Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the IMP-C1000-SFP-bt series. Antaira Technologies’ IMP-C1000-SFP-bt series is a compact, IP30 rated, gigabit Ethernet-to-fiber media converter featuring a 10/100/1000Tx Ethernet port. It supports IEEE 802.3af/at and bt high power...
Allot Ltd., a globally renowned provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has launched Allot BusinessSecure, a new solution that CSPs can offer their SMB and enterprise customers to protect them from emerging cyber security threats, including malware, phishing, ransomware and crypto-mining, while increasing revenue. Allot BusinessSecure Allot BusinessSecure is the newest member of the All...
3xLOGIC, Inc., a globally renowned provider of integrated, intelligent security solutions, has announced extended deadlines to sign up and complete its free infinias and VIGIL certification training courses, as well as sister company, Sonitrol’s CLOUD Access and mySonitrol.net courses. Sign up for zero-cost training now ends on 31 May, 2020 and participants have 30 days to complete the courses, even if they sign up on the last day of registration. eLearning Academy During these challeng...
The Security Industry Association (SIA) is now accepting applications for its new scholarship program, the SIA Women in Security Forum Scholarship program. This initiative, developed by the SIA Women in Security Forum, which offers programs, professional development opportunities and networking events to support the involvement of women in the security industry, will offer multiple scholarships worth at least US$ 3,000 each to further educational opportunities for awardees and help them t...
The security networks have evolved from where they were 20 years ago. With these changes, there have been many amazing advances in the scope of technology and the connectivity between the systems that comprise modern complex security systems. All these advancements have also brought concerns on how to secure these systems and the data within them. When looking through the headlines, it seems a new data breach or network vulnerability is exposed daily, and this is why securing the system should...
ThreatQuotient™, a security operations platform innovator, announces enhancements to their professional services offering, including new Assessment and Consulting Services. First launched in 2017, ThreatQuotient’s global Professional Services team has continuously evolved to meet and exceed the changing needs of organizations at all levels of security operations and threat intelligence maturity. By providing the core capabilities to assess, design and build a threat-centric security...
Following many years of successful collaboration in the Security Systems sector, CSL and Business Insight 3 (BI3) will expand their partnership to incorporate the growing Business Intelligence market. CSL’s expert solutions, including CSL Router, will be supplementing BI3’s newest offerings to provide secure, reliable and rapidly deployable connectivity. Business Intelligence Business Intelligence focuses on the collation and analysis of data and metrics, based on the behavior and movements of customers, visitors, and staff. In today’s world, visitor and occupancy data insights are vital for businesses that remain operating and are making plans to re-open to the public. However, the limitations in place are likely to vary and there is a greater need than ever for flexibility. CSL Router set up and configuration CSL is enabling BI3 to provide remote set up, configuration and ongoing maintenance of their systems, via CSL Router CSL is enabling BI3 to provide remote set up, configuration and ongoing maintenance of their systems, via CSL Router. Additionally, CSL Router’s 4G connectivity ensures that the data providing real time insight and management reporting is always successfully transferred from the premises to BI3’s reporting platform. This ensures there are no delays in dealing with any issues ‘on the ground’ as and when they happen – providing peace of mind to BI3’s customers. CSL – BI3 partnership BI3’s Head of Operations and Business Intelligence, Richard Eaves, commented, “The demand for instant connectivity in the security and business sectors have been increasing significantly over the past few years.” Richard adds, “Today we see this as one of the main challenges facing the industry and we are therefore delighted to extend our partnership with CSL. Their 4G Routers allow us to offer our customers a totally independent, reliable connectivity solution to enable them to get systems up and running quickly and securely.” CSL’s Sales Director, Rob Evans, added, “CSL Router provides immediate internet connection, with total independence from existing IT networks. This is all backed up with maximum reliability via multiple 4G Roaming SIMs and is fully encrypted for complete end-to-end connectivity.”
