The Security Industry Association (SIA) looks forward to 2019, and it is apparent that physical security is moving into its most formative years. Changes presented by emerging technology, open systems and growing connectivity among devices and sensors will make a big difference for manufacturers, systems integrators/dealers and end users. With a more open, connected environment come cyber risk and data privacy concerns – which is why, in SIA’s 2019 Security Megatrends, cybersecurity...
Open Options, based in Addison, Texas, provides a truly open access control architecture that will strengthen the ACRE portfolio and increase the breadth of solutions offered by the global provider of security systems. The acquisition of Open Options is also an opportunity for ACRE to focus on growth opportunities in North America and “balance the scales a bit,” says Joe Grillo, CEO of ACRE, which significantly grew its reach in Europe, the Middle East and Africa with the acquisiti...
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorize him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth...
ESA is proud to recognize the distinguished group of companies supporting the industry in 2018 through its Executive Strategic Partners program. Executive Strategic Partners Program This program allows us to partner with key manufacturers and service providers that are looking to make a significant impact on the industry" “This program allows us to partner with key manufacturers and service providers that are looking to make a significant impact on the industry,” says Merlin Guilbe...
Everbridge, Inc., global supplier in critical event management and enterprise safety software applications to help keep people safe and businesses running, has announced that it has achieved a FedRAMP Agency Authorization for its Everbridge Suite solution. FedRAMP (Federal Risk and Authorization Management Program) is a government-wide program that provides a standardized approach to security assessment, authorization and continuous monitoring for cloud products and services. Federal Risk And A...
There’s no denying that cyber-crime is one of the biggest threats facing any organization with the devastating results they can cause painfully explicit. Highly publicized cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organizations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organization a fine of up to four...
Hytera Communications Corp. Ltd., Hytera America, Inc., and Hytera Communications America (West), Inc. (collectively, "Hytera") has filed a petition at the US International Trade Commission (ITC) requesting review of a Final Initial Determination issued on July 3, 2018 by ITC Administrative Law (ALJ) Judge MaryJoan McNamara that features in Hytera's Digital Mobile Radio (DMR) products sold in the US infringe patents of Motorola Solutions, Inc. (MSI). Hytera Files Petition at US ITC Hytera's position remains that its products sold in the US do not infringe MSI's patents, and that the initial determination is incorrect. MSI originally asserted seven patents in its complaint but later withdrew three. ALJ McNamara ruled that a limited number of claims in the four remaining patents at issue are infringed, but also determined that MSI did not satisfy the technical industry prong of the domestic industry requirement as to another of its patents and did not find Hytera to have violated the statute with respect to that patent. During proceedings in this case, before the period for factual discovery ended, Hytera had produced for the ALJ's consideration documents and source code related to several new designs. In addition to asking the ITC to reverse the ALJ's initial determination, Hytera has also petitioned the Commission to affirm that these latest products are not infringing. Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI" Digital Mobile Radio Products "Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI," said Tom Wineland, Vice President of Hytera Communications America (West), Inc. "MSI did not oppose our new designs based on six of the asserted patents." In June of 2018, Hytera announced a new range of features for its digital mobile radio (DMR) portfolio, including its mobile radios, portable radios, and repeaters. These new features include extending full-duplex calling into repeater-mode operation (RMO) and direct-mode operation (DMO), enlarging full-duplex coverage beyond trunking mode without requiring extra hardware. Hytera also extended its over-the-air programming capability to conventional repeater operation, allowing individual radios to be reprogrammed remotely. Furthermore, optimized push-to-talk (PTT) functionality allows users to talk instantly after PTT even before a call is established. Hytera Portable Radios and Repeaters Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity "Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity, help improve the safety of users, and offer a better user experience," added Hytera's Wineland. "They boost Hytera’s leading position in providing innovative, versatile, high-quality DMR solutions that also present a compelling value to our dealers and customers." Hytera's petition before the ITC remains confidential by terms established by the Commission, which typically completes reviews within 120 days. Since the Commission has not issued its final decision, there is presently no constraint on the import or sale of any of Hytera’s products. Hytera also learned in May of 2018 that the US Patent and Trademark Office's Patent Trial and Appeal Board has accepted three Hytera petitions to invalidate MSI's patents based on prior art. "Hytera looks forward to the disposition of this case at the ITC and to resolving the series of nuisance litigations our competitor has filed against us," adds Wineland. "Hytera is focused on innovation and prefers to compete fairly in the marketplace rather than in the courtroom. Hytera is confident that our products do not infringe."
