Ruggedized products
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announces enhanced integrations and business offerings in its OneView management dashboard to streamline security business operations for Managed Service Provider (MSP) partners. The latest expansion brings management of server products into the cloud console and also integrates directly with ConnectWise Manage business management solution, making it easier for MSPs to streamline billing, service ticketing, and...
Interface Security Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, announced the completion of a $60 million equity financing transaction led by its current sponsors SunTx Capital Partners and Prudential Capital Partners. The additional equity capital will help facilitate the company’s growth strategy and strengthen its capabilities, featuring highly differentiated managed services.&n...
Camden Door Controls, a premier provider of door activation, control and locking products, is pleased to announce that its 2021 price lists are now available in both U.S. and Canadian editions. The 100+ page books detail all of Camden's offerings, including product overviews, features, specifications and pricing. In addition, the 2021 price lists re available in multiple formats, including printed hardcopy versions and electronic PDF. Printed price lists are also available by contacting Camden&...
DITEK Networks is announcing the launch of a new line of Gigabit Power over Ethernet (PoE+) network switches designed for industrial applications. The products in this new line, which includes both 4-port and 8-port models, are built with a rugged metal case, and feature a fanless design that delivers a high PoE power budget. A welcome addition to the three other series of DITEK Networks PoE switches, this new line gives IT professionals and security integrators a new choice for cost-efficient,...
With the new MOBOTIX S74 video system, Konica Minolta is significantly expanding the usage options for Intelligent Video Solutions delivered using its MOBOTIX 7 platform. The new model is a high-performance IoT camera featuring up to four different types of sensor (two visual, one thermal and one movement/sound), which allows for more flexibility than any other MOBOTIX video system. Exceptionally discreet thanks to its concealed camera housing, the S74 can also access camera apps that have alre...
Hanwha Techwin, a supplier of IP and analog video surveillance solutions, announces their top five key trend predictions for the security industry in 2021. They include: AI moving to the edge, open platforms, cloud, cybersecurity and privacy. Improved AI algorithms Artificial Intelligence is moving to the edge - Increased computing power along with improved AI algorithms are driving the trend towards AI and machine learning to be run on IoT devices instead of expensive and resource hungry on-p...
News
Ping Identity, the Intelligent Identity solution for the enterprise, announced PingOne for Customers was named Best in Enterprise APIs by the API World Awards. This Ping Identity SaaS solution was also awarded Best Identity and Access Management Platform by The Cybersecurity Breakthrough Awards and The IT World Awards. Additionally, the Future Security Awards recognized Ping as the Best Security IAM Integration Software. These industry recognitions celebrate companies at the top of their field with product and service offerings that demonstrate excellence, innovation and leadership in the security industry. Advanced machine learning “Our cloud solutions give enterprises the flexibility to thrive in any environment and continuously evolve to respond to the modern security landscape,” said Andre Durand, CEO and founder, Ping Identity. “These awards underscore our commitment to giving our customers the best identity solutions during a time when security and user experience have never been more important.” The API World Awards celebrates innovation, adoption and reception in the API microservices and developer communities. Judged on innovation, adoption and reception, Ping Identity’s consumer Cloud solution, PingOne for Customers was recognized for its easy embedding of customer IAM services into applications and advanced machine learning and AI technology. Identity management platform Ping Identity was recognized for delivering solutions purpose-built for the enterprise that support all cloud Ping Identity was one of the first companies to use AI technology to detect and automatically stop threats that use APIs to gain control of systems and data. The Cybersecurity Breakthrough Awards offers a comprehensive evaluation of cybersecurity companies and solutions on the market. The panel of judges, which represents a mix of technical, business, academic and marketing expertise, named Ping Identity as the Overall Identity Management Platform of the Year. Ping Identity was recognized for delivering solutions purpose-built for the enterprise that support all cloud, on-premise, and hybrid environments. Securing digital enterprises The Network Product Guide’s IT World Awards honours achievements in the information technology industry. Ping Identity placed first in the Identity and Access Management as a Service Category and was recognized for being a complete IAM solution for enterprise hybrid IT environments covering authentication, federation, authorization, auditing and account management. The Future Security Awards acclaims the best security minds and projects in the Middle East whose technologies, products or solutions are deemed to have a great potential in meeting the needs of new business normal. Winners were selected based on their exemplary leadership and innovative approaches in securing digital enterprises.