ADT, globally renowned security and automation provider that serves residential and business customers, has announced that it is providing US $1 million, through its ADT Always Cares program, to support over 100 non-profit organizations in 44 states and Puerto Rico affected by COVID-19. ADT Always Cares program The funds are being allocated in US $5,000 and US $10,000 increments to nonprofits in communities where ADT employees live and work. Local ADT teams are determining which charities to support with choices ranging from soup kitchens and homeless shelters to first responder organizations or any other nonprofit which serves those in need. “All of us at ADT are immensely grateful to our hometown heroes on the front lines who are selflessly continuing to serve their communities while facing the unique challenges of a COVID-19 environment,” said Jim DeVries, President and CEO of ADT. Jim adds, “Through our giving, we are supporting local organizations who share our passion and commitment to create safer neighborhoods, improve lives and help make the world a better place.” COVID-19 relief fund One of the first US$ 10,000 recipients will be Gleaners, an Indianapolis food bank The check presentations will start May 18 and continue through June, 2020. One of the first US$ 10,000 recipients will be Gleaners, an Indianapolis food bank that has distributed over a half a billion pounds of food since 1980. “Gleaners is navigating the hunger relief crisis associated with COVID-19. We are grateful for the ADT contribution which will help us provide emergency food boxes throughout our service area to hungry Hoosiers, many of whom find themselves struggling to put food on the table for the first time,” said John Elliott, President and CEO of Gleaners. LifeSaver celebrations to support police, fire departments As part of ADT’s award-winning Always Cares program, employees volunteer more than 20,000 hours each year benefiting hundreds of non-profit organizations and touching the lives of thousands in need. Examples of support include providing meals through local food banks, building homes with Habitat for Humanity, beautifying Ronald McDonald Houses and much more. ADT also supports police and fire departments through its LifeSaver celebrations, a signature program that recognizes ADT employees and first responders who help save the lives of ADT customers.
ExtraHop, the provider of cloud-native network detection and response, issued a report detailing rapid substantial changes in device usage trends as businesses shifted their operations in March due to COVID-19. The report also warns of the security complexity and risks posed by connected devices, both those used by employees at home, and those left idle but connected to the office network. While there are many lenses through which to explore the ways in which COVID-19 is reshaping business operations, connected devices, including internet of things (IoT) devices, and the ways in which people and organizations interact with them tell a story all their own. Business-Related device activity Steep decline in connected devices at the office raises concerns about questionably secure local networks Using anonymized, aggregate data from across its global user base, ExtraHop analyzed business-related device activity during a one week period at the end of March 2020. This data was compared to activity from a similar study of the same global user base conducted in November 2019. The results reveal not only patterns that illuminate the state of work during the COVID-19 crisis, but also the long-term security implications of a distributed workforce. Key findings from the report include: Steep decline in connected devices at the office raises concerns about questionably secure local networks: ExtraHop observed a 65 percent decline in the number of laptops and a nearly 70 percent decline in the number of smartphones connecting directly to corporate networks in March 2020. Securing local networks That said, the fact that these devices are no longer connected to the corporate network doesn’t mean they’re not connected at all. Employees are still accessing corporate resources, often relying on questionably secure local networks that lack the safeguards of the office network and thus are more exposed to malware. Vast majority of office phones and printers are still plugged in, exposing risk: The number of connected IP phones declined by just 7.5 percent, indicating that many of these devices remain on and connected even when no one is using them. According to ExtraHop data, nearly 25 percent of those VoIP devices are Cisco IP phones, for which a critical vulnerability (CVE-2020-3161) was announced in April. Printers – at high risk for vulnerabilities and one of the most common targets of hackers – showed even smaller declines in connectivity, dropping by just 0.53 percent. Physical security cameras Connections from security cameras increased by 47 percent in March Spike in physical security cameras: Connections from security cameras increased by 47 percent in March, indicating that many organizations are taking additional precautions against physical intrusion or nefarious activity. Unfortunately, these devices can also expose organizations to cyber risk. Like IP phones and printers, they often have vulnerabilities and have been observed phoning data home. And don’t forget the treadmills: The connections to the network from treadmills declined 100% when office gyms were some of the first aspects of office life to close down. But the connectivity of treadmills underscores the extent to which every device is now a connected device. IT and security departments now have a much broader attack surface to secure, even the office gym. Availability of applications and critical resources “The almost overnight shift to remote work required a massive effort just to ensure the availability of applications and critical resources for employees outside the office,” said Sri Sundaralingam, Vice President, Cloud and Security Solutions at ExtraHop. “For many organizations, the management of IoT and other connected devices may have been an afterthought, or at least something they didn’t anticipate having to handle long term. As availability and security issues surrounding remote access become more settled, this needs to be an area of focus.”
