AAEON, a provider of IoT and AI edge computing solutions, is helping to power the pandemic response with the BOXER-6638U rugged embedded box PC. Featuring Intel Core i3 processors, the BOXER-6638U brings the power of industrial computing to mobile X-ray machines, used to perform chest X-ray scans of suspected COVID-19 patients. This vital equipment helps increase the speed and accuracy of diagnosis, and prevent the spread of the pandemic. The spread of Coronavirus disease 19 (COVID-19, previous...
Quantum Corporation announces it has completed its acquisition of the ActiveScale™ object storage business from Western Digital Technologies, Inc., a subsidiary of Western Digital Corp. The acquisition expands Quantum’s leadership role in storing and managing video and other unstructured data using a software-defined approach. Jamie Lerner, President and CEO, Quantum commented, “The strategic acquisition of ActiveScale bolsters our existing product portfolio and expands our ad...
ISC West will occur as scheduled March 17th through 20th, 2020. The show is not being canceled or postponed. The Show’s planning closely follows the CDC guidelines, local and state public health authorities and the US State Department/Federal Government travel rules related to the COVID-19 virus. Reed Exhibitions and the Show team are monitoring updates from the CDC and the Southern Nevada Health District (SNHD) which continue to indicate low risk of exposure to the virus in the United St...
From buildings to vehicle fleets and enterprise networks to perimeter gates, having access control to let the right people in—while keeping everyone else out—is a security necessity. ELATEC, a global specialist in radio frequency identification (RFID) readers enabling user authentication for these and other access control applications, will introduce its latest new product the TWN4 Palon Compact Panel Reader at the ISC West Conference and Exhibition, to be held March 17-20, 2020 in...
Vacant property protection provider Orbis Protect has joined forces with Estonian company Defendec Services OU to provide its growing number of customers with state-of-the-art security technology. The new partnership announced will enable Orbis Protect to provide clients with military-grade security equipment in a move which also means the Uxbridge-based company will be able offer the very latest video verification technology. Light in the security industry The partnership was confirmed after...
FIME launches its new Smartspy+ solution to support the adoption of contact and contactless transaction technologies for payments, transport and access control. Enhanced portability and performance allow product developers and system integrators to check, debug and validate their products wherever they are. This accelerates time to market for smart cards, NFC tags, ePassports, mobile devices and readers by identifying interoperability issues quickly and easily. “Smartspy+ is the best cont...
HID Global, a worldwide provider of trusted identity solutions, announced the launch of HID® Signo, its signature line of readers that creates a new industry benchmark for the most adaptable, interoperable and secure approach to access control. The new readers dramatically simplify system deployment and management, meet the advanced security requirements of today’s dynamic environments and set organizations up for smarter, more connected access control. Access control systems “With the industry now seeking to use access control systems as a backbone for creating intelligent environments, consultants, integrators and end users are increasingly demanding more versatile, high performance solutions,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control Solutions, HID Global. Organizations can use their technology of choice and easily migrate to the latest solutions “HID Signo is built on an open platform and delivers on our commitment to innovation with its unprecedented flexibility and robust set of forward-looking features that optimize workplace experiences. Our goal is to put more choices in the hands of our customers and give them peace of mind in knowing they can continually adapt their systems as requirements change.” Physical and mobile credential technologies For ultimate versatility, the readers are interoperable with over a dozen physical and mobile credential technologies so organizations can use their technology of choice and easily migrate to the latest solutions at their own pace. Additionally, with support for Apple's Enhanced Contactless Polling (ECP) to enable Student IDs in Apple Wallet, HID Signo is driving the next wave of flexibility and convenience with mobile access. HID’s new readers are packed with smart features, such as automatic surface detection that recalibrates and optimizes read performance based on the mounting location. For rugged, outdoor performance, the readers are also IP65 rated with no additional gasket needed, and feature a capacitive touch keypad resistant to harsh weather conditions. Remotely configure and diagnose readers HID Signo’s connectivity-by-design model empowers administrators to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. Additionally, configuration can be further streamlined through the controller via the Open Supervised Device Protocol (OSDP). HID’s novel approach to access control also lays the foundation for a future of cloud-connected systems" “HID’s novel approach to access control also lays the foundation for a future of cloud-connected systems that will enable new applications and innovative capabilities, such the ability to proactively anticipate and address system issues before they occur,” Radstaak added. Built-in support for OSDP Secure Channel Delivering multi-layered security with built-in support for OSDP Secure Channel and HID’s proven Security Identity Object technology, the readers store cryptographic keys on certified EAL6+ secure element hardware and custom authentication keys can be used to further enhance security. HID’s patented velocity-checking feature also protects against brute force rapid electronic attacks. The new line of HID Signo Readers is available through Advantage Partners in major markets worldwide, with a phased roll out in select regions.