With the new UKNI mark fast approaching, security professionals in Northern Ireland must be up-to-date on the latest changes and deadline for the new product marking system, says UNION, part of the ASSA ABLOY Door Hardware Group. This covers door opening solutions such as fire-resistant and emergency locks, panic exit devices and door closers. Coming into force from 1 January 2021, the Northern Ireland Protocol ensures that Northern Ireland will continue to follow the EU’s rules on product standards. The Protocol prevents a hard border between Northern Ireland and the Republic of Ireland, yet ensures that the UK leaves the European Union while also benefitting from Free Trade Agreements. Third-Party assessment For manufactured goods, the UKNI mark is the new conformity marking for products placed on the market in Northern Ireland, which have undergone mandatory third-party assessment by an approved body based in the UK. The UKNI mark is the new conformity marking for products placed on the market in Northern Ireland Richard Bromley, Business Development Director at the ASSA ABLOY Door Hardware Group, explains: “In essence, CE marking will continue to be used in Northern Ireland after 1 January 2021, to demonstrate products still meet EU standards. However, if a manufacturer uses a UK approved body – rather than an EU notified body – to carry out mandatory third-party assessments, then products must also carry the new UKNI mark.” Properly certified products “These changes can be quite complicated to understand, but it’s crucial that security professionals understand the implications of door hardware products not having the correct product marking in place. Not only will the product marking be invalidated, but the potential implications for all those involved throughout the supply chain could be very serious. It is everyone’s responsibility to make sure properly certified products are specified.” “To play our part, UNION and the ASSA ABLOY Door Hardware Group is taking vital steps to ensure security professionals can have complete peace of mind that our door hardware products have undergone the correct third-party assessments for goods being sold into Northern Ireland.” Door hardware solutions For existing door hardware solutions from UNION that are CE marked by a UK-based notified body, the company is transferring or re-certifying products with an EU-based notified body. All new products sold into Northern Ireland will either be CE marked by an EU-based notified body, or a UK-based approved body will be used to gain UKNI marking. It’s important to add that the UKNI mark will not be recognized in the EU market" In the case of the second option, the product will carry both the UKNI and CE marks. All relevant documents, such as labels, product packaging, marketing materials and instruction manuals, will be updated accordingly too. Richard adds: “It’s important to add that the UKNI mark will not be recognized in the EU market. In this case, CE marking on its own will suffice.” Ensuring business continuity “Ultimately, we are committed to making sure our customers have the knowledge and support they need to ensure business continues as normal during the next chapter in the UK’s history. In order to make the most of any opportunities, we want to give our customers every assurance that our products are properly certified.” “If you’re under any doubt as to which door hardware products comply with the latest regulations for Northern Ireland, please know you can have every confidence that our solutions will. Should you have any questions or concerns, please feel free to get in touch and we will be more than happy to discuss these with you.”
CP Communications, a pioneer in innovative solutions and services for live event productions, has acquired the assets of SportsCam, the groundbreaking innovator and creator of a wide range of wireless and robotic camera products for live sports production. The acquisition expands CP Communications’ range of wired, wireless and cellular content acquisition and streaming systems for its Red House Streaming brand, while also opening the door for new business opportunities in security and public safety. SportsCam changed the fan engagement game with wearable wireless cameras, among the first technologies to embed camera and transmission equipment into clothing. Cloud-Connected cameras Their products emphasize wearable, cloud-connected cameras to capture close-up sports action from varied points of view. The SportsCam products have been used in hockey, boxing and College Football broadcasts. They are also used by remote newsgathering teams, and serve many other content acquisition needs for broadcast and professional AV events. CEO Kurt Heitmann is bullish about where SportsCam can take the company beyond sports production CEO Kurt Heitmann is bullish about where SportsCam can take the company beyond sports production, most notably markets such as law enforcement, public safety, and oil and gas that rely on wearable and robotic cameras to document events. He sees strong synergies between SportsCam and products that CP Communications and Red House Streaming regularly leverage for sports and live events, including Mobile Viewpoint’s IP streaming and bonded cellular solutions. Impressive product family “SportsCam has developed an impressive product family that allow our customers to capture and stream live events as they happen, and deliver secure, encrypted streams back to a studio or command and control center,” said Heitmann. “We have long used these products in sports production, and we can now apply the operational efficiencies and benefits to a broader range of acquisition and streaming applications under our Red House Streaming brand. We are excited to bring a proven broadcast-quality technology to markets that today often use consumer technology to record and backhaul live video to central locations.” Virtual corporate events Our Red House Streaming brand was established to bring the cost-effectiveness and operational efficiency of IP" “Our 35 years of broadcast experience has gradually transitioned into a wider universe of streaming applications for virtual corporate events, houses of worship and live-streamed athletic events such as bike races, marathons and triathlons,” said Heitmann. “Our Red House Streaming brand was established to bring the cost-effectiveness and operational efficiency of IP, cloud services and bonded networking to more customers and markets. The SportsCam acquisition amplifies this strategy.” New imaging systems Heitmann adds that SportsCam’s founder, Chris Stramacchia, will remain with CP Communications and work closely with the company’s engineering and R&D teams. “I am very excited that SportsCam is now a part of CP Communications,” said Stramacchia. “The combination of our specialty camera expertise with CP’s strengths in wireless acquisition, along with streaming and bonded technologies, will allow the creation of exciting new imaging systems for a wide range of applications from sports to corporate and industrial. CP Communications’ longevity and reputation as an innovator in broadcast and media technology services provides a perfect platform for the growth of SportsCam products and services.”