Maximize the effectiveness of the installed security system by providing the family and business with an even higher level of protection. The SVGS Series is a shock, vibration and glass break sensor, designed to provide early warning of an attempted intrusion by sensing forced entry before a burglar actually enters the property. This wireless shock sensor is lightweight and easy to install on any glass window, door, roof, or safety box and capable of detecting two different types of forcible attacks, a single major shock event, or accumulated consecutive minor shock attacks. The SVGS F1 models leverage Climax’s industry renowned RF technology to accelerate the speed of signal transmission and deliver reliable, extensive communication range, allowing users to stay in touch, in control, and provide a peace of mind. Smart home system The SVGS Series is a broadly applicable device ready to make users home or business safer and smarter When the SVGS Series are linked with security or smart home system, it can activate a siren, turn on lights, music, or start video recordings when the glass is tampered with, which is often enough to send an intruder running. The SVGS Series’ discreet design makes it unobtrusive and has three adjustable sensitivity threshold levels to choose for different situations and locations. The SVGS-5 model features two-way signal, allowing for setting configurations to be easily adjusted through the security gateway or control panel. The SVGS Series is a broadly applicable device ready to make users home or business safer and smarter. Features Early detection of break-in attempts of glass windows, doors, roof, or safety boxes Detects major shock attack or accumulated minor shock attacks Adjustable sensitivity threshold levels: Low, Medium, High F1 technology accelerate the speed of signal transmission, reliability, and boots communication range. (F1 models only) LED indicator Setting configuration locally on device (SVGS-3 only) Setting configuration remotely on device via Control Panel (SVGS-5 only) Wireless and lightweight for easy installation Works on glass, plywood and safety box Low battery indicator Regular supervision signals to check system integrity Suitable for residential and commercial security usage Specifications SVGS-3-F1 Frequency - 868MHz / 869MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 5.5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-3 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 3.5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-5-F1 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-5 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 2.6 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm Ordering Information SVGS-3-F1 - Shock / Vibration & Glass Break Sensor, compatible with Climax F1 Control Panels and extensive RF range SVGS-3 - Shock / Vibration & Glass Break Sensor, setting configuration on device SVGS-5-F1 - Shock / Vibration & Glass Break Sensor, setting configuration on Gateway or Control Panel, compatible with Climax F1 Control Panels and extensive RF range SVGS-5 - Shock / Vibration & Glass Break Sensor, setting configuration on Gateway or Control Panel
Nedap Identification Systems is excited to share the upcoming OSDP upgrade within Nedap’s long-range RFID reader portfolio for automatic vehicle identification. The portfolio will be upgraded and compatible with V.2.1.7 of the Open Supervised Device Protocol (OSDP) standard. This upgrade supports the interoperability of the company’s reader portfolio with a growing number of access control and security products. Over the last few years, an increasing number of access control panel manufacturers is supporting OSDP technology and this upgrade enables seamless integration supported by a highly secured communication standard. Nedap will make OSDP V2.1.7 available for both its TRANSIT and uPASS long-range RFID product line. Automatic Vehicle Identification specialist Nedap is specialized in advanced solutions for Automatic Vehicle Identification for over the past decades Open Supervied Device Protocol (OSDP) standard OSDP has been developed by the Security Industry Association (SIA). According to the SIA, OSDP offers high security and advanced functionalities. The protocol enables bi-directional and encrypted communication based on Secure Channel Protocol (SCP). In addition, for example, OSDP enables monitoring wiring to protect against attack threats. Due to the fact that OSDP is offering secure and bi-directional communication between the reader and third party controller platform, the OSDP upgrade enables security professionals to simplify secured vehicle access. Nedap is specialized in advanced solutions for Automatic Vehicle Identification for over the past decades. A unique portfolio is developed by Nedap full with high performance long-range RFID and License Plate Recognition systems. Vehicle access control Nedap has been at the forefront of simplifying secure vehicle access for decades, while keeping the high accuracy in mind. Security and Parking professionals have been able to improve their operations by benefitting from the latest automatic vehicle identification solutions, by choosing Nedap technology. Nedap Identification Systems encourages technical specialists to order a demo kit and validate OSDP in vehicle access control applications. For the security professionals OSDP compliancy offers a great opportunity to talk to the technician’s customer base about the relevancy of OSDP in security and access control. In case of any queries, Nedap also encourages to make contact with their team. To give the users a complete picture of the opportunities of their updated RFID reader portfolio, Nedap Identification Systems organizes a webinar on the 14th of May, 10.00 AM (CEST). Long-range RFID portfolio Within this webinar, Ido Wentink (Proposition Manager) and Hans Rappard (Product Specialist), will present in 30 minutes all ins and outs about Nedap’s OSDP upgraded long-range RFID portfolio. Readers who would like to attend the webinar can register using the link given on the company’s official website.