Antaira Technologies is a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, and is proud to announce the expansion of its industrial networking 10 Gigabit family with the introduction of the LMP-1002G-10G-SFP, LMP-1002G-10-SFP-24, and LMX-1002G-10G-SFP. Antaira Technologies’ LMP-1002G-10G-SFP, LMP-1002G-10G-SFP-24, and LMX-1002G-10G-SFP are industrial-grade equipment that is Ethernet ready to fulfill various markets’ edge-level networking applications in manufacturing automation, security surveillance, power/utility, water wastewater treatment plants, oil/gas/mining, and transportation. High-density Ethernet port connectivity These devices support high-density Ethernet port connectivity, the widest bandwidth with 10 gig fiber ports, long distance data transmission, and an exceptional reliability factor. For intelligent transportation systems the LMX-1002G-10G-SFP is ideal. Often times there may be 1000mbps fiber links in place that need more modern 10 gig speed links. The LMX-1002G-10G-SFP devices can support the existing link with 1000mbps SFPs installed and will run at 1000mbps speeds when faster SFPs are placed at both ends of the fiber. The link can be upgraded to 10Gbps speeds. This makes migrating from a gigabit speed fiber back bone to 10Gbps possible by not changing out all the switches at one time. Antaira’s LMP-1002G-10G-SFP Antaira’s LMP-1002G-10G-SFP will provide up to 30W per port and two SFP+ slots If one’s application requires PoE, Antaira’s LMP-1002G-10G-SFP will provide up to 30W per port and two SFP+ slots with speeds of 1000Mbps or 10Gbps, depending on the SFP used. One can mount the switch by DIN-Rail or wall mount, wall mounting plates included. If one is looking for a PoE switch, which uses low voltage input as a power source, Antaira’s LMP-1002G-10G-SFP-24 will be the best choice with a voltage input range of 12~55VDC. Light Layer 3 capabilities Fiber interfaces give the ability to extend a network out past traditional buildings, across campuses, and even from town to town. For long distances, the fiber interfaces can make it difficult to manage switches that are remote. Managed switches are critical in controlling and predicting failures on the network as well as determining when and where issues reside. These new 10 gigabit Antaira switches are fully managed with Light Layer 3 capabilities. The management software can allow for redundancy which can be built into the network using Spanning Tree, Ethernet ring technologies or other available redundant features.
VMware, Inc., an innovator in enterprise software, announces new innovations to advance the company’s strategy to make security intrinsic to the digital enterprise. Intrinsic security makes protecting critical applications and data more automated, proactive and pervasive across the entire distributed enterprise. The announcements made at RSA Conference 2020, include: New VMware Advanced Security for Cloud Foundation, which will enable customers to replace legacy security solutions and deliver unified protection across private and public clouds Advancements to the VMware Carbon Black Cloud, which including automated correlation with the MITRE ATT&CK framework and upcoming prevention coverage for Linux machines New VMware Secure State auto-remediation capabilities to automate actions across cloud environments and proactively reduce risk New Approach To Cybersecurity VMware’s Sanjay Poonen will deliver a keynote address: ‘Rethink the Way You Secure Your Organization with Intrinsic Security,’ which will discuss how making security intrinsic can unlock new advantages and make life easier for security practitioners. There has never been a more challenging and exciting time in security" “There has never been a more challenging and exciting time in security,” said Sanjay Poonen, chief operating officer, customer operations, VMware. “Attacker sophistication, security threats, breaches, and exploits are becoming more prevalent with no end in sight. And with cloud, new applications, pervasive mobility, IoT, and data at the edge, the problem is only getting harder to solve. There must be a new approach to cybersecurity – one that is built-in, unified and context-centric.” Delivering best-In-Class financial services “We believe the best strategy and approach is to make security intrinsic, enabling organizations to leverage their infrastructure and its unique capabilities across any app, any cloud and any device to better secure the world’s digital infrastructure – from networks, to endpoints, to workloads, to identities, to clouds.” “Our members rely on us to deliver best-in-class financial services,” said Mark Fournier, Systems Architect for the U.S. Senate Federal Credit Union. “VMware has put our team in a position to deliver