Green Hills Software, the pioneer in embedded safety and security, announces it has adopted the two new international security standards and regulations for automotive cybersecurity – ISO/SAE 21434 and UNECE WP.29 – for the INTEGRITY® real-time operating system (RTOS) and associated products and services. For decades, Green Hills has been helping electronics manufacturers create and deploy embedded systems at the highest levels of safety and security. By offering compliant products and associated evidence reports for these new standards, Green Hills will build upon its proven pedigree as the foundational run-time software provider trusted by OEMs and their Tier 1 suppliers for automotive electronics. Software-Defined services Utilizing these new security standards enables manufacturers to design and deploy purpose-built, secure, software-defined systems in connected vehicles, including highly automated driving, high performance compute clusters, domain controllers, vehicle gateways, telematics, keyless entry, diagnostic connections and electric vehicle charging stations, to name a few. As reliance on vehicle connectivity grows and demand for software-defined services rises, the risk of cyberattacks against connected vehicles continues to rise. With over 100 ECUs and hundreds of millions of lines of code, connected vehicles are a target-rich platform for cyberattacks. Malicious vehicle control A single exploited security vulnerability could put an entire fleet of vehicles at risk, numbering in the millions Multiple points of entry to modern connected vehicles provide opportunities for malicious vehicle control, fraud, and data-breaches that threaten companies, drivers, and road users. A single exploited security vulnerability could put an entire fleet of vehicles at risk, numbering in the millions. With nearly 80% of new cars connected to the internet, cybersecurity breaches have the potential to put billions of dollars in sales and lawsuits at risk – not to mention the damage to brand reputation. As a result, governmental bodies and independent regulators are drafting two related measures for managing cybersecurity threats throughout a connected vehicle’s lifecycle. Ensuring cybersecurity risks Green Hills is collaborating with its customers and adopting cybersecurity assessment policies for the following: The draft ISO/SAE 21434 ‘Road vehicles – Cybersecurity engineering’ Standard was recently published by SAE International and ISO (Organization for Standardization). It is a baseline for vehicle manufacturers and suppliers to ensure cybersecurity risks are managed efficiently and effectively from both a product lifecycle and organizational perspective spanning concept, development, production, operation, maintenance, and decommissioning. The WP.29 regulations from the United Nations Economic Commission for Europe (UNECE) make OEMs responsible for cybersecurity mitigation in four cybersecurity areas spanning the entire vehicle lifecycle: managing cyber risks; securing vehicles by design; detecting and responding to security incidents; and providing safe and secure over-the-air (OTA) software updates. While WP.29 defines concrete examples of threats and mitigations, OEMs can choose how they show the threats are addressed, such as complying with ISO/SAE 21434. The regulation is expected to be finalized in early 2021 and applied initially to many member nations including European nations, South Korea, UK, and Japan, and will likely influence vehicle homologation polices in the US, Canada and China. WP.29 will be legally binding within adopting countries, and while the ISO/SAE 21434 standard is not a regulation, it is expected to be widely accepted in the global industry like ISO 26262. Connected vehicle electronics “Connected cars bring significant risks and rewards to OEMs and their suppliers,” said Chris Rommel, Executive Vice President, IoT & Industrial Technology at VDC Research. “Green Hills has earned a high stature in the industry for supplying security-critical foundational software to companies building life-critical systems like aircraft avionics, vehicle ADAS and medical equipment, and its support of these new cybersecurity standards is noteworthy.” “ISO/SAE 21434 and WP.29 are valuable additional steps towards protecting connected vehicles from cybersecurity vulnerabilities,” said Dan Mender, VP of Business Development at Green Hills Software. “Green Hills has decades of experience developing and delivering security-certified technologies at the highest levels. Adopting these standards expands our offerings to global automotive OEMs and their suppliers bringing the industry’s leading secure software run-time environment to next-generation connected vehicle electronics.”
FLIR Systems’ Raymarine brand electronics have been selected by premium yacht builders Princess Yachts, PRESTIGE, and Spirit Yachts for inclusion on their 2020 new model launches. Raymarine products have long been the preferred choice for luxury yacht manufacturers thanks to their ease-of-use, rugged design, and reliability. These new yachts will utilize products from across the Raymarine product line including its best-in-class sensors and intelligent navigation systems. Multifunction navigation displays The recently introduced Princess Yachts X95, X-Class super flybridge yacht combines luxury and aesthetic elegance with Raymarine’s Axiom XL multifunction navigation displays (MFD). Designed for premium yachts, Axiom XL glass bridge displays are the flagship of the Axiom family, delivering superior performance and the elegant simplicity of Raymarine’s LightHouse 3 operating system. Three 19-inch Axiom XL displays form the nexus of the X95’s navigation system, putting chartplotting, radar, 3D sonar, autopilot, instrumentation, and engine data displays at the captain’s fingertips. The X95’s Axiom XL navigation system is further enhanced with Raymarine IP based CCTV cameras for monitoring engine rooms and blind spots. Enhanced situational awareness A FLIR M625CS thermal imaging camera provides safer nighttime navigation A FLIR M625CS thermal imaging camera provides safer nighttime navigation and Raymarine ClearCruise augmented reality delivers enhanced situational awareness, overlaying