PointCentral, an Alarm.com company, has acquired New York-based Doorport, Inc. With the acquisition, PointCentral will add a unique smart intercom capability to the PointCentral Smart Property Management solution. Doorport‘s innovative smart intercom solution improves building access security and convenience at multifamily properties for residents, guests, property managers, and delivery personnel. The acquisition accelerates PointCentral’s push to provide a complete IoT solution that combines resident wants with property manager needs. PointCentral Smart Property Management From a single integrated platform, PointCentral Smart Property Management will offer mobile device-initiated access to buildings and smart apartment technology along with robust building security, property management and unattended showing capabilities. Multi-family rental properties have widely deployed traditional intercom systems to facilitate visitor access. Doorport’s cellular-based system provides property owners with a simple retrofit solution that smart-enables existing intercoms without needing to extend Ethernet or Wi-Fi to the intercom unit or requiring all-new intercom hardware installations. Building and unit level access management Doorport’s system will be integrated into the PointCentral platform to provide a complete smart property solution PointCentral customers can set up Doorport for their properties at a fraction of what other smart intercom solutions cost. Doorport’s system will be integrated into the PointCentral platform to provide a complete smart property solution, combining building and unit level access management with a best-in-class smart rental experience. “Intercoms play a vital role in helping residents and property managers verify and control who gains access to a building,” said Sean Miller, President of PointCentral, adding “Property managers and residents alike want a seamless curb-to-couch solution that conveniently and securely manages front door access for guests as well as service and package delivery”. Asset protection Sean further said, “Doorport allows us to provide a complete range of solutions in a well-integrated comprehensive product suite. A key strength of the PointCentral open platform is our third-party integrations that give property managers choice. While we see Doorport as a best-in-class solution, especially for retrofits, we will continue to invest in our ecosystem integrations with other smart intercom solutions.” PointCentral helps property managers transform short- and long-term rental properties into state-of-the-art smart apartments and connected communities. PointCentral is backed with onsite sales and service support provided by a nationwide network of smart property service providers. PropTech for residential properties PointCentral’s Smart Property Management platform, powered by Alarm.com, provides building owners and managers numerous benefits including operational efficiencies, asset protection, and enhanced property values through smart resident and guest amenities. “We couldn’t be more excited to join forces with PointCentral and Alarm.com,” said Ben Taylor, CEO of Doorport, adding “PointCentral is a well-known leader in PropTech for residential properties. We’re confident that by bringing Doorport into the PointCentral platform, we’ll be able to realize our mission of delivering a seamless access experience to renters and smart apartment residents across North America and beyond.”
From drone fleets and autonomous transportation systems to smart homes with computer-controlled lighting, heating, media and security systems, a new group of highly-automated technologies is gripping the popular imagination. These technologies – made possible by the Internet of Things (IoT) – form advanced ecosystems of interrelated devices with the capacity to monitor, detect, communicate and act on the real world independently of human intervention. Promising to fulfil all of our wildest technological dreams and needs, the IoT age has arrived – and it looks like its here to stay. While the consumer applications of IoT tend to receive the most attention, one area that is seeing strong growth in the uptake of IoT devices is workplace safety. Workplace safety costs businesses billions every year, and industries with especially hazardous working environments – Construction, Oil & Gas, Mining, Utilities, Rail, among others – are beginning to adopt IoT technology to help minimize risk and address preventable threats. In addition, as the COVID-19 pandemic surges around us, the phenomenon of ‘social distancing’ and remote working has emerged to help avoid risk of infection. For the many who work across the aforementioned industries however, working from home will not be logistically possible. In order to reduce the burden on hospitals and medical staff, it is now more important than ever to protect employees from having to be treated for preventable injuries. Before exploring these IoT solutions, however, let us first consider some of the key threats faced by workers in these industries. Workplace safety 1 in 5 worker deaths in the US and incurring tens of thousands of short and long-term injuries each year Construction is one of the world’s most dangerous occupations, accounting for 1 in 5 worker deaths in the US and incurring tens of thousands of short and long-term injuries each year. In construction, the major risk is falling from a height, which accounts of 26 per cent of fatal injuries in the workplace. Additional risks come from being struck by vehicles and heavy moving objects, proximity to overhead/underground high voltage power lines, confined spaces, high noise environments, and exposure to dust and fumes. Other industries are often faced with some combination of the above, or similar, threats. In the Rail sector, for instance, there is high risk from collisions with vehicles, objects and machinery and vulnerability to electric shock. In Utilities, the number one risk is slips, trips and falls, accounting for 30 per cent of Lost Workday Injuries (LWIs) in 2016. And in Oil & Gas extraction, exposure to flammable gas, chemical emissions and oxygen-deficient atmospheres creates vulnerability to explosions and chemical poisoning. Tackling threats in a high-tech world What, then, is being done to tackle these threats? In a high-tech world, many safety measures currently in use – hardhats, earplugs, gloves, gas masks, guardrails, harnesses, protective goggles and high visibility clothing – have been in use a long time. While these measures are still fundamental in minimizing risk, companies have now started to integrate IoT technologies to enhance their application. These technologies bring together real-time analytics, machine learning, advanced sensors and embedded systems to offer a number of key functionalities: Physiological monitoring Wearable technology is used to monitor a worker’s physiological state in real-time. Japanese wearable tech company Mitsufuji is active in this space, creating smart clothes woven from silver-metallised fibres that collect a range of data about its wearer, including heart rate and body temperature. Other examples include wristbands with bio-sensors to accurately measure stress levels and glasses that detect eye movements to identify fatigue and periods of micro-sleep. Environmental monitoring Sensors used to measure temperature, radiation, gas leaks, carbon monoxide and other harmful chemicals can automatically alert workers to unsafe external conditions. Additionally, visual imaging software can map 3D representations of a worker’s environment, facilitating effective two-way communication between supervisors and personnel in the field, allowing for remote guidance technologies to provide live assistance to endangered workers (e.g. guiding a trapped miner out of a tunnel). Situational awareness, training and behavioural data Augmented Reality (AR) technologies offer new ways to support decision making in the field by providing holographic representations of physical equipment, while Virtual Reality (VR) technologies offer immersive situational training without the risks associated with real-life procedures. These technologies also offer up valuable behavioral data, which can be used to gauge a worker’s risk tolerance level and alertness in response to incidents. Proximity detection Proximity detection systems utilize wearable sensors to monitor workers’ location, map their movements, and alert them to nearby hazards. One example of this are radio-frequency identification (RFIDs), which can measure a worker’s proximity to moving equipment and alert them to possible collisions and near misses. Another piece of kit is the ‘smart helmet’, which can immediately detect an accident, determine the worker’s location and send an alert containing coordinates to a safety control centre. The centre is able to make video and audio contact and communicate with the worker until help arrives. Exoskeletons Exoskeletons can assist with heavy lifting and the prevention of musculoskeletal disorders (MSDs) by analyzing worker movements and providing the necessary support. The Chairless Chair, for example, used by factory floor workers, fixes around the back and legs to provide support whenever the worker sits or crouches. Exoskeletons are also used to monitor worker movements, identifying repetitive movements and sustained periods of overexertion. IoT technologies and innovations IoT innovations are helping to improve workplace safety on multiple fronts Taken together, these IoT innovations are helping to improve workplace safety on multiple fronts. Firstly, they are preventative. By closely monitoring one’s environment – both internal and external – IoT technologies can pre-empt and alert workers to potential dangers. Secondly, they are responsive. In the case of an accident, IoT technologies can alert supervisors and help coordinate a quick and effective response. Thirdly, they are informative. By accumulating and analyzing rich pools of data, IoT technologies can help optimize work in the field and find improved ways to limit risk.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urgent need to lock the facility down quickly. Security professionals and their teams need access control options that allow lockdowns to occur at the touch of a button. Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities The need for mass notification is also growing in the healthcare environment Fire alarm public address system The need for mass notification – another aspect of responding in an emergency – is also growing in the healthcare environment. Various systems can communicate through the fire alarm public address (PA) system to notify people in an emergency, or, alternately, to use email notification, text messaging, pagers, smart phones and/or personal computers (PCs). In lockdown situations, access control systems provide an emergency button with various triggers in the system – a hospital can lockdown specific units or the entire facility. Data capture form to appear here! Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products, points out that the safety of hospital staff, particularly nurses, cannot be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Duress/emergency notification technology Stankevich says one solution is to use duress/emergency notification technology: staff can carry and wear a ‘panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the recent CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. As of Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. Emergency preparedness systems A major challenge in compliance to this rule is balancing patient safety with comfort At its core, the rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary. Effective response to emergencies “Fortunately, hospitals and their security departments are generally well equipped to respond to most emergency situations”, said John M. White, president/CEO of Protection Management, a consultant who works with hospitals to address their security needs. During the Ebola scare in 2014, however, hospitals had to re-examine their plans to ensure they were prepared to meet the challenges specific to rare and deadly disease. “Hospitals are prepared for most things, but Ebola seemed to have caught the whole world off guard, so people responded in different ways,” says White, who previously was security director of two multi-campus medical facilities before becoming a consultant. Hospital security Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients" He adds, “Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients and to protect other patients and staff. It was a new threat that healthcare organizations had not specifically addressed.” A particular concern was the possibility of an infected person walking into an emergency room and infecting other people and/or requiring facility decontamination. One role the hospital security department plays in such an emergency is to control access to the facility and to control visitors’ movements once they are inside the facility, says White. If the Ebola scare had progressed to the point that a hospital would need to screen patients, security would be positioned at the front entrance to help with that screening and, if necessary, to direct patients to a specific area for quarantine. Protective equipment Security might also need to wear protective equipment to handle a patient who is resistant to treatment, for example. There are often interactions between security personnel and the general public, a scenario that becomes more complicated if Ebola or a similar infection is likely. In general, security would be tasked with maintaining order and keeping people where they need to be, freeing up the medical professionals to do their jobs more efficiently, says White. To prepare for the impact of the Ebola scare, hospitals addressed various training and equipment needs and adjusted their disaster/emergency response plans. Read parts two and three of our heathcare mini series here and here.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimeters. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focuses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organization. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localize devices and objects to 10 centimeters of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilized by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
A landmark building located on the north side of the River Thames, has seen its security upgraded with Smart R Distribution and systems integrator, Isecurity Systems Limited, working in partnership to ensure tenants are protected by the latest advances in Access Control technology. The Northern & Shell Building at 10 Lower Thames Street, London EC3 which offers dramatic panoramic river views, has an on-site restaurant, a 10 storey glazed atrium and glass wall climber lifts. Among its tenants, Northern & Shell Group occupies approximately 110,000 sq. ft. spread over the ground, 4th, 9th and 10th floors. Single software platform As part of a phased office refurbishment program, the owners of the building reviewed the tools available to the security personnel to enable them to maintain a safe and secure environment for approximately 5,000 people who work in the building, as well as contractors and visitors. “The existing Geoffrey Access Control system had been in use for over 20 years and although it was still operating effectively, its functionality was limited compared to more modern solutions,” said Russell Morgan, Project Manager for Elsenham, Essex based Isecurity Systems, who have had a long term association with Northern & Shell Group. “A decision was made to invest in the latest generation Vanderbilt Security Management System (SMS) which enables users to efficiently manage alarms, lifts, visitors and the photo ID badging process, from a single software platform.” Magnetic stripe readers The Comelit video entry system integrates seamlessly with the SMS control system Russell and his colleagues at Isecurity Systems worked with the Smart R Distribution team to supply a Vanderbilt SMS access control system and they also in the process of replacing the 140 aging magnetic stripe readers with new CIDRON access control readers which support securely encrypted DESfire EV2 contactless Smart Cards from Cambridge UK based Authenticard. Smart R Distribution also supplied a new Comelit ViP video entry system, comprising 8 door stations and 2 control desk positions, which has been installed by Isecurity Systems to allow operators within the building’s 24/7 control room, to communicate and remotely open doors for contractors and couriers who need to gain entry via, for example, to a basement entrance. The Comelit video entry system integrates seamlessly with the SMS control system. Efficient access control solution “We now have a highly efficient Access Control solution which helps us to manage the smooth movement of large numbers of people through turnstile controlled speed lanes located in our reception area and it also enables us to control who can gain access to other restricted areas within the building,” said Dave Wratten, Facilities Manager for Northern & Shell Group. “Isecurity Systems and Smart R should be applauded for working in partnership to ensure that all the equipment was delivered to site exactly when it was needed and then installed to our complete satisfaction.”