consistent innovation, evolve our digital transformation and keep our data better secured amidst an attack landscape that’s constantly evolving. VMware’s ability to deliver and help secure our digital infrastructure gives us the confidence that we’re staying ahead of the latest threats in an environment where cybersecurity is built into the fabric of our enterprise, not just bolted on.” Single point of compromise Most security professional know this, but struggle to adequately protect their data centers Data breaches are increasingly devastating, often wiping out billions in market capitalization and costing public company CEOs their jobs. Damage rarely results from a single compromised server. It results from attackers moving laterally (East-West) through the datacentre from a single point of compromise, often for months, as they locate, harvest and exfiltrate sensitive data. Most security professional know this, but struggle to adequately protect their data centers. A survey commissioned by VMware and conducted by Forrester Consulting shows that 75 percent of respondents depend on perimeter firewalls, however East-West security controls need to be different than those for traditional perimeter (North-South) security as 73 percent of respondents believe their existing East-West traffic is not adequately protected. Protecting data center workloads VMware is specifically addressing the internal data center security challenge with the new VMware Advanced Security for Cloud Foundation, which will include VMware Carbon Black technology, VMware NSX Advanced Load Balancer with Web Application Firewall capabilities and VMware NSX Distributed IDS/IPS. Each one is purpose-built for the data center and together deliver a unique and more comprehensive data center security solution. VMware Carbon Black technology protects workloads with Real-time Workload Audit/Remediation Also, all three will tightly integrate into VMware vSphere, the industry standard for data center workloads, enabling security to follow workloads wherever they go through their entire life. Data center security starts with a strong foundation—properly protecting data center workloads. VMware Carbon Black technology protects workloads with Real-time Workload Audit/Remediation, Next-Generation Antivirus (NGAV) and Endpoint Detection & Response (EDR). Hardware-Based solutions VMware Carbon Black will be tightly integrated with VMware vSphere to yield an ‘agentless’ solution, eliminating the need to insert antivirus and other agents. Instead, endpoint telemetry will be managed and gathered via built-in sensors protected by the hypervisor. This also means, unlike agent-based solutions, the hypervisor will be able to detect if an attacker attempts to gain root access and tamper with the VMware Carbon Black technology — all from a separate trust domain. The web server is the ‘front door’ of the data center, and NSX Advanced Load Balancer / Web Application Firewall safeguards this frequent point of attack. Often customers using hardware-based solutions with fixed capacity will turn off security filtering under heavy loads, leaving critical servers vulnerable. The unique, scale-out software architecture of the NSX Web Application Firewall helps confirm web servers have enough computation capacity for maximum security filtering even under peak loads. Traditional perimeter security products Policies will be automatically generated and enforced on an application-specific basis The NSX Web Application Firewall uses rich understanding of applications, automated learning, and app-specific rules to provide strong security with lower false positives. Behind the web tier, micro-segmentation and in-band East-West firewalling helps prevent lateral movement of attackers. The VMware NSX Distributed IDS/IPS, a new capability of the VMware NSX Service-defined Firewall, will provide intrusion detection on the many different services that make up an application making it easier to get deep visibility. The distributed architecture of NSX Distributed IDS/IPS will enable advanced filtering to be applied to every hop of the application, significantly reducing the blind spots created when using traditional perimeter security products. Policies will be automatically generated and enforced on an application-specific basis, thereby lowering false positives. Discovering potential threats VMware has introduced automated correlation with MITRE ATT&CK framework Technique IDs (TIDs)—a list of common tactics, techniques, and procedures (TTPs)—built into the VMware Carbon Black Cloud. Using MITRE’s ATT&CK framework, customers can begin searching for specific TTPs based on MITRE ATT&CK techniques within the VMware Carbon Black Cloud to discover potential threats and identify areas of improvement