pertinent navigation data on both HD video and thermal imagery. Raymarine Axiom XL systems are standard equipment on Princess Yacts in Europe, the Middle East, and Asia along with a full range of Raymarine sensors and peripherals. The breadth of such installations indicates the strength of Raymarine’s long-term association with Princess Yachts. “Over the years we have established a collaborative relationship with the team at Raymarine and we consult on a regular basis when looking at new innovations for our product line,” says Nick Smith, Head of Product Planning at Princess Yachts. “The service they offer us supports both our manufacturing operations and our dealer network has always been a key advantage of working with Raymarine.” Thermal imaging cameras Spirit Yachts, meanwhile, prides itself on the scrupulous, exacting, and bespoke approach it applies to each vessel it produces. The company’s sloop-rigged, eco-friendly Spirit 111 sailing superyacht and fuel-efficient P70 motor yacht have both just been delivered to their respective customers with a full complement of Raymarine products on board. As with Princess, Spirit routinely equips its yachts with a range of Raymarine Axiom MFDs, i70 instruments, Evolution autopilots, and p70 SmartPilot control heads, lightweight and energy-efficient Quantum CHIRP radar systems, FLIR M300 and M400 thermal imaging cameras, and CAM220 IP cameras. “It is an honor to see Raymarine products integrated into the modern, classic designs of Spirit Yachts,” said Gregoire Outters, General Manager of FLIR Systems’ Raymarine brand. High-Performance radars While two Axiom XL 19-inch MFDs deliver a commanding view at the flybridge helm station “We are confident the performance and reliability of Raymarine align with Spirit’s beautiful craftsmanship and attention to detail they put into every yacht they build.” Finally, the new PRESTIGE X70, a vessel created in the spirit of a superyacht, has been launched with a comprehensive suite of Raymarine electronics. Three Axiom XL 16-inch MFDs provide navigation at the X70 main helm, while two Axiom XL 19-inch MFDs deliver a commanding view at the flybridge helm station. The entire system is networked and provides X70 customers with simple touch-screen access to chart plotting, radar, sonar, and autopilot controls. X70 owners can also upgrade to Raymarine Magnum high-performance radars, RVX1000 3D sonar, and ClearCruise augmented reality. Assisted docking technology The X70 will be one of the first PRESTIGE Yachts to offer Raymarine’s DockSense® Alert assisted docking technology. Using FLIR machine vision camera technology, DockSense Alert provides smart audible and visible alerts to inform the captain when an object is close to the vessel, greatly simplifying the entire docking experience. “The presence of Raymarine at the helm of the PRESTIGE X70, Spirit Yachts, and the Princess X95 is a testament to our standing in the premium yacht market,” added Outters. “Customers investing in luxury vessels demand technologies and products that deliver on the promise of ease-of-use, reliability, and innovative design. Raymarine products on these best-in-class yachts reaffirms our commitment to leading in premium navigation solutions.”
The Open Security & Safety Alliance (OSSA) is pleased to announce AndroVideo released its first security camera that follows OSSA’s Technology Stack. OSSA drives an open platform principle and philosophy to open up the security and safety marketplace to fuel innovation beyond the limits of a single organization. Supporting the security industry’s emerging open ecosystem, the new Smart Edge Camera from AndroVideo is available now and bears the ‘Driven by OSSA’ seal. Video security devices This mark indicates the product follows the OSSA Technology Stack for video security devices that prescribes the use of a common operating systems (OS), with the first two OSSA Specifications being: OSSA Application Interface Specification OSSA Compliant Camera Definition Specification The seal also ensures seamless connectivity within the newly established digital marketplace operated by Security & Safety Things – also an OSSA member organization. This single marketplace is a central hub that provides tools and information to enable third-party app development. System integrators can then use the infrastructure to purchase, install and manage the apps on ‘Driven by OSSA’ camera devices. This consolidated approach is a core component of the Alliance’s vision to steer open standards. Open platform principles AndroVideo is a developer and manufacturer of smart edge cameras that offer technological advancements AndroVideo is a developer and manufacturer of smart edge cameras that offer impressive technological advancements. The AndroVideo Smart Edge Camera runs the operating system provided by Security & Safety Things and seamlessly connects to their recently announced digital marketplace. “As an early member of the Open Security & Safety Alliance, we are proud to participate in this ecosystem that facilitates cooperation among camera manufacturers, developers, integrators and end users,” said Jonny Wu, Vice President at AndroVideo/Ability Group and OSSA Contributor Member. “We’re eager to collaborate with all OSSA members to push the envelope on open platform principles that benefit both users and participants.” Application-Ready platform AndroVideo takes security up a notch with its competitive edge computing capabilities. The MD2, EBL2 and VD2 in dome, bullet and vandal dome form factors incorporate various robust technical features. Engineered with expertise in image quality tuning, the new product line provides market players with a highly optimized, application-ready platform for rapid AIoT development. “We congratulate AndroVideo for being one of the first OSSA members to come to market with cameras based on our Technology Stack and the Alliance’s founding vision/philosophy,” said Johan Jubbega, President, Open Security & Safety Alliance. “By establishing connections and partnerships through the Alliance, AndroVideo secures a strong foothold in this collaborative ecosystem as it evolves and the IoT continues to mature across the security and safety landscape.”


Expert commentary
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Security beat
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, and promoting universal open standards that enable all objects to connect and interact. Shifting the Smart home market Their IoT effort took off when Amazon, Apple, Google and the Zigbee Alliance announced an industry working group in December 2019 to take the ‘best of market’ technologies from smart home standards, portfolios and ecosystems and to develop a ‘super spec’ that will be open, inclusive and a significant industry shift in the smart home market. Zigbee Alliance has been for a while now working on openness and interoperability" “Zigbee Alliance has been for a while now working on openness and interoperability, which has led us to the Project Connected Home over IP (CHIP), which is looking to unify the environment, under one technology, one certification program and one logo,” says Chris LaPré, Zigbee Alliance’s IoT Solutions Architect. “It really does fuel IoT possibilities, whether in security or any other sectors.” Project CHIP is a royalty-free connectivity standard that unifies brands and ecosystems into a single smart home automation system that operates any other technology based on Internet Protocol (IP). Simplifying product development The intent is to simplify product development for device manufacturers, broaden consumer choice, and to ensure easy discoverability, deployment and engagement to fuel connected living. “We have noticed that, as the IoT has evolved, there is a stronger need for unity, which is why we are developing Project Connected Home over IP,” says Jon Harros, Zigbee Alliance’s Director of Certification and Testing Programs. “It fits with the Zigbee Alliance’s goal to unify systems, and to focus on everyone using the same application at the top. It unifies that environment, whether you are integrating your system with Amazon Echo devices or connecting to Google Home.” Participating in development of Project CHIP are 125 companies of various types from around the world working together with more than 1,100 of their experts serving across sub-committees to formulate specifications and fine-tune the project. Home system technologies The original Zigbee protocol is used for many applications around the world, including smart homes Although the technology is being developed for the home market, the specifications have been formulated with an eye toward expanding into the commercial market in the future. Development of open, interoperable systems provides greater freedom for consumers to choose among the many technology choices on the market, without being tied to a single brand or ecosystem. Zigbee Alliance certifications and memberships span the globe, with roughly a third in Europe, a third in North America and a third in Asia. Involvement in Europe is slightly higher than the other regions. Alliance members represent manufacturing sites all over the world. Project CHIP is a newer initiative of the Zigbee Alliance, which previously developed Zigbee Pro to enable home system technologies to operate using IEEE 802.15.4 wireless signals on the 2.4GHz radio band over a self-healing true mesh network. The original Zigbee protocol is used for many applications around the world, including smart homes. Certification transfer program Among the strengths of the Zigbee Alliance are years of experience certifying products, which includes testing them and confirming that they comply with the promoted specifications and functionality. The specifications are open standards that are developed in cooperation with all the companies that are Zigbee Alliance members. Another route is the certification transfer program, in which a company chooses a certified white-label product, becomes a member of the Alliance, and then rebrands the product while retaining the certification. “It helps them get products on the market quickly while they build their own knowledge base,” says Harros. “All our work is focused on standardizing the behavior and functionality of products and making sure everyone is following the same standard to get interoperability,” says Harros. “Members all contribute to the standards.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
Case studies
A frequent target for terrorism, airports faces considerable challenges in securing the flow of traffic. Concerns over security can ground flights, grinding operations to a halt. Whether one needs to inspect all vehicles entering the airport grounds or just those entering higher-security areas like the apron and the container space, there is no room for long waits during inspections. Passengers are counting on their flights leaving on time, and security delays could lead to flight delays. However, one can’t afford to compromise the security standards either. Propane gas cylinders While security is usually heavy in the terminal buildings themselves, in some international and local airports, there are not enough measures in place in the external road and parking areas leading to the departure and arrival zones. The attack resulted in ‘only’ five people injured and heavy damage to the terminal building For example, on June 30, 2007, a Jeep Cherokee laden with propane gas cylinders and gasoline cans was driven at a high speed into the doors of the Glasgow Airport departure area on one of the busiest days of the year. The attack resulted in ‘only’ five people injured and heavy damage to the terminal building. Incidents like this one really emphasized the need for an automatic and efficient method for inspecting vehicles entering the different areas in and around the airport. Heavy traffic control The airport apron, flight line or ramp is the area of an airport where aircraft are parked, unloaded or loaded, refilled, or boarded. In most airports, the security regulations in this area are heavy, and only authorized, trained personnel are allowed to drive in and out while withholding heavy traffic control rules. One can only imagine the danger of terrorists or other hostile people entering in an authorized vehicle. There needs to be a method to make sure these types of people cannot use fake license plates if the recurring vehicle list does get into the wrong hands. While clearly the number of civilian passengers who use airports has risen dramatically as time has gone by, the risks associated with airports and airline travel have also increased. Identifying vehicle passengers The device is available in both a mobile and a stationary, fixed version and works in extreme conditions The threat of bombs or cargo-related explosives is significant, but security measures have not necessarily risen at the same rate as threats and number of flights and passengers. The financial and physical risks of illicit and dangerous materials entering sensitive areas in and around an airport are clear, and a new generation of screening is required to tackle these challenges. UVeye scans, analyses, and records all passing vehicles, ensuring security while also keeping flights on schedule. Helios by UVeye is the perfect option to protect both the access roads and parking facilities around the airport and important areas like the apron. Helios improves security while keeping security personnel safe. The device is available in both a mobile and a stationary, fixed version and works in extreme conditions. Their technology can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19. High-Resolution cameras Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras. It alerts security personnel about any irregularities or foreign objects hidden in the undercarriage, whether its weapons intended to be used in a terrorist attack, improvised explosive devices, or illegal cargo to be loaded onto a plane in the apron of the airport. Inspecting the undercarriages of vehicles is very difficult for security personnel and is sometimes neglected due to the number of vehicles entering an airport. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspected the undercarriage, they probably didn’t know what to look for. Reducing inspection times UVeye is here to solve this problem by providing drive-through solutions in selected access points UVeye has built its products as drive-through solutions that reduce inspection times to as little as a few seconds, supporting a quick flow of vehicles entering or leaving the premises. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images on a tablet or computer screen, checking for anything suspicious or unusual in the undercarriage, automatically marked by the system. Many airports do not have enough staff or the capacity to inspect every vehicle entering or leaving secure areas. UVeye is here to solve this problem by providing drive-through solutions in selected access points, alerting security personnel of any irregularities or potential threats attached to a vehicle. Helios is the only product on the market able to detect issues in the undercarriage of a vehicle passing through the system for the first time. Fingerprint ID feature The apron of the airport is the most sensitive area of the facility, and with UVeye’s technology and unique fingerprint ID feature, every vehicle entering or exiting the apron will be marked using artificial intelligence and receive a unique ID that will be saved in the database. This way, security personnel will not need to rely on license plates alone when inspecting vehicles on the authorized vehicle list. If someone attempts to enter using a fraudulent license plate, the system will recognize that it is not the same vehicle, and the attempted trespassers will be stopped in their tracks. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles like trucks and buses. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain. Airport access roads UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers entering the external airport access roads, which can help identify visitors with potential fevers, improving the safety of everyone in and around the airport. Airports around the world can enhance their security efforts with automatic vehicle inspection systems Integrating to the centralized server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralized management system enables the client to access the different systems deployed and manage the different users and historical data. Airports around the world can enhance their security efforts with automatic vehicle inspection systems, providing an extended layer of safety in and around the airport. Access control systems Uveye took into consideration heavy traffic entering the access and parking areas of an airport when it built its drive-through scanner, Helios, which can quickly find any threat attached to or hidden in the undercarriage without slowing down vehicle traffic. Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal or dangerous items from entering the apron of the airport and potentially accessing the airplanes about to take flight. Integrating Helios with other security and access control systems can provide a multi-layer approach that will tighten the entry and exit points to any sensitive site while keeping personnel and data safe. UVeye is ideal for airports and also can be implemented at border crossings, seaports, military bases, embassies, data centers, and other secure perimeters.
FLIR PT Series cameras were used in a surveillance project to detect and monitor illegal fishing and poaching activities along the Spanish Galician coast. The FLIR thermal imaging cameras combined with maritime video analytics from Gradiant were ideal for spotting illegal vessels on a 24/7 basis and at a long range. The vastness of the Galician coastline and the multitude of fishing and farming activities call for a more automated surveillance approach. Fishing, shellfish harvesting, and marine aquaculture - mainly mussel farming in inshore waters are important economic activities in Galicia (northwest of Spain). Local public authorities strictly control these activities to prevent exploitation, fish stock depletion and resulting economical losses. They are fighting a constant battle against this unfair and illegal competition that affects thousands of professionals who make a living from the fishing and seafood industry. Challenges of coastal monitoring Illegal fishing and poaching has an enormous impact on the environment and food safety Illegal fishing and poaching of seafood resources also has an enormous impact on the environment and food safety; especially during periods of toxic algal bloom (red tides), when fishing conditions are hazardous for public health. The detection of unauthorized fishing and shellfish harvesting is of paramount importance for the Galician authorities. However, monitoring and protecting all of Galicia’s inshore and offshore fisheries, shellfish harvesting areas, and marine aquaculture farms is a challenging task. Galicia has 1,200 km of coastline. Its protection involves the surveillance of activity in 122 ports, including around 5,000 fishing boats, 400 beaches dedicated to shellfish harvesting, and 47 mussel aquaculture farms, with a total of more than 3,000 bateas (floating mussel farms). Long-range thermal imaging Moreover, most illegal activity takes place at night, making it extra difficult for law enforcers to detect any type of vessel. The Galician climate does not help either. With an average of 128 days per year of rain, visibility conditions are usually not ideal for surveillance operations. Manned surveillance patrols can only do so much; they are hindered by the climate and visibility conditions, making it impossible (from a practical and financial standpoint) for coast guards to cover the entire Galician coastline. In 2017, the Galician Coast Guard started a project to test video surveillance of the coastline based on thermal imaging cameras. The pilot included the use of FLIR’s PT Series multi-sensor camera, combined with maritime video analytics software from Gradiant (Pontevedra, Spain). Multi-sensor installation FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications The multi-sensor installation was extensively tested on two different locations along the Galician coast. One set-up was used to monitor illegal vessels on coastal waters at short/medium range, while another set-up was used for long-range monitoring. The PT Series thermal cameras allowed the Galician Coast Guard to monitor the required area over a long range on a 24/7 basis, even at night and in adverse weather conditions. In addition, the FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications. This software is specifically adapted for monitoring coastal environments and allowed the coast guard to detect, track and geo-localise people and vessels, including small wooden and plastic boats. Visible-light camera The software enabled the thermal cameras to detect objects and people despite adverse maritime conditions, such as high waves, low contrast due to low light, fog and rain, reflections on the sea surface, camera vibrations, and the presence of distractors, such as birds and vessel wakes. The FLIR PT Series is a high-performance multi-sensor pan/tilt security camera, incorporating an uncooled thermal camera with sensitivity of <35mK and a visible-light camera with 36x optical zoom. While the thermal camera is used to detect threats over a long range based on their heat signatures, the visible-light camera can be used for verification and identification. Long-range surveillance The requirements for this long-range application were extremely challenging for any thermal camera" “FLIR is the reference for long-range surveillance applications with thermal imaging,” says José Antonio Rodríguez, Head of Video Analytics at Gradiant. “The thermal performance of the camera and the fact that this technology is easy to set up makes it ideal for this type of application. In addition, FLIR supported us from the start for lens selection, calibration of the system and much more.” “The requirements for this long-range application were extremely challenging for any thermal camera,” says Nikitas Koutsourais, Product Marketing Manager at FLIR Systems. “Thanks to the FLIR PT Series’ unique thermal sensitivity of less than 35mK, we could provide the best image performance in the market.” IP video streaming Two different configurations were used in this application. The long-range surveillance station used a FLIR PT-606 camera, and was able to detect a rubber inflatable boat at 4,000m. Despite its narrow field of view, this camera allowed for wide coverage thanks to the high-precision pan/tilt unit. The camera was able to sweep a wide field of view span in a pre-programmed sequence of pan/tilt presets. The port surveillance station used a PT-625, offering a good compromise between detection range and field of view with a single pan/tilt preset. The integration of the video analytics software with the camera was easy thanks to IP video streaming and the camera’s ONVIF compliant interfaces for pan/tilt control. Long-range surveillance typically requires the use of lenses with a narrow field of view, which is a problem when you want to monitor wide areas. Coastal protection applications The FLIR thermal cameras provided the Galician coastguard with increased situational awareness However, the video analytics from Gradiant was able to take advantage of the Preset Sequencing mode of the FLIR PT Series. This allowed the coastguard to cover a wide field of view with a single camera and to perform video analysis on each pan/tilt preset. The FLIR thermal cameras provided the Galician coastguard with increased situational awareness and allowed them to respond much quicker to illegal fishing activities. The pilot project was performed in a realistic surveillance environment along the Galician coast and generated very positive results. The combination of a multi-sensor system with Gradiant’s maritime video analytics proved to be effective to deal with the intricate Galician coast lines and a lack of open view. In addition, this technology combination is a cost-effective alternative, making automated surveillance applications accessible for fish farm companies worldwide. Extremely rugged systems Finally, the PT-Series are extremely rugged systems, which makes them ideal for coastal surveillance, especially in an extremely humid environment such as the Atlantic coast of Spain. The system’s vital core is well protected against dust and water ingress, and complies with IP66 requirements.
Revader Security has supplied its Transit mobile CCTV cameras to Argoed Community Council in Flintshire, North Wales. The cameras are operated on a daily basis by the local police, primarily for the purposes of tackling antisocial behavior and street crime. The Transit range of mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure the vital video evidence necessary for prosecution. Local police forces are actively using the fleet of mobile cameras in the Argoed and surrounding area to combat long-running issues of antisocial behavior and criminality in the community. Mobile CCTV cameras combat crime Police are able to regularly reposition each camera around the locality to respond to the movement of crime hotspots, and only minimal planning is required prior to deployment, since the units can be installed in virtually any location within minutes. Rhodri Hampson-Jones, Clerk to the Council, said, “The mobile CCTV cameras supplied by Revader Security have proven to be highly effective. I would have no hesitation in recommending them to CCTV operators seeking to combat antisocial behavior and criminality in the community.” Following successful results in the local area, Argoed Council placed repeat orders to increase their stock of mobile cameras. The council is fully supported by Revader Security’s technical team throughout the life cycle of the products.
Highways England is the government company charged with operating, maintaining and improving England’s motorways and major A roads. In total they manage over 4,300 miles of road, carrying a third of all traffic by mileage and two thirds of all heavy goods traffic. Traffic Officers have a responsibility to help the company keep major roads free-flowing, safe and serviceable. Their ability to communicate with other patrols and back to one of the seven control rooms, using the UK’s nationwide Airwave network, is therefore crucial to their operations across the country. IP68 environmental protection The organization’s traffic officers have been long time Sepura users, and took the opportunity to upgrade to the new SC20 devices to take advantage of the loud, clear audio, essential in the noisy roadside environments that officers often work in. The rugged radio is well-equipped to deal with the challenges of daily operations; the SC20’s IP68 environmental protection ensures that the radio remains operational in wet, dirty or dusty conditions. Meanwhile the tough, large screen remains visible in all weather conditions, enabling the user to always be aware of critical messages or information being displayed. In total over 700 SC20 radios have been purchased to support operations. Product quality and customer service “It is a pleasure to further our working relationship with Highways England. As long time Sepura users, they are aware that the company prides itself on product quality and customer service. The SC20, with its rugged design and clear audio, coupled with its ability to run intelligent applications, will ensure that Highways England’s officers will be well protected and always in touch with their control center.” Says Andy Gregory, Business Development Director for Sepura. “The SC20 had a number of features that will undoubtedly enhance the safety of our officers when on patrol or attending incidents. The loud, clear audio is a key factor, ensuring that even when large goods vehicles are passing close by, critical messages can still be heard. In addition to this the rugged design of the radio ensures that even in wet, dirty conditions, our staff will be able to rely on their radio to continue working for them.” Says Al Edwards, technology operations manager for Highways England.
Mines are unique operating environments with highly specific health and safety challenges. In particular, underground mining operations typically experience low-visibility conditions and light pollution from flashlights, vehicle lights and reflective strips on equipment and clothing, making traditional surveillance and safety monitoring difficult. These were some of the challenges facing Jiangzhuang Coal Mine in the Shangdong Province of China, which covers an underground area of 43 square kilometers, and produces more than 1.8 million tons of coal each year. The top priority for the mine’s management team is worker safety, and working practices and production are monitored 24 hours a day to minimize accident risks. Aging surveillance system Kong Qingwei, Director of the Jiangzhuang Coal Mine Dispatch Office, says, “We need to respond immediately to unsafe situations in the mine, whether they are caused by environmental factors, poorly performing machines, or employees not following authorized work procedures.” Its aging surveillance system made health and safety monitoring difficult in key areas of the mine Although the mine invests heavily in safety training and equipment for workers, its aging surveillance system made health and safety monitoring difficult in key areas of the mine. “Our previous surveillance system required us to monitor around 30 screens, 24 hours a day, often with sub-optimal image quality caused by low-light conditions or light pollution,” says Kong Qingwei. “This made our jobs extremely difficult and tiring, as well as impacting our ability to respond to safety issues quickly enough.” Maximizing worker safety To address its health and safety challenges, Jiangzhuang Coal Mine has implemented an intelligent video surveillance and control system from Hikvision. The Hikvision solution supports crystal-clear video imaging, even in low-light conditions, or where light pollution is created by lights or reflective strips. This quality and clarity of imaging ensures that hidden risks can be identified more quickly and easily, allowing the safety team to respond more quickly and to protect workers in all areas of the mine. Improving worker health and safety In addition to the improved imaging capabilities, the Hikvision cameras incorporate deep learning technologies to identify and respond to health and safety risks in the mine automatically, and in real time. Specifically, the cameras can identify when employees deviate from approved work procedures and send alerts to the safety team to ensure staff can be deployed before accidents occur. The new Hikvision system increases worker safety by monitoring the areas around winches and other equipment" For example, it is prohibited for workers to come too close to winches when they are working due to safety risks, but this is hard to monitor with traditional video cameras. “The new Hikvision system increases worker safety by monitoring the areas around winches and other equipment, and by sending alerts if employees get too close,” says Kong Qingwei. Delivering continual improvement In the first three months of operation, the new Hikvision system identified more than 30 deviations from safe operating procedures. Zhang Liu, Deputy Chief Engineer at Jiangzhuang Coal Mine, says, “In the past, many of these safety risks could have gone unnoticed. However, the Hikvision system has allowed us to identify every incident in real time and to take immediate action to protect our workers, which is a hugely satisfying outcome for us.” As well as alerting the team to potential security risks in real time, the Hikvision system also records the details of any safety incident for later analysis. “As well as accurately capturing deviations from safe working procedures, the Hikvision system supports playback and download functions,” says Zhang Liu. “We can use the insights we record to deliver continual improvement for safety procedures, and, ultimately, to support our vision for a ‘zero-accident’ mine,” he adds. Addressing mining-specific safety requirements The Hikvision solution is configured to support specific mining-safety applications, such as constant monitoring of surface water levels in different areas of the mine. With the Hikvision system, we can manage surface-water levels constantly" “Constant seepage from rock formations means that surface water can accumulate in different areas of the mine, which is a problem in terms of potential flooding, damage to infrastructure, and worker safety risks,” says Zhang Liu. “With the Hikvision system, we can manage surface-water levels constantly and take action to deal with any problems that arise before water levels exceed safe limits,” he adds. Increasing effectiveness for the safety team In addition to surface water management, the Hikvision solution supports improved safety in other potentially dangerous areas of the mine, including inclined tunnels that are used for transporting coal and other materials underground. “The Hikvision system is like an intelligent 'eye' for us in all areas of the mine, helping us to identify potential safety issues in a timely and accurate way and to protect our workers at all times,” says Kong Qingwei. With automated alerts for all manner of potential safety threats, the safety team can be far more effective, with no need to monitor video images constantly. “Instead of looking at grainy images on 30 screens, we can now spend more of our time responding to incidents, supporting workers, and keeping them safe,” says Zhang Liu. “This is a classic example of how automation can help to improve mine safety, while also reducing the tiring workloads associated with manual monitoring of screens.”
Traka’s innovative key and equipment management solutions have been installed at a new national distribution center for a top four UK supermarket. The new distribution center, fulfills orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centers are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorized personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centers are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorized colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organizations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorized ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.


Products
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?