ID R&D, the award-winning biometric solutions provider offering AI-based voice, face and behavioral user authentication and anti-spoofing capabilities, announced that its ISO 30107-3 compliant passive facial liveness product, IDLive Face has been selected by Reconnect, a Public Benefit Company that is revolutionizing the criminal justice industry. The technology further facilitates Reconnect’s mission to deliver modern monitoring technology that is designed to reduce incarceration, recidivism, and addiction. Reconnect is transforming outdated court-ordered monitoring that utilizes phone-based systems and bulky unreliable ankle bracelets to track location, mandated treatment attendance, and curfew. Criminal justice system Reconnect replaces these systems, which restrict movement and make re-entry to society more challenging, with a cellphone app and discreet ankle monitor. The solution is easier to use and maintain, more humane, and significantly less expensive which removes a huge burden for defendants who often can’t afford the equipment leasing fees. On any given day, more than 155,000 people in the criminal justice system are under some form of electronic monitoring and with new initiatives to reduce inmate populations to curtail the spread of COVID-19 that number will rise. Reconnect enables supervised persons to check in with a selfie on a cellphone app that uses GPS technology, face recognition for biometric matching, and ID R&D’s passive facial liveness to quickly and frictionlessly verify the user’s identity and location. Active facial liveness solution Prior to selecting ID R&D, Reconnect was using an in-house developed active facial liveness solution The liveness check, which happens nearly instantly in the background, ensures the user is present and not spoofing the system with a photo or video. Prior to selecting ID R&D, Reconnect was using an in-house developed active facial liveness solution that required users to follow instructions including blinking. “Liveness is a critical part of the Reconnect solution, but it’s not a core competency for us. ID R&D’s best-in-class technology enabled us to improve accuracy and reduce fraud while eliminating the need for active participation by users, resulting in a faster experience and less confusion,” said Melih Onvural, VP Product at Reconnect. Frictionless user experience Reconnect is used by over 150 drug courts, probation, parole, and third party administrators across 31 states. The solution provides all the capabilities of traditional monitoring mechanisms without the cost, usability issues, or stigma and with features such as reminders designed to help people succeed and reduce recidivism. It also provides a single platform for the court to monitor their entire population of supervised participants. “We applaud Reconnect’s mission to deliver a more ethical and effective form of monitoring while allowing courts to manage participants with less manpower at a lower cost,” said John Amein, SVP of Sales at ID R&D. “This is an excellent example of ID R&D’s commitment to using the science of biometrics to deliver the ideal, frictionless user experience for authentication while also strengthening security.”
Sepura’s Italian partner GEG has donated vital critical communications equipment to an emergency hospital in Italy, to aid the country’s medical support during the COVID-19 outbreak. COVID-19 health facility The rapidly deployed Fiera di Bergamo hospital is situated in an event venue in Bergamo, the worst affected region in Italy and is managed by staff from a nearby permanent hospital. The facility was constructed in just a week, supported by private and corporate donations and volunteer support from the region. The facility comprises 142 beds including over 70 intensive care beds and access points for both ambulances and helicopters. As a mark of the community endeavor behind the construction, the canteen is being run by the locally-based Michelin-starred chef Vittorio Cerea, with his family volunteering to provide meals to the emergency staff. Sepura SC21 TETRA radios To ensure that all medical staff, logistic support and volunteers can communicate effectively, GEG have donated a complete critical communications system to the site, comprising of 50 Sepura SC21 TETRA radios, programming software and a TETRA base station from DAMM to provide the local network. The radios have been provided with individual battery chargers and belt clips to reduce the amount of contact with hands and to reduce the risk of cross contamination. For the control room, GEG have provided a desk mounted SRG3900, multiple charging units and desktop programming devices to ensure that the radios are correctly set up for emergency use. Training to radio fleet administration GEG also delivered training to all radio fleet administration staff on basic radio use After performing a full site inspection and installing the base station, GEG also delivered training to all radio fleet administration staff on basic radio use, including switching between talk groups and making full duplex calls. Ian Gotti, Sales Area Manager for GEG said, “Communication is particularly important in this environment, as many of the key workers in this highly pressured environment are not used to working together; on site there are member of both the Italian and Russian armies, volunteers from international emergency response and civil protection organizations, nurses and medical staff from all across Italy and many maintenance staff across site covering many functions.” He continued, “We are proud for GEG to have played our part in enabling Italy to fight back against the coronavirus and we stand with the emergency teams on the frontline that are providing the expert medical help patients desperately require.” TETRA radio communication systems Due to the protective masks worn on the mouth, communication over a critical communications device was the only available solution to the workers. The Sepura radios allow for a very quick configuration and programming of the fleet and also an efficient way to link the fleet to the control room which was vital in this situation. The radios have the additional advantage of being easy to clean and sanitize, capable of functions with minimal use of hands and provide guaranteed secure coverage even in the deepest parts of the building. Enhancing communications Victor Rodrigues, Strategic Account Director for Sepura said, “GEG have many years’ experience in selling TETRA systems into environments such as hospitals and it is a tribute to their dedication that the system was up running so quickly to support the emergency operation. We pass our best wishes to the medical staff on the frontline.”
The German company, Siemens, one of the companies in Europe, purchases the Safeture Enterprise platform for its employees with a focus on business travellers. The initial order value is estimated to 767 thousand EUR over the next three years. Safeture is a Software as a Service (SaaS) company based in Lund, Sweden. The company offers a complete cloud-based platform, Safeture Enterprise, designed to manage employee security and safety and risk/crisis management and is used globally by more than 3000 major companies. Internal security analysts The platform enables the implementation of security processes and the distribution of reliable and fast security-related information to individuals and organizations. Siemens will use Safeture Enterprise open platform architecture to mix content from Safeture analytic departments with content from Siemens internal security analysts. “Siemens is a world class industry leader with global operations. We are very happy to begin working with them and at the same time strengthen our DACH operations.,” says Magnus Hultman CEO of Safeture AB. “Safeture enables us to keep up two-way-communications with our travelers and employees in case of an emergency. Real-time mass notifications and strong geo location services enhance our travel security portfolio for the sake of our employees’ life and limb”, says Marco Mille, Head of Siemens Corporate Security.
Three more UK police forces have jointly upgraded to Sepura SC20 TETRA radios, significantly improving their front line officers’ ability to communicate with colleagues. Bedfordshire Police, Cambridgeshire Constabulary and Hertfordshire Constabulary made use of their joint purchasing power to equip officers from across all three forces with the new SC20 TETRA radios. In all over 1,900 radios were purchased across the three forces, to work alongside their existing fleet of Sepura radios. SC20 TETRA radios By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio, ensuring that critical voice communications can be clearly heard and understood, even in noisy environments. In addition the radios are applications ready, meaning that each force can in time develop bespoke applications to enable quick, secure access to critical data. A key advantage of the Sepura solution is that their radio programming solution Radio Manager can work across different Sepura products, meaning that the transition to new devices is as smooth as possible. Intuitive user interface Andy Gregory, Business Development Director at Sepura said, “After conducting trials, the response from the forces was that the SC20 benefitted from robust design, an intuitive user interface and loud audio, making it ideally suited to the users’ operational needs. The sale is significant to Sepura of course, as Cambridgeshire are Sepura’s ‘home’ force, and many of our staff live in Bedfordshire and Hertfordshire where the new radios are now being deployed.” Gary Maughan, Regional Sales Director for the UK and Ireland at Sepura added, “Sepura radios continue to be chosen by police organizations in the UK and across Europe as the leading TETRA device available on the market today. We are proud to work with our local forces as we do with all UK police forces, ensuring that they are equipped with the best communication solution possible.”
Norfolk and Suffolk Constabularies have purchased nearly 4,000 Sepura SC21 TETRA radios in a joint force investment, equipping their officers with powerful, compact critical communication devices. The decision to invest in Sepura radios followed a thorough trial by both forces, from which users gave the SC21 their enthusiastic approval, and a comprehensive business case analysis, covering support, pricing and evolution of the product. Allowing clear communication The SC21 is a compact version of Sepura’s SC20 radio, combining high levels of robustness and functionality without compromising on performance. This was backed up by users on the trial, who praised in the SC21 in particular for its rich, clear audio, allowing clear communication even in noisy environments, as well as the compact design which takes up a minimum of space on an officer’s uniform. Officers also praised the excellent battery life and robust design of the radio, while commentating that the intelligent user interface made it quick and easy to perform primary functions. T/Assistant Chief Constable Steve Mattin, Joint Protective Services Lead, welcomed the rollout saying: “Good communications is fundamental to our policing service and the SC21 will provide us with the support we need to give the best policing service we can to our communities.” Installation of charging equipment The SC21 is part of Sepura’s SC Series of radios, featuring hand portable and mobile radios “After considering the options available to us it was clear that Sepura’s SC21 was the unanimous choice of both our front line officers and our operations teams. Sepura’s support is outstanding and they are working closely with us to help manage our transition to the new devices, including assisting with training and the installation of charging equipment, ensuring that our staff will be fully prepared for the transition.” Says David Woods, Joint ICT airwave specialist for Norfolk and Suffolk Constabularies. “We have seen many UK organizations adopt SC Series radios from Sepura as they look to equip their users with modern, powerful devices to support their operations. The SC21 is unique in the market in having such advanced features in a compact device and as such offers both Suffolk and Norfolk Constabulary users the best of both worlds.” Says Dawn Griffiths, Business Development Manager at Sepura. The SC21 is part of Sepura’s SC Series of radios, featuring hand portable and mobile radios, supplemented by powerful applications and flexible accessories to support public safety officers communicate efficiently. Sepura are the supplier to UK police forces as well as many other police forces in Europe and throughout the world.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload