperature exceeds the preset threshold. Generated reports compare the performance of similar assets across all stations, address historical temperature trends, and label each temperature reading with the substation location, asset ID, and asset class information. This reporting is vital, as temperature trends can indicate trouble even when alarms remain untriggered. Remote monitoring “If the temperature is rising and falling on one asset, but the temperature on the other assets are steady, it can indicate a problem,” McLeod explained. “Even if the asset doesn’t reach the temperature threshold, the temperature slowly creeping up to that threshold is valuable information.” FLIR and Embedded Logix systems leverage remote monitoring to catch issues before they occur, preventing expensive downtime and maximizing substation efficiency. Predictive maintenance programs can identify poor-performing components, allowing operations teams to decide whether to proactively replace components or to continue monitoring. An unknown failure could cause catastrophic damage to other substation elements, causing customer outages and costing the utility millions of dollars. Thermal imaging Smart-LX Sensor Gateways also allow thermographers to inspect equipment remotely “The FLIR and Embedded Logix solution allows you to qualify with more frequency,” said Chaffee. “It ultimately enables you to save money and identify failures sooner. It’s much more expensive to replace a component after failure versus pre-failure. When a failure happens, you shut down the substation and part of the grid, which costs a lot of money.” Smart-LX Sensor Gateways also allow thermographers to inspect equipment remotely, improving efficiency during repairs. Traditionally, a thermographer would report to a substation to manually inspect equipment in need of service. Using a handheld thermal imager, the thermographer would take temperature measurements and check for load balance to determine whether equipment should be taken offline for repair. The need for a pre-work assessment and post-repair verification can make for long days. Embedded Logix Smart-LX Sensor Gateways remove this pain point. Live data access The Smart-LX Sensor Gateways give thermographers the ability to inspect equipment remotely and access live data from each networked FLIR thermal camera. Real-time temperature measurement and analytics allow the maintenance crew to confirm repairs or safely identify any additional issues. Thermographers would only need to go to a site when something is critical" “The FLIR and Embedded Logix solution enhances the role of thermographers,” Chaffee said. “Not needing to drive hundreds of miles to do a regularly scheduled thermal scan saves a lot of money. Your thermography team can scan safely, and with more frequency, from the security operations center. Thermographers would only need to go to a site when something is critical. Time is money, so being more productive as a utility and building a substation predictive maintenance program is an important element.” Critical asset monitoring Smart-LX Software works continuously to monitor critical equipment and uncover even small changes that can indicate impending failure. Intelligent maintenance and security systems are making substations safer and more efficient, positively impacting the bottom line. The insurance deductible of a significant substation asset can be hundreds of thousands of dollars. Detecting just one instance of equipment failure can prevent inordinate costs. “The Smart-LX Software solution reduces the cost of an event by detecting it much earlier. Instead of detecting a fire, you’re preventing a fire,” McLeod added. “It’s important for all stakeholders that utilities monitor changes in asset health as a means of improving reliability and reducing the total cost of repairs. Asset security and management Utilities are moving towards proactive deterrence and away from reactive monitoring He adds, “Stakeholders want to see that steps are being taken to reduce insurance claims from unnecessary escalations when a malfunctioning asset is not discovered until it fails and takes out expensive assets or infrastructure around it. Preventing costly downtime by repairing equipment at the first sign of trouble can reduce the number of unscheduled downtime events dramatically and create significant cost-savings.” Leveraging radiometric thermal cameras and analytics for both security and asset monitoring represents a paradigm shift. Utilities are moving towards proactive deterrence and away from reactive monitoring. Substation security FLIR radiometric thermal cameras and Embedded Logix Smart-LX Sensor Gateways safeguard substations and reduce the risk of critical equipment failure. Investing in stronger security keeps substations and their assets safe, and innovative, multipurpose solutions from FLIR and Embedded Logix create a win-win for utility providers throughout the country.
"The safety of others has always been a matter close to my heart", says Hans Wetzlar, Managing Director of IHRE SICHERHEIT Security Service in Bielefeld. It was out of this motivation that he founded his security company ten years ago. Together with his team, he ensures, for example, that visitors to events and trade fairs can move around safely. Mobile ‘video guards’, using Dahua's powerful video surveillance technology, are now contributing to this. Video surveillance system Video surveillance is a new addition to the portfolio of security service providers Video surveillance is a new addition to the portfolio of security service providers. "This enables us to offer our customers a much wider range of services from a single source," says Hans Wetzlar: "Even the sight of a camera can deter potential perpetrators. The inhibition threshold increases. In our experience, this means less damage to property and less theft." And if 'someone dares', the course of events is completely documented. While searching for a reliable video surveillance system, the security expert quickly came across Kruse Sicherheitstechnik in Salzkotten. The idea to develop mobile ‘video guards’ arose from this cooperation. The compact housing of the video monitor contains a great deal of technology: four high-resolution HD cameras are attached to the 6-metre-high trailer, which can record a range of up to 200 metres using motion detectors. Wide-Angle fixed cameras "When it comes to technology, we rely on Dahua Technology's products and solutions - and with good reason. The heart of this control station is the DSS server, which receives all signals from the video trailers. The advantage over other providers is that Dahua Technology's licenses are provided free of charge - regardless of whether a 4-channel or a 64-channel recorder," says Tobias Vieth of Kruse Sicherheitstechnik. The Starlight series has very good night vision and a high-performance infrared illuminator Two different camera types are mounted on the trailers: Two wide-angle fixed cameras and two Dahua Starlight series PTZ cameras. They can zoom to certain objects. The Starlight series has very good night vision and a high-performance infrared illuminator - allowing people to be seen from up to 300 metres away. Specialist trade partners "The feedback from our customers is consistently positive. Our video guard allows significantly better surveillance at the best price. With Dahua Technology at our side, we are well prepared for the future," says Hans Wetzlar. Dahua Technology remains on a growth course in Germany, Austria and Switzerland with a comprehensive benefits program for its specialist trade partners. Reliable on-site support, permanent customer advisors, dedicated project support and technical support from Germany: The comprehensive services contribute to the fact that within a short period of time a three-digit number of specialist trade partners have decided to cooperate with Dahua Technology.
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?