Hikvision USA Inc., a provider of artificial intelligence, machine learning, robotics and other emerging technologies, and supplier of video surveillance products and solutions, has announced that its director of cybersecurity, Chuck Davis, has been appointed to the Security Industry Association’s (SIA) Cybersecurity Advisory Board. The board is designed to guide SIA members in addressing potential cybersecurity threats, develop prescriptive guidance, and advocate for cybersecurity strategies and solutions for issues impacting the physical security industry. The board's leadership enables SIA to prepare its members for challenges related to the wider adoption of the Internet of Things and the use of secure networked devices for security. We believe collaborative efforts such as the SIA board are vital, and we applaud SIA's leadership on cybersecurity" Cybersecurity Hotline “Effective cybersecurity defense requires an industry-wide effort, and the SIA Cybersecurity Advisory Board is one of the industry’s leading resources,” said Davis. “I'm honored to join the board and look forward to working with other board members on this critical issue.” “Hikvision North America's ongoing commitment to cybersecurity is reflected through a broad range of initiatives designed to keep property and assets safe, including growing our dedicated cybersecurity team, creating the industry’s first Source Code Transparency Center, and launching a cybersecurity hotline for our partners,” said Jeffrey He, president of Hikvision USA Inc. and Hikvision Canada Inc. “We believe collaborative efforts such as the SIA board are vital, and we applaud SIA's leadership on cybersecurity."
At ISC West 2018, OnSSI, On-Net Surveillance Systems Inc., (booth #13074) will showcase its latest Ocularis 5.5 Video Management Software (VMS) platform with in-booth demonstrations of several solutions enabled by advanced technology partnerships. The integration between C2P and OnSSI’s Ocularis 5.5 provides vital information to assist operators assess emerging situations, better enabling them to choose the most appropriate course of action. This solution brings video and data together resulting in a highly effective utility for security applications such as facial recognition, banking, access control, asset tracking, license plate recognition, point-of-sale and more. AI-Enabled Facial Recognition CyberExtruder’s high-performance face recognition software, Aureus 3D AI, provides face matching from live video in uncontrolled environments and is integrated with Ocularis 5.5 for a solution that provides an automated identity processing hub for organizations with both identification and verification requirements.Eagle-i Edge integrates with cameras from all major manufacturers and OnSSI’s Ocularis 5 to improve situational awareness Aureus 3D AI is easy to use, easy to set up and can be used not only with conventional video streams or video files, but with static images as well. For users just getting started with face recognition, the difference between Aureus 3D AI and every other system is that it’s a native 3D application with cutting-edge artificial intelligence algorithms at price points that make sense. Jemez Technology’s Eagle-i Edge software analytics platform provides real-time DETECT-TRACK-NOTIFY capability for critical infrastructure protection. The solution integrates seamlessly with cameras from all major manufacturers and OnSSI’s Ocularis 5 to significantly improve situational awareness and security team effectiveness, as well as lower operational costs. NetApp Video Storage Solutions NetApp’s video storage solution, E2800and E5700 integrates with OnSSI’s Ocularis 5 VMS to provide consistent high-performance and scalability across a variety of industry applications, including shared storage infrastructure and dedicated storage solutions. The integration of the two products delivers access for media content needs, with the ability to handle heavy computational workloads and bandwidth-intensive streaming environments of today’s video surveillance infrastructures.Ocularis 5.5 is the latest update to OnSSI’s VMS platform that includes new integrations and automation functions “Our technology partnerships play a critical role in providing powerful surveillance solutions that help security professionals successfully mitigate security risks,” said Ken LaMarca, VP of Sales & Marketing, OnSSI. “We are excited to leverage the ConvergenceTP, CyberExtruder, Jemez Technology, and NetApp technology to further enhance the capabilities of OnSSI’s Ocularis 5.5 VMS solution.” Increased Performance And Cost-Efficiency Ocularis 5.5 is the latest update to OnSSI’s VMS platform that includes new integrations and automation functions that increase overall performance and cost-efficiency. Ocularis 5.5 is available in three models: Professional, designed for organizations operating multiple locations with small to mid-sized camera counts; Enterprise, built for a wide range of mid to large IT-centric organizations; and Ultimate, created for large organizations with extended command and control needs and recording server failover.
AMAG Technology, a provider of access control, video management, identity management and visitor management solutions, announces the latest addition to their portfolio: RISK360. This solution is a robust, global Incident and Case Management system that investigates and analyses incidents to help organizations operate more efficiently, save money, enforce compliance and mitigate risk. RISK360 is a highly configurable, workflow based solution that empowers security teams to capture information, perform assessments and identify risks, giving companies a clear picture of what is happening on their premises. Organizations can track the time and expenses spent on incidents, monitor resource allocation and use that data to streamline processes and save money. Robust reporting with customized dashboards help companies work smarter and meet compliance requirements. “RISK360 saves valuable time and resources by automating incident and case management reporting,” said AMAG Technology President, Kurt Takahashi. “By understanding how events unfold, organizations can automate workflows and capture the right information to report, track and resolve every case.” Events in RISK360 are communicated to Symmetry Access Control, and alarms in Symmetry generate events in RISK360 Integration With Symmetry Access Control Software Available as a Software as a Service or as an on-premise solution, RISK360 operates on all modern browsers and mobile operating systems including IOS, Windows and Android. RISK360 integrates seamlessly with Symmetry Access Control software. Events in RISK360 are communicated to Symmetry Access Control, and alarms in Symmetry generate events in RISK360. The integration creates Be On the Lookout (BOLO) flyers and automatically terminates a user’s access in Symmetry, providing a safer environment. RISK360 also helps manage security personnel with guard tours, daily activity reports and passdown logs. Users can leverage computer aided dispatch to identify the closest available responders, saving time and improving efficiencies. Organizations can also capture site specific information using geospatial analysis, perform assessments and notify teams of risk.
Trace Eye-D, a South Florida security technology company, has announced that they have received ISO Certification 9001:2015 from BQC Certifications. ISO 9001:2015 is the international standard for specifying requirements for a quality management system (QMS) used by organizations to demonstrate the ability to consistently provide products and services that meet customer and regulatory requirements, according to the American Society for Quality. Trace Eye-D underwent a stringent evaluation process that included quality management system development, documentation review, internal audits, and Internal Audit Training conducted by SpecAudit, a Florida-based ISO consulting company. “We believe that our decision to become ISO 9001:2015 certified is a proactive one that not only anticipates the demands of our customers, but also demonstrates our commitment to providing quality products and services,” says Chris Baden, president of Trace Eye-D. “This certification is the culmination of months of consistent, top-quality work and the dedication of our employees at Trace Eye-D.” This certification further strengthens our commitment to adhere to our company policies for continually improving the products and services" Continuous Improvement To maintain certification, BQC Certifications will perform annual audits to ensure compliance and to assess initiatives for continued improvement. In addition to the ISO 9001:2015 requirements, Trace Eye-D has incorporated three Good Manufacturing Practice (GMP) processes to ensure the highest quality of products for customers. “This certification further strengthens our commitment to adhere to our company policies for continually improving the products and services that will meet or exceed our customers’ expectations,” says Baden. “Our customers can be confident that Trace Eye-D is dedicated to maintaining the highest effectiveness and responsiveness in achieving our goal of total customer satisfaction.”
Internet of Things (IoT)-based attacks are already a reality. A recent CEB, now Gartner, survey found that nearly 20 percent of organizations observed at least one IoT-based attack in the past three years. To protect against those threats Gartner, Inc. forecasts that worldwide spending on IoT security will reach $1.5 billion in 2018, a 28 percent increase from 2017 spending of $1.2 billion. Factors such as Endpoint Security, Gateway Security and Professional Services will be the main drivers of spending growth Externalizing Network Connectivity "In IoT initiatives, organizations often don't have control over the source and nature of the software and hardware being utilized by smart connected devices," said Ruggero Contu, research director at Gartner. "We expect to see demand for tools and services aimed at improving discovery and asset management, software and hardware security assessment, and penetration testing. In addition, organizations will look to increase their understanding of the implications of externalizing network connectivity.” Factors such as Endpoint Security, Gateway Security and Professional Services will be the main drivers of spending growth for the forecast period with spending on IoT security expected to reach $3.1 billion in 2021. Hindrance In IoT Security Despite the steady year-over-year growth in worldwide spending, Gartner predicts that through 2020, the biggest inhibitor to growth for IoT security will come from a lack of prioritization and implementation of security best practices and tools in IoT initiative planning. This will hamper the potential spend on IoT security by 80 percent. "Although IoT security is consistently referred to as a primary concern, most IoT security implementations have been planned, deployed and operated at the business-unit level, in cooperation with some IT departments to ensure the IT portions affected by the devices are sufficiently addressed," explained Mr Contu. "However, coordination via common architecture or a consistent security strategy is all but absent, and vendor product and service selection remains largely ad hoc, based upon the device provider's alliances with partners or the core system that the devices are enhancing or replacing." Gartner expects specific and stringent regulations, especially in heavily regulated industries such as healthcare and automotive Security By Design While basic security patterns have been revealed in many vertical projects, they have not yet been codified into policy or design templates to allow for consistent reuse. As a result, technical standards for specific IoT security components in the industry are only now just starting to be addressed across established IT security standards bodies, consortium organizations and vendor alliances. The absence of "security by design" comes from a lack of specific and stringent regulations. Going forward, Gartner expects this trend to change, especially in heavily regulated industries such as healthcare and automotive. IoT Impact On Industrial Security By 2021, Gartner predicts that regulatory compliance will become the prime influencer for IoT security uptake. Industries having to comply with regulations and guidelines aimed at improving critical infrastructure protection are being compelled to increase their focus on security as a result of IoT permeating the industrial world. "Interest is growing in improving automation in operational processes through the deployment of intelligent connected devices, such as sensors, robots and remote connectivity, often through cloud-based services," said Mr Contu. "This innovation, often described as Industrial Internet of Things or Industry 4.0, is already impacting security in industry sectors deploying operational technology, such as energy, oil and gas, transportation, and manufacturing."
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting eventsThe IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis And Application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyze data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant Access To Connected Devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyze this data is of imperative importance. Real Time Data Storage Availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing Stored Data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilize surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many states require a clearly posted sign indicating audio recording is taking place in an area before a person enters. Analytic information derived from audio can be a useful tool and when implemented correctly, removes any concerns over privacy or legal compliance. Audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Focused Responses To Events Audio analytics processed in the camera, has been a niche and specialized area for many installers and end users. This could be due to state laws governing audio recording, however, audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Processing audio analytics in-camera provides excellent privacy since audio data is analysed internally with a set of algorithms that only compare and assess the audio content. Processing audio analytics on the edge also reduces latency compared with any system that needs to send the raw audio to an on-premises or cloud server for analysis. Audio analytics can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Microphones And Algorithms Having a SoC allows a manufacturer to reserve space for specialized features, and for audio analytics, a database of reference sounds is needed for comparisonMany IP-based cameras have small microphones embedded in the housing while some have a jack for connecting external microphones to the camera. Microphones on indoor cameras work well since the housing allows for a small hole to permit sound waves to reach the microphone. Outdoor cameras that are IP66 certified against water and dust ingress will typically have less sensitivity since the microphone is not exposed. In cases like these, an outdoor microphone, strategically placed, can significantly improve outdoor analytic accuracy. There are several companies that make excellent directional microphones for outdoor use, some of which can also combat wind noise. Any high-quality external microphone should easily outperform a camera’s internal microphone in terms of analytic accuracy, so it is worth considering in areas where audio information gathering is deemed most important. Surveillance cameras with a dedicated SoC (System on Chip) have become available in recent years with in-built video and audio analytics that can detect and classify audio events and send alerts to staff and emergency for sounds such as gunshots, screams, glass breaks and explosions. Having a SoC allows a manufacturer to reserve space for specialized features. For audio analytics, a database of reference sounds is needed for comparison. The camera extracts the characteristics of the audio source collected using the camera's internal or externally connected microphone and calculates its likelihood based on the pre-defined database. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS Configuring A Camera For Audio Analytics Audio DetectionThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Noise ReductionA simple threshold level may not be adequate enough to reduce false alarms depending on the environment where a camera or microphone is installed. Noise reduction is a feature on cameras that can reduce background noise greater than 55dB-65dB for increased detection accuracy. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup. With noise reduction enabled, the system analyzes the attenuated audio source. As such, the audio source classification performance may be hindered or generate errors, so it is important to use noise reduction technology sparingly. Audio Source ClassificationIt’s important to supply the analytic algorithm with a good audio level and a high signal-to-noise ratio to reduce the chance of generating false alarms under normal circumstances. Installers should experiment with ideal placement for both video as well as audio. While a ceiling corner might seem an ideal location for a camera, it might also cause background audio noise to be artificially amplified. Many cameras provide a graph which visualises audio source levels to allow for the intuitive checking of noise cancellation and detection levels. Messages And EventsIt’s important to choose a VMS that has correctly integrated the camera’s API (application programming interface) in order to receive comprehensive audio analytic events that include the classification ID (explosion, glass break, gunshot, scream). A standard VMS that only supports generic alarms, may not be able to resolve all of the information. More advanced VMS solutions can identify different messages from the camera. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customizable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Twitter has around 350 million active users a month, all eagerly posting 280-character “tweets” about the world around them. It’s a vast amount of data from all over the globe. Security professionals have begun to appreciate the value of mining all that data for insights to help them protect people, assets and operations. One company leveraging the Twitterverse to provide real-time situational awareness to corporate security end users is Dataminr.Dataminr assembles this information flow into a useful timeline that summarizes the ongoing sequence of events Algorithms For Actionable Security Signals The New York-based technology company has developed algorithms that comb through the full Twitter dataset to provide actionable signals to security professionals around the world about security-related events as they unfold. For corporate security, early information about an unfolding event enables them to take action faster in order to secure their people, locations and business operations. “OMG! Just heard a loud bang on the quad,” a tweet might declare. Combined with location information gleaned from a cell phone, such a tweet could be the first indicator of an unfolding security incident. As an event unfolds, hundreds of such tweets are likely to be posted from the surrounding areas, collectively offering a running narrative of developing events. Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events. Many times, tweets are the first information available from an incident even before the arrival of first responders.Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email “Early notification allows security professionals to be more proactive,” says Dillon Twombly, SVP, Corporate Sales at Dataminr. “We have a broad range of users across Fortune 1000 companies, and also including country security managers, security operations centers, and executive protection. "In retail, we provide information for security operations or loss prevention. Events sometimes have a potential to spin out of control, and we allow security professionals to react faster and get ahead of an event proactively.” Various Security Platforms Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email. The system can be integrated with a company’s workflow, and the software interfaces with various security platforms, such as physical security information management (PSIM) systems. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event Dataminr addresses all regulatory and legal concerns, and it is GDPR-compliant. However, privacy is generally not a big concern because Twitter data is posted publicly, and Dataminr gleans information related to a specific event, not a specific Twitter user’s individual data. “Over the past couple of years, we have grown the security vertical,” says Twombly. “The market is receptive to the value of social media as a tool for users tasked with responding in a comprehensive way to a range of issues.”The company’s services are useful across the full range of vertical markets in the security industry Public Safety And Security In addition to security and public safety applications, Dataminr also provides services to financial companies and even media outlets. In fact, the 9-year-old company started in finance, where stock or currency traders were able to leverage breaking news notifications to make decisions faster. In the media vertical, Dataminr provides information to 500 newsrooms globally. Public safety and security uses have evolved, and Twombly currently spearheads the company’s work in corporate security, calling on his experience in the security world. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event.Customers can customize the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter Tracking Twitter posts enables a company to get ahead of an evolving story and help to shape the narrative. Twombly says Dataminr has “deep and broad relationships” with corporate customers and delivers information that can possibly be used by multiple departments in an organization. The company’s services are useful across the full range of vertical markets in the security industry, from transportation to major industrials to financial services to energy. In the education vertical, major universities are customers, as are local school districts. Customers can customize the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter. Twombly says the company’s software is constantly evolving and being fine-tuned in response to changing needs. Dataminr is a “strategic partner” of the social media giant and works closely with them on product development, he adds.
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access control devices to become an integral part of a security system for assets and people with the highest level of protection. They sought locks to offer a durable, secure and flexible alternative to standard mechanical security. They found an easy, electronic way to administer a powerful, user-friendly system based on battery-powered physical keys and secure, advanced microelectronics. Flexible High-Security Locking Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorized access permissionsCreval chose eCLIQ key-based wireless access control for its banking premises. Bank doors across the Lombardy region are guarded by more than 30 durable eCLIQ cylinders, putting Creval managers in complete control of entrance security. eCLIQ is a scalable electronic extension of the CLIQ access control system deployed in critical infrastructure sites across Europe. Cylinders are fully electronic, protected against manipulation and with 128-bit AES encryption built into both lock and key microelectronics. Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorized access permissions. Time-Limited Access Rights Creval’s security manager is now able to grant access based on scheduled times and specific doors, and right down to the level of the individual site user. It is also straightforward to set time-limited access rights for a user key, increasing security if a key is lost. Audit trails and event logs are collected to the same, fine-grained degree. Key management is easy with software operated from a local PC or securely on the web via a standard browser. In the unlikely event a key is misplaced, Creval administrators simply delete its validity from the system. “We are satisfied with the results of the new access control system,” says Claudio Brisia, Logical Security Manager at Creval headquarters in Sondrio.
The Security Industry Association (SIA) has expressed strong support for MI HB 5828 and HB5830, two bills designed to improve school security across the state of Michigan. Michigan Legislation In a letter to Michigan House of Representatives Committee on Appropriations Chairwoman Laura Cox and Vice-Chair Rob VerHeulen, SIA CEO Don Erickson praised the bills’ creation of a comprehensive school plan and fund to enable local districts to procure security solutions to protect students from malicious perpetrators and update building code requirements to include security measures. “Sadly, our nation’s schools have increasingly become a soft target for mass violence – at Sandy Hook Elementary, recently at Stoneman Douglas High School and in many other attacks,” said Erickson. “We support holistic approaches to improving school safety and security in response to these tragedies – recognizing there is no single action that can be taken that will, by itself, make our schools safe.” SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts Improving School Security SIA represents about 900 security and life safety solutions providers – companies that develop, manufacture and integrate technologies that help keep people and property safe from hazards. These industry leaders strive to introduce robust security solutions integrated into our nation’s K–12 public schools, private academic institutions, colleges and universities. In addition to serving member organizations working to improve security in schools and other environments, SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts that developed threat- and income-based guidelines for schools housing grades K–12 to implement appropriate, layered security measures. These guidelines are available to help guide school investments. Additionally, PASS provides integrators with risk assessments and white papers that can be used when working with schools to evaluate and establish the best security protections for their buildings. SIA believes state assistance like that in the Michigan legislation is a start to addressing key security gaps in schools and is especially critical to high-risk school districts or those with limited budgets.
A new Concierge and Physical Security Information Management (PSIM) solution from Intergrated Security Manufacturing (ISM) is protecting two tower blocks in Haringey, enabling authorized council employees to control door access and manage fire and security systems from anywhere within the council’s estate. Newbury House, Finsbury House, John Keats House and Thomas Hardy House in Wood Green, London, already feature four of ISM’s state-of-the-art Ultimate door entry systems as well as another two, third-party technology systems (Elizabeth Blackwell and George Lansbury) from Entrotec, utilising its Apex Dual path speech technology. Thanks to the Genesys PSIM from ISM, multiple technologies can be controlled, regardless of the manufacturer, providing enhanced security to residents in 510 flats across the six towers. This delivers greater flexibility and control, eliminates the potential disruption caused by installing new equipment, and protects the council’s legacy investment. It also means that further buildings with existing ISM or Entrotec systems can be added as required with only minimal additional investment. Integrated Security System Genesys allows the integration not just of door entry systems, but also multiple systems from multiple manufacturers – all from one holistic integrated security system. Every electronic security or fire safety device from CCTV and intruder alarms to electronic locking and public address can be monitored and controlled from a single platform. Most importantly, it features Migrating 3+ technology, a patented automatic failover technology that adds higher levels of automatic configurable redundancy and power. Control is effectively distributed across multiple workstations. "To improve our efficiency and give faster responsesto our residents we neededto provide conciergeservices to all our estates" Len Fevrier at Homes for Haringey has been impressed with the system and how it has performed so far: “We have used the ISM Ultimate door entry products and its Genesys 2 control room software platform extensively in the Borough over many years and have enjoyed excellent product reliability and technical support. To improve our efficiency and give faster responses to our residents we needed to provide concierge services to all our estates,” he says. “The development of the Entrotec integration into the Genesys platform, allowed Haringey to combine technology, including CCTV and fire, without going to the expense of replacing legacy door entry equipment unnecessarily. This delivers a much-needed saving during these challenging economic times for local councils, and we plan to roll this system out across the rest of the Broadwater Farm Estate and potentially other sites in the borough.” Intuitive Software Managing Director of ISM, Stephen Smith, says this project is a perfect example of the flexibility of Genesys and its door entry system range: “Genesys is a ‘true’ PSIM system built around intuitive software that combines a range of industry leading features and benefits including an enhanced graphical user experience and 3-D modeling and a comprehensive event management database. Events and alarms from any integrated security application are presented to the operator clearly as and when they happen.” The PSIM software operates as a standalone platform over LAN or WAN networks for remote and local sites with workstations that can be transferred to any operating security control room on the network. This offers the end user flexibility when closing down sites or buildings for off-peak or out of normal working hours or in the unlikely event of any system failures. Ultimate is a fully addressable digital telephone entry system that is robust in design and easy to install. Unlike other door entry systems on the market it has multi speech paths that allow numerous conversations to be had at one time Such was the complexity of the project, that from initial design of the system to completing the installation took around two years to complete. Fire alarms, access control and CCTV can all now be controlled from one computer from any of the Council’s network.
The town of Morbegno in the Italian Alps near the Swiss border will be relying on the competence of Bosch Energy and Building Solutions Italy to boost energy efficiency in its public buildings and other facilities within the scope of a long-term project financing contract. 2017 Safe Parks Project Among other things, it includes installing LED technology in all public lighting and in the interior lighting systems of municipal buildings, upgrading the municipal heating systems while continuing to maintain the existing district heating network, bringing the fire protection systems and warning signs in all municipal buildings into line with current standards, installing new public lighting systems within the scope of the “Progetto Parchi Sicuri 2017” (2017 Safe Parks Project) and carrying out both routine and any required special maintenance of the upgraded systems. The contract also calls for modernizing panelboards and replacing over 15,000 meters of power lines, installing a solar power system and an air-water heat pump, and implementing a number of “smart city” functions such as a 24/7 call center, remote control and management of systems, and new photovoltaic systems on municipal facilities with total capacity of 45 kWp. Improved Energy Efficiency Under the terms of the contract, Bosch Energy and Building Solutions Italy will plan and implement all of the measures and ensure that everything works properly over the next 20 years. “The contract with Bosch will give our town technologically advanced, high-quality equipment and systems,” says engineer Giorgio Ciapponi, who is responsible for the project on the Morbegno town council. “We’re also confident that we will save money in the long term by having Bosch maintain and operate our systems.” Carlo Papi, Commercial Director of the Public Administration Division of Bosch Energy and Building Solutions Italy, explains: “Working with a certified energy service company (ESCo) like us is a way for small communities like Morbegno to significantly improve their energy efficiency. The available public funding often isn’t enough. We’re going to invest 2.63 million euros in this project.”
Following the recent attack in Parsons Green, the joint terror analysis center increased the terrorism threat level to the UK from severe to critical. As a result, the government carried out additional counter-terrorism operations around the country to help protect people in public places. Securitas took the decision to proactively support the emergency services and military operations by asking their Protective Services Officers to provide additional patrols at transport hubs across the UK. Additional Security Patrols Over the weekend – 16-17 September 2017 – their teams completed an additional 223 patrols, in addition to their normal security duties, providing visible, uniformed reassurance and completing security patrols in crowded places. They co-ordinated these activities though their Securitas UK Operations Centre (SOC) and from the moment they made the decision, their mobile teams immediately provided on-the-ground support. Vigilance Against Security Threats Securitas pride themselves on providing total security – protecting people and property. In a world of ever-present security threats, we all have an increasingly important role in keeping each other safe, too. The current threat level for international terrorism in the UK has dropped from critical to severe, however they encourage everyone to remain vigilant and report any suspicious behavior or activity to the Anti-Terrorism Hotline or emergency services.
Digital Barriers plc is pleased to announce that its ThruVis thermal screening camera technology was deployed by G4S to enhance security at the Manchester “One Love” Concert at the Emirates Old Trafford Cricket Ground, Manchester on the 4th June, 2017 and throughout the week of the British Summer Time event at Hyde Park, London 3-9th July 2017. Manchester “One Love” Concert Digital Barriers and G4S offered their services to the organizers of the One Love concert, responding to the need for additional security assurance. The event’s security infrastructure, including ThruVis, protected an audience of 50,000 visitors, as well as staff and artists including Liam Gallagher, Coldplay, Katy Perry and Robbie Williams. British Summer Time Event At the British Summer Time event in Hyde Park, ThruVis was deployed for the whole week both at VIP entrances and also at public gates, screening at rates of up to 1,000 people per hour. A total of 50,000 people were screened by ThruVis through the week at an event headlined by artists such as Kings of Leon, The Killers and Tom Petty and the Heartbreakers. Additional Security Assurance G4S chose to use ThruVis as it provides a unique new security capability. Firstly, it offers additional security assurance by seeing non-metallic threats like explosives and ceramic knives, as well as guns, at distances in excess of 5m. Secondly, as a thermal camera, it is completely safe and respectful of personal privacy. Finally, by reducing queuing times and minimizing the need to divest clothing, ThruVis dramatically improves the visitor “experience”, as shown by the 98% satisfaction rating from visitors screened at Hyde Park. Enhanced Security At Minimal Inconvenience G4S Director of Events Eric Alexander, said, “We used Digital Barriers' ThruVis passive screening solution, to support our security arrangements at the event. We recognize that new security innovations play an important role in strengthening our capability and increase the public's confidence in the measures we use to keep them safe.” Colin Evans, Chief Operating Officer at Digital Barriers, said, “The public expects enhanced security around high profile public events and would prefer this to be provided with minimal further inconvenience. We are confident ThruVis is the only security technology available today that meets this need and we are delighted to be working with G4S to make this important new capability widely available.”