in their security posture. VMware Carbon Black has also integrated with the Microsoft Windows Anti-Malware Scanning Interface (AMSI) to provide additional visibility by decoding obfuscated commands. Using the integration, customers will be able to seek visibility into the exact content executed by script interpreters, such as PowerShell. Customers will also be able to search across their continuously collected endpoint activity data and create custom detections based on AMSI-related script content. Endpoint prevention solutions VMware Carbon Black will be adding malware prevention capabilities for Linux machines Finally, VMware Carbon Black will be adding malware prevention capabilities for Linux machines. This innovation will empower customers to migrate away from other endpoint prevention solutions specific to Linux and consolidate their security programs. This addition to the VMware Carbon Black Cloud platform means customers will have the option for comprehensive security coverage across all major operating systems (Windows, Mac, and Linux). With VMware Secure State’s real-time detection and remediation capabilities, customers can now close the loop on cloud security and compliance to mitigate risks proactively. VMware Secure State is adding a new, flexible remediation framework to help customers automate actions across multicloud environments. Currently in Beta, this solution is designed to help cloud security teams collaborate with DevOps teams and gain trust as they gradually scale best practices. Maintaining centralized visibility The service provides pre-defined, out of the box actions or ability to create new, custom actions as code. All actions can be targeted to selectively remediate resources based on conditions such as cloud accounts, regions or resource tags. Security teams will also get comprehensive capabilities for managing overall cloud risk. To address existing misconfigurations, they can either bulk remediate violations themselves or publish actions to delegate decisions to DevOps teams. Customers maintain centralized visibility into remediation progress and changes to cloud resources In order to prevent new misconfigurations, they can build guardrails that auto-remediate violations at real-time speed. With an extensible, policy as code approach, users can programmatically execute all remediations as code using API and integrate them within the CI/CD pipeline. No matter how actions are triggered, customers maintain centralized visibility into remediation progress and changes to cloud resources. Hosting two breakout sessions The new portfolio offerings, product demos and more will be on display this week at the RSA Conference in the Moscone North Expo, booth #6145. VMware Carbon Black will be in Moscone Expo North, booth #5873. In addition to Poonen’s keynote address on February 26, VMware will host two breakout sessions during the conference. VMware’s SVP and GM of Network Security, Tom Gillis, will deliver ‘Unshackle Legacy Security Restrictions for 2020 and Beyond.’ VMware Carbon Black’s Cybersecurity Strategist, Rick McElroy, and Senior Threat Researcher, Greg Foss, will deliver ‘2020 ATT&CK Vision: Correlating TTPs to Disrupt Advanced Cyber Attacks.’
The Transportation Security Administration (TSA) has purchased 100 additional L3Harris Technologies ProVision® 2 passenger screening systems that will be deployed at airports throughout the United States. Products and technology roadmap The ProVision 2 system is a scanner that uses software to screen passengers at the checkpoint. The ProVision family was first introduced in 2009. Nearly 1,000 ProVision systems (both ProVision and ProVision 2) have already been deployed nationwide. “The ProVision has been a stalwart within the security industry, and continuous developments ensure that it will remain at the forefront of the industry for years to come,” said Todd Silvestri, Vice President, Product & Program Development for Security & Detection Systems, L3Harris. “We work to enable our products and technology roadmap to align to TSA’s security mission.”
With the addition of the AMIGUARD® 9000 Series Vehicle Barriers, AMICO Security is now offering manufacturing, integration, design, and installation of crash rated anti-vehicular equipment solutions and expert technical support for the government, industrial, commercial, and residential applications. Security fence product lines The AMIGUARD® 9000 Series Vehicle Barriers are fully integrated with their security fence product lines. AMICO’s products have a long track record of reliability in the marketplace from active bollards and wedge barriers to passive systems like cable barriers and fixed bollards. Once can see AMICO’s products at Fencetech Booth #2042 or ISC West Booth #7042.
Genetec Inc., a technology provider of unified solutions for enhanced security, operations and intelligence, announces its first ever attendance at BETT, the global meeting place for education buyers that attracts over 34,000 attendees. It will be exhibiting at the London ExCel on Stand NM65 from 22-25 January 2020. At the show Genetec will be exhibiting its technologies on an interactive stand that ensures visitors can get a true feel for the solutions and their capabilities. Representatives from Genetec will be on hand to explain the solution capabilities, and how the best-of-breed cameras, readers, sensors and analytics can meet each user’s specific requirements. More advanced access control Genetec already works with educational institutions around the globe Recognized by IHS Markit as the world’s leading Video Management System (VMS) vendor, Genetec already works with educational institutions around the globe including the University of Hull, Cornell University and the Hilton Central school district in New York. The company is able to solve some of the most pertinent issues schools and universities face as facilities grow in size and complexity and they become responsible for more students. For example, its support for wireless locks and more advanced access control helps educators to enhance security while also contributing to simplified operations and an improved staff and student experience. Complexity of managing campuses “BETT is the leading trade show for those working in the education sector,” said Nick Smith, Regional Sales Manager for Genetec UK&I. “It’s a chance to connect directly with end-users, and we’re keen to show those attendees the scope and flexibility of our solutions. We’ve never attended before but as education is such a key market for us, this was an opportunity we could not pass up.” “Education is changing all the time, and the complexity of managing campuses is only growing. Combining a plethora of technologies and integrating them effectively is a challenge many face, and our comprehensive solutions can add real value – over and above simply providing security products. Our analytics can help users identify trends and implement courses of action to better manage campus operations – from traffic flow through to students accessing their dormitories, cutting through the complexity and driving return on investment.”
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Revader Security has supplied its Transit mobile CCTV cameras to Argoed Community Council in Flintshire, North Wales. The cameras are operated on a daily basis by the local police, primarily for the purposes of tackling antisocial behavior and street crime. The Transit range of mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure the vital video evidence necessary for prosecution. Local police forces are actively using the fleet of mobile cameras in the Argoed and surrounding area to combat long-running issues of antisocial behavior and criminality in the community. Mobile CCTV cameras combat crime Police are able to regularly reposition each camera around the locality to respond to the movement of crime hotspots, and only minimal planning is required prior to deployment, since the units can be installed in virtually any location within minutes. Rhodri Hampson-Jones, Clerk to the Council, said, “The mobile CCTV cameras supplied by Revader Security have proven to be highly effective. I would have no hesitation in recommending them to CCTV operators seeking to combat antisocial behavior and criminality in the community.” Following successful results in the local area, Argoed Council placed repeat orders to increase their stock of mobile cameras. The council is fully supported by Revader Security’s technical team throughout the life cycle of the products.
Mines are unique operating environments with highly specific health and safety challenges. In particular, underground mining operations typically experience low-visibility conditions and light pollution from flashlights, vehicle lights and reflective strips on equipment and clothing, making traditional surveillance and safety monitoring difficult. These were some of the challenges facing Jiangzhuang Coal Mine in the Shangdong Province of China, which covers an underground area of 43 square kilometers, and produces more than 1.8 million tons of coal each year. The top priority for the mine’s management team is worker safety, and working practices and production are monitored 24 hours a day to minimize accident risks. Aging surveillance system Kong Qingwei, Director of the Jiangzhuang Coal Mine Dispatch Office, says, “We need to respond immediately to unsafe situations in the mine, whether they are caused by environmental factors, poorly performing machines, or employees not following authorized work procedures.” Its aging surveillance system made health and safety monitoring difficult in key areas of the mine Although the mine invests heavily in safety training and equipment for workers, its aging surveillance system made health and safety monitoring difficult in key areas of the mine. “Our previous surveillance system required us to monitor around 30 screens, 24 hours a day, often with sub-optimal image quality caused by low-light conditions or light pollution,” says Kong Qingwei. “This made our jobs extremely difficult and tiring, as well as impacting our ability to respond to safety issues quickly enough.” Maximizing worker safety To address its health and safety challenges, Jiangzhuang Coal Mine has implemented an intelligent video surveillance and control system from Hikvision. The Hikvision solution supports crystal-clear video imaging, even in low-light conditions, or where light pollution is created by lights or reflective strips. This quality and clarity of imaging ensures that hidden risks can be identified more quickly and easily, allowing the safety team to respond more quickly and to protect workers in all areas of the mine. Improving worker health and safety In addition to the improved imaging capabilities, the Hikvision cameras incorporate deep learning technologies to identify and respond to health and safety risks in the mine automatically, and in real time. Specifically, the cameras can identify when employees deviate from approved work procedures and send alerts to the safety team to ensure staff can be deployed before accidents occur. The new Hikvision system increases worker safety by monitoring the areas around winches and other equipment" For example, it is prohibited for workers to come too close to winches when they are working due to safety risks, but this is hard to monitor with traditional video cameras. “The new Hikvision system increases worker safety by monitoring the areas around winches and other equipment, and by sending alerts if employees get too close,” says Kong Qingwei. Delivering continual improvement In the first three months of operation, the new Hikvision system identified more than 30 deviations from safe operating procedures. Zhang Liu, Deputy Chief Engineer at Jiangzhuang Coal Mine, says, “In the past, many of these safety risks could have gone unnoticed. However, the Hikvision system has allowed us to identify every incident in real time and to take immediate action to protect our workers, which is a hugely satisfying outcome for us.” As well as alerting the team to potential security risks in real time, the Hikvision system also records the details of any safety incident for later analysis. “As well as accurately capturing deviations from safe working procedures, the Hikvision system supports playback and download functions,” says Zhang Liu. “We can use the insights we record to deliver continual improvement for safety procedures, and, ultimately, to support our vision for a ‘zero-accident’ mine,” he adds. Addressing mining-specific safety requirements The Hikvision solution is configured to support specific mining-safety applications, such as constant monitoring of surface water levels in different areas of the mine. With the Hikvision system, we can manage surface-water levels constantly" “Constant seepage from rock formations means that surface water can accumulate in different areas of the mine, which is a problem in terms of potential flooding, damage to infrastructure, and worker safety risks,” says Zhang Liu. “With the Hikvision system, we can manage surface-water levels constantly and take action to deal with any problems that arise before water levels exceed safe limits,” he adds. Increasing effectiveness for the safety team In addition to surface water management, the Hikvision solution supports improved safety in other potentially dangerous areas of the mine, including inclined tunnels that are used for transporting coal and other materials underground. “The Hikvision system is like an intelligent 'eye' for us in all areas of the mine, helping us to identify potential safety issues in a timely and accurate way and to protect our workers at all times,” says Kong Qingwei. With automated alerts for all manner of potential safety threats, the safety team can be far more effective, with no need to monitor video images constantly. “Instead of looking at grainy images on 30 screens, we can now spend more of our time responding to incidents, supporting workers, and keeping them safe,” says Zhang Liu. “This is a classic example of how automation can help to improve mine safety, while also reducing the tiring workloads associated with manual monitoring of screens.”
Traka’s innovative key and equipment management solutions have been installed at a new national distribution center for a top four UK supermarket. The new distribution center, fulfills orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centers are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorized personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centers are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorized colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organizations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorized ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbor for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbor in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbor complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analyzing people's behavior. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilising outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilise BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project. Integrators should utilise BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic - often referred to as white-box solutions - are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and are built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support because they opt for short-term savings. White-box solutions are not the only option. Security Integrators should utilise BCDVideo’s IP video surveillance appliances, all of which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances come standard with a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties typically require that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. The KYHD warranty gives customers greater security, compliance enablement, and complete control over their data, which is particularly important given GDPR requirements. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-critical configurations Choose from a portfolio of products from entry-level to mission-critical, enterprise configurations, as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issues. With pre- and post-sales support, save time and resources by not having to call multiple manufacturers or call centers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime technical and global on-site support warranty, in addition to a guaranteed response. d response.
Leon Medical Centers is a privately-owned healthcare organization with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighboring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organizations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’ and its commitment to treating its patients with the ‘dignity, respect, compassion and human kindness that they deserve.’ Mobile video recorders Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011 In keeping with its commitment to exceptional service, Leon Medical Centers operates a fleet of 230 buses that pick up patients, take them to their appointments and return them home. To ensure their safety in transit and monitor compliance with its service philosophy, it relies on an integrated March Networks® RideSafe™ video surveillance solution. Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011. “We had another vendor’s equipment up to that point, but the system couldn’t support IP video,” said Erick Martinez, Leon Medical Centers’ Security Systems Manager. “At the time, we were using analog cameras and wanted to upgrade to higher definition video. We were also experiencing a lot of issues with hard drive failures.” Hybrid network video recorders In 2014, Martinez began upgrading to RideSafe GT Series Hybrid Network Video Recorders (NVRs), and now has 120 of the new mobile recorders in addition to almost 200 older March Networks mobile DVRs. The RideSafe GT Series recorders are available in 8, 12, 16 or 20-channel models with hybrid capability allowing end users to migrate from 100 percent analog to 100 percent IP video. An embedded Linux-based operating system, ruggedized design offering protection against shock, vibration, dust and moisture, solid state electronics, and internal battery backup make the RideSafe GT Series recorders ideal for reliable operation in punishing mobile conditions. A hard drive mirroring capability ensures redundancy and storage flexibility, while health monitoring proactively alerts system administrators to hard drive failures, irregular temperatures or synching issues with cameras. Safety of our passengers Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened" Each Leon Medical Centers bus is equipped with six March Networks cameras. Five of the cameras are mounted to capture interior views and the last is used externally to capture video of passenger entry and exit points. “Our focus is on the safety of our passengers,” said Martinez. “Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened. We also use the system to confirm compliance with our service standards. Our drivers are the first and last points of interaction with our patients, so if there’s an issue, we want to be able to review and rectify it.” In the event of an incident in transit, the driver is able to push a button on the dashboard to tag the associated video. Diagnostic imaging services When the bus arrives at one of the clinics, the tagged video automatically down-loads through a Wi-Fi hotspot to a server for immediate review by Leon Medical Centers risk management personnel. While in range of a Wi-Fi hotspot, the system also downloads health alerts and can also upload any scheduled software updates or new device settings. For routine video downloads, there’s hardly ever a need for Martinez’s staff to board a bus. “Wireless downloading saves us a lot of time,” he said. “It makes incident reporting much more efficient when we need to have an issue resolved. It helps a lot.” The seven Leon Medical Centers are one-stop-shop facilities with onsite labs, pharmacies, diagnostic imaging services and dental clinics. Traveling to multiple locations Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes This convenient service model enables patients to see their family doctor or a specialist, have blood work done, get an X-ray and fill prescriptions without having to spend time traveling to multiple locations. Each center has a café, where patients can have a coffee and socialize. And to help patients stay fit, Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes, seminars and other programs. Patients who require surgery or a hospital procedure are picked up and delivered by Leon Medical’s bus transportation service. On arrival, they’re greeted and escorted to their destination by staff from Leon Medical’s Hospital Service Centers, which are located within all of the major Miami-Dade County hospitals. Aside from the seven centers and four Healthy Living Centers, Leon Medical operates a fleet maintenance garage and a 300,000 square-foot corporate headquarters. Video management software Martinez says that the fixed facilities are also being equipped with March Networks 8000 Series Hybrid NVRs, which are managed using the same March Networks Command video management software powering the mobile recorders. Having a single software solution to access and manage video - regardless of whether it’s recorded on a bus or in one of the medical centers - means that Leon Medical Centers doesn’t have to train staff on multiple software systems. It also provides the organization with complete oversight of its clients and operations. Once again, it’s all about patient safety and service excellence. “If a patient loses a purse or a wallet, for example, we’ll be able to find it for them on one of our buses or in a clinic. Or if they have an issue with an employee, we’ll be able to review the video and take care of it,” said Martinez. Video surveillance infrastructure Martinez and his staff are trained to take full advantage of all the Command software functionality A Microsoft certified engineer, Martinez heads up a department solely focused on overseeing Leon Medical’s video surveillance infrastructure. “This department didn’t exist four years ago,” he said. “I was part of the IT department responsible for PC support. Mobile security was handled by transportation at the time. I thought it would be a good idea to create a separate department with IT expertise to look after mobile security, and senior management agreed.” Martinez and his staff are trained to take full advantage of all the Command software functionality. For example, they’re able to manage video viewing privileges to ensure users have access only to those cameras corresponding to their roles or responsibilities. They’re also able to take advantage of Command’s support for Microsoft Active Directory integration, which collects established user account information from Leon Medical’s corporate network directory. Patient safety and service excellence This allows them to select users from the company directory, assign a profile and customize their user interface to display the tools needed for their role. Looking ahead, Martinez and his team will be busy this year, as Leon Medical Centers continues to expand. We have four construction build-outs planned, including a four-story, 80,000 square-foot building" “We have four construction build-outs planned, including a four-story, 80,000 square-foot building and two parking garages - one six-floor and one seven-floor garage - so there will be opportunities for additional fixed video surveillance systems. Because we lease our buses for three years, we’re also always adding to our transportation fleet, so we’ll continue swapping out our 5308 recorders in favor of the newer GT Series.” “March Networks has served us well,” said Martinez. “Without a high-quality, reliable video surveillance system, we would have a much more difficult time fulfilling our commitment to patient safety and service excellence. It’s that simple.”
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
Ruggedized products: Manufacturers & Suppliers
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals