Allied Universal®, a security and facility services company in North America, announces that their advanced artificial intelligence platform, HELIAUS®, is helping to keep facilities secure during the COVID-19 pandemic. HELIAUS® is an advanced artificial intelligence platform designed to improve safety and reduce risk by enhancing on-site guarding services. To support Allied Universal's customers' return to workplace initiatives, the company has enhanced the HELIAUS® technology p...
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the IMP-C1000-SFP-bt series. Antaira Technologies’ IMP-C1000-SFP-bt series is a compact, IP30 rated, gigabit Ethernet-to-fiber media converter featuring a 10/100/1000Tx Ethernet port. It supports IEEE 802.3af/at and bt high power...
Healthcare professionals around the world are beginning to identify a range of COVID-19 related mental health issues that are certain to create new challenges for society. People are in serious distress about the pandemic itself and because of the devastating second- and third-order effects of record unemployment and the overall negative economic impact. Safety and security professionals must be prepared to meet the challenges of a ‘new normal,’ according to Safe Zone Technologies P...
Altronix, the provider of power and data transmission products for the professional security industry, introduces a new brand to its portfolio of Trove™ Access and Power Integration Solutions. Altronix now seamlessly integrates it’s power and sub-assemblies with S2 Security controllers in a streamlined package for systems with up to 14-doors. Providing maximum flexibility “Altronix prides itself on designing and manufacturing solutions that solve real-world installation chal...
Sensor solutions provider, HENSOLDT together with the renowned Additively Manufactured Electronics (AME)/Printed Electronics (PE) provider, Nano Dimension, has achieved a major breakthrough on its way to utilizing 3D printing in the development process of high-performance electronics components. 10-layer Printed Circuit Board Utilizing a newly developed dielectric polymer ink and conductive ink from Nano Dimension, HENSOLDT succeeded in assembling the world-wide first 10-layer Printed Circuit...
DITEK, the provider of surge protection solutions, announces the launch of a new Line Conditioning Surge Protective Device model, DTK-LC2, that combines 120V power filtering with reliable protection from unnecessary damage caused by electrical surge events. This unique and compact new combination simplifies implementation of indoor point-of-use surge protection for sensitive electronic systems while ensuring that protection is operating correctly. The convenient plug-in design does not require...
Exabeam, the Smarter SIEM™ company, announces an expansion of its technology partnership with CrowdStrike, a pioneer in cloud-delivered endpoint protection, to deliver its new application, Exabeam Ingestor for CrowdStrike, in the CrowdStrike Store. Exabeam Ingestor for CrowdStrike provides access to endpoint telemetry in the CrowdStrike Falcon platform and enables near real-time data streaming to detect advanced threats via a pre-built connector. This allows customers to augment their endpoint data with Exabeam’s user and entity behavior analytics (UEBA) to distinguish normal and abnormal behavior, helping to identify risky activity indicating a potential attack, even if it has never been seen before. Complex security management “By launching an app in the CrowdStrike Store, CrowdStrike and Exabeam deliver a fully-integrated SaaS offering that provides customers with the flexibility to solve complex security management problems, while also adhering to cloud-first and cloud-only procurement mandates,” said Nir Polak, chief executive officer of Exabeam. “Our goal is to empower SOC analysts to detect advanced threats and protect the enterprise, and this new application makes that possible in a robust, yet efficient way.” The application applies UEBA to near real-time endpoint telemetry in CrowdStrike Falcon Exabeam Ingestor for CrowdStrike provides yet another way for security teams to harness the power of CrowdStrike endpoint data. With seamless, one-click, cloud-to-cloud integration, the application applies UEBA to near real-time endpoint telemetry in CrowdStrike Falcon without any complexity associated with ingestion and indexing. Further, Exabeam Ingestor for CrowdStrike helps to detect advanced and insider threats with use cases including lateral movement, credential compromise, and data exfiltration. Advanced security challenges Via native integration with Exabeam Advanced Analytics, Exabeam Ingestor for CrowdStrike also helps analysts work smarter. With Exabeam, analysts can leverage automatic alert prioritization and machine-built incident timelines to dramatically decrease investigation times and mean time to respond (MTTR) to incidents. “With this partnership, we are providing our customers another use case for the industry-leading telemetry of the CrowdStrike Falcon platform and the power of the CrowdStrike Store, allowing them to solve for advanced security challenges without adding complexity,” said Amol Kulkarni, chief product officer, CrowdStrike. “We are pleased to strengthen our partnership with Exabeam and enable our customers to experience the combined power of our solutions.” The Exabeam Ingestor for CrowdStrike is now available in the CrowdStrike store and through Exabeam's reseller channel partners.
Motorola Solutions, announces a number of additions to its video security and analytics portfolio. These security solutions are designed to support organizations as they explore options for moving staff safely back into their offices or facilities. The offerings focus on the key elements of safety and security around COVID-19, including prevention, protection and response. “Enterprise organizations are exploring the best way to return back to the workplace, where ensuring the safety and security of their employees and customers is paramount,” said John Kedzierski, Senior Vice President, Video Security & Analytics at Motorola Solutions. Intelligence of AI-Powered analytics “Our customers have asked how our solutions can help mitigate the potential impacts of COVID-19 as they re-open their facilities, so we've developed a suite of applications that leverage the unique capabilities of video with the intelligence of AI-powered analytics.” Motorola Solutions’ video security and analytics portfolio will offer Avigilon security cameras with analytics to help organizations keep employees safe through the adherence of health guidelines around protective face masks and physical social distancing. These solutions combine the power of video and the intelligence of AI-powered analytics to collect visual footage and statistical patterns on where social-distancing protocols have been breached and where individuals are not wearing a face mask. Through Avigilon Control Center (ACC) video management software, organizations can be notified if guidelines are not observed and can quickly make informed decisions to address the situation. Physical access security The combination of physical access security and video footage can provide important insights The analysis increases employee safety by equipping organizations with the insights they need to implement measures that facilitate better compliance with health guidelines. The safety and security of front-line workers is a top priority for employers. Essential workers who face the risk of aggression and contamination may be equipped with Motorola Solutions’ body-worn cameras, so they can experience peace of mind, knowing that they have a direct link to security personnel at all times. Wearing these devices allows employees to verbally notify others that their actions are being captured on camera, which can often de-escalate a heated situation. As employees look to safely move back into the workplace, Motorola Solutions’ contact tracing capability can help deter the spread of COVID-19 in an organization’s offices or facilities. The combination of physical access security and video footage can provide important insights. Responsible use of analytics The new Identity Correlation Report helps employers better understand where an individual who has tested positive for COVID-19 has been, and which doors that person may have accessed within the workplace. By using this capability with Motorola Solutions’ Avigilon Appearance Search™ technology and Identity Search, security operators are able to add an extra measure of safety by generating timelines and video clips of the individual’s pathway throughout the premises, also showing who they may have been in contact with. These prevent, protect and response capabilities embrace Motorola Solutions’ commitment to the responsible use of analytics, as well as individual privacy rights.
Marks USA, a division of NAPCO Security Technologies, and sister division of Alarm Lock, is excited to announce the debut of new virtual online and field training classes including new pro courses on architectural-grade hardware, locking and access lock lines, by technology or vertical market. Real-World applications Taught by CRL-locking pros for locking pros, the virtual online classes can be a great tech refresher or new introduction, ideal while quarantined or working from home. Field classes are also available where applicable. All local Marks USA online classes can be taken at one’s computer in the safety and comfort of their home or office, are presented live and offer a Question & Answer session following each class. Field classes are hands-on and taught with real-world applications and locking expertise.
Element AI, a developer of artificial intelligence-powered (AI) solutions and services, announces that it has published the AI Maturity Framework, which consists of a mapping tool and a whitepaper. The whitepaper provides in-depth insights on how organizations across all industries can become AI-ready faster and the tool helps organizations quickly map their AI-readiness. The tool and whitepaper address a knowledge gap in the AI industry, as few resources exist on how organizations can actually evolve their AI-readiness from theory to practice. AI Maturity Framework whitepaper Since 2019, the Element AI, AI Maturity Survey has collected data vital to informing the AI Maturity Framework whitepaper and tool. To date, the survey has collected insights from 200 senior decision-makers across multiple industries, primarily in North America, and determined that organizations are still struggling with their AI journeys. Key findings in the survey reveal: Fewer than one in ten organizations are mature enough to operationalize and scale AI production 79 percent of organizations surveyed haven’t graduated from experimenting with AI in a lab setting Only 14 percent of organizations surveyed are formalizing their approach to deploying AI within their organization Full integration of AI Few resources exist to help leaders plan and strengthen their foundations for industry-grade AI" “The progress and full integration of AI into most industries is uneven because implementing AI is as much about organizational factors as it is technical ones, and few resources exist to help leaders plan and strengthen their foundations for industry-grade AI,” said Karthik Ramakrishnan, Vice President, Head of AI Strategy and Enablement at Element AI. “We want the AI Maturity Framework tool and whitepaper to provide organizations around the world with a systematic perspective to help them chart and realize their AI journey.” While there are plenty of resources written with calls to invest in AI and the benefits of the technology, few exist on how organizations can take AI technology and develop a plan that is actionable and fits within an organization’s culture. Organizational AI maturity The Element AI, AI Maturity Framework whitepaper provides insights into how the AI journey is unfolding in multiple industries, drawing from first-hand experience of the Element AI advisory and enablement practice. The whitepaper provides a deeper dive in understanding the nuances of the different stages and dimensions of AI-readiness, and provides industry benchmarks, case studies and practical tips/tactics on how to move to the next stage of AI integration. “This tool and whitepaper offers prescriptive advice on how companies can align the five dimensions of organizational AI maturity: strategy, data, technology, people and governance. All organizations can benefit, no matter where they are on their AI journey and regardless of whether they’re buying AI solutions off the shelf, building them from scratch, or something in between,” continued Ramakrishnan.
ThreatQuotient™, a security operations platform innovator, announces enhancements to their professional services offering, including new Assessment and Consulting Services. First launched in 2017, ThreatQuotient’s global Professional Services team has continuously evolved to meet and exceed the changing needs of organizations at all levels of security operations and threat intelligence maturity. By providing the core capabilities to assess, design and build a threat-centric security operations function, ThreatQuotient is enabling organizations to transition from traditional signature-based monitoring, detection and response to an external, threat-focused program. Threat intelligence and operational cybersecurity At ThreatQuotient, we know building a security operations program is hard" “At ThreatQuotient, we know building a security operations program is hard, and building one that is threat-centric is even more difficult. Our team is here to help at every stage – from assessing whether a company will get value out of a threat intelligence program, all the way to helping the most mature and sophisticated teams diversify their use cases,” said Jonathan Couch, SVP Strategy, ThreatQuotient. “With over 50 years of combined commercial and government threat intelligence and operational cybersecurity experience on the services leadership team, we are uniquely qualified and positioned to tailor solutions that meet the distinct needs and demands of an organization’s security operations.” In addition to the current services of implementation, training and development, ThreatQuotient now offers consulting services that range from an initial assessment of current threat intelligence capabilities, to more in-depth and long-term process development. Threat hunting and vulnerability management The ultimate goal is to mature a program to the point that a team can confidently address specific use cases like spearphishing, threat hunting and vulnerability management. ThreatQuotient’s services can educate new cyber intelligence teams, refocus teams onto specific classes of threats, and operationalize an intelligence practice. ThreatQuotient’s Professional Services also guide the development of a strategic plan, which embeds threat intelligence within all functions of security operations, by taking into account stakeholder analyzes, risk identification and a one to three year growth plan. In addition, ThreatQuotient enables security executives to leverage the application of global threat intelligence to communicate effectively with their business leadership. Creating automated workflows ThreatQuotient will help organizations seamlessly deploy the ThreatQ platform into their ecosystem ThreatQuotient will help organizations seamlessly deploy the ThreatQ platform into their ecosystem, however, companies do not have to be users of the platform to take advantage of ThreatQuotient’s services to mature their operations and learn how to implement threat intelligence. ThreatQuotient’s experts can provide additional support to create automated workflows, develop and/or map attributes against data sets or feeds, auto-enrich indicator sets, or provide specific deployment actions against intelligence. For example, since first integrating with MITRE ATT&CK in early 2018, ThreatQuotient has helped customers adopt and integrate the framework into their workflows to achieve a holistic view of their organization’s specific attack vectors and what needs to be done to effectively mitigate those attacks and defend against adversaries. Cyber risk management programs “ThreatQuotient’s services team uses best practices for threat intelligence and training to consult on applying the right processes and workflows, accelerating detection and response, and integrating ThreatQ with each enterprise’s unique ecosystem of pre-existing technologies to extend the architecture of their security operations,” said Anthony Perridge, VP International, ThreatQuotient. “With our new assessment service, ThreatQuotient extends to help organizations that are new to threat intelligence answer an important but difficult question – are we ready to get value from a cyber threat intelligence program? If they are not, we can work to get them ready and help set up the people, processes, and technologies necessary to integrate intelligence into security operations and cyber risk management programs.”
Fireblocks announces it has developed a new MPC (secure multi-party computation) algorithm that pushes digital asset transaction speeds up to 8X faster than what’s currently possible. Fireblocks’ new protocol, called ‘MPC-CMP,’ is based on and surpasses the speed of Gennaro and Goldfeder’s protocol, a current industry standard for MPC, and Lindell et al.’s protocol. Starting today, all digital asset custodians and MPC vendors can access Fireblocks’ MPC-CMP protocol and use it for free as Fireblocks will not be applying for patents on this technology. Advanced fintech platforms MPC-CMP enables them to execute high-volume withdrawal requests MPC technology is allowing advanced fintech platforms to flourish because it removes the single point of compromize by transforming private keys into liquid form through securely distributed transaction signing. In an academic paper released recently by the Fireblocks Research Team, Prof. Ran Canetti, Dr. Nikolaos Makriyannis, and Udi Peled, revealed the new cryptographic security protocol. In the paper, Canetti, Makriyannis, and Peled (CMP) outline how to securely cut the number of rounds needed to sign an MPC transaction by 10-fold. While Gennaro and Goldfeder’s algorithm requires 9 rounds to sign a transaction, MPC-CMP only requires 1. Designed to support institutions with large retail customer bases, such as the biggest exchanges, lending providers, and banks. MPC-CMP enables them to execute high-volume withdrawal requests. Additionally, it allows institutions located in areas with strong regulations around cold storage to utilize MPC in an offline wallet. Next generation of threshold cryptography By slicing the number of interactive rounds in half and combining the method of pre-processing with non-interactive signing, MPC-CMP accomplishes 8X faster transaction speed. “The MPC-CMP algorithm developed by our cryptography team is ushering in the next generation of threshold cryptography,” said Ran Canetti, Professor of Computer Science at Boston University and Tel Aviv University. “It demonstrates that strong security need not compromize on efficiency.” The new algorithm introduces major security improvements, such as automatically refreshing key shares in minute intervals, protections against more advanced attackers, and an out-of-the-box Universally Composable secure computation proof. Operationalize digital asset services “As financial institutions look to launch and operationalize digital asset services, we believe MPC-based technology will be paramount to delivering an experience comparable to the speed of traditional assets,” explains Michael Shaulov, CEO and Co-Founder of Fireblocks. “We’re freely providing custodians and MPC vendors with our new algorithm to drive innovation, boost adoption, and prepare digital assets for the broader institutional market.” MPC-CMP delivers: The fastest digital asset transaction signing protocol on the market Cold/offline MPC key signing Automatic key share refreshing to improve security Universally Composable protocol 100% free usage Fireblocks has made MPC-CMP open to peer review to ensure its strength and efficiency in order to implement the new algorithm by end of Q2 2020.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
As we surpass 2019, it’s high time we realize that by merging the digital and physical realm, IoT is destined to change the way we live and work. I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices. IoT in every day life I must say the numbers are quite mind-boggling! And this leaves a lot of room for improvement by incorporating the Internet of Things in software development; whether it’s a cellphone app or web. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices It may interest you to know that the Internet of Things has the potential to touch every domain and nearly every aspect of human life. According to sources, impact on IoT leads to: By 2020, 50 billion devices are expected to connect to the internet In 2015, 3.5 connected devices per person have now reached almost 7 8 billion cellphone broadband access points by 2019 5 million IoT jobs by 2020 70 percent a year growth through 2018 in total sales of clothing and accessories incorporating computer technology, rising from $3 billion today to $42.5 billion $3.3 trillion market for ‘Smart City’ applications and services by 2025 The impact of smart homes Instead of saying the home is where our heart is; a home is where a bot is. However, IoT hasn’t entirely arrived in our homes. I mean, we are still required to order groceries the minute we run out of eggs and Greek yogurt. Slowly and steadily we are getting there; it seems the latest advancements in artificial intelligence and big data analytics will definitely work wonders for us. Smart homes are no longer a dream project; we can soon expect everything to be governed by the “brain” or a central platform. Moreover, bots will be seen tackling a certain set of functions related to more difficult tasks, and lastly niche bots, in charge of single tasks such as vacuuming the house or addressing more complex duties like accounting, coaching or household managing. Tech giants, or should I call them current development frontrunners like Amazon, Google, Samsung and Apple are expected to come up with something nerve-cracking. The benefits of IoT Other than this, with IoT, you will be able to work smarter and not harder. Artificial intelligence and advanced analytics can help create a more intelligent work environment. For example, the right AC temperature in shared office spaces help us book the most convenient meeting room, and moreover, take into account the room preference by setting the right temperature, lighting, and can automatically restock office supplies. This simply leads to: More efficient office operations Energy savings Comfortable work environments Consequently increased employee productivity The dark side of the Internet of Things The potential risks Every technology indeed comes as a boom, but that doesn’t mean the grass will be greener on the other side. Furthermore, we will uncover how even after offering so much convenience why IoT poses so much risk. Like I said before, IoT can be integrated into anything from coffee machines to fitness watches leading to make our lives more convenient. But what happens if they turn bad? When being unwillingly infected or hacked, these blessings can certainly turn into huge threats. IoT can be integrated into anything, leading to make our lives more convenient Devices, systems and the lack of security It may interest you to know that IoT devices can become bots that blindly follow commands to commit crimes as part of a botnet. What is a botnet, you may ask? Well, it is a network of infected devices that are mainly abused by the attacker to perform tasks such as carrying out DDoS attacks, Bitcoin mining and spreading spam emails. Mainly being used to carry out DDoS attacks and to mine for cryptocurrencies, these botnets have the potential to have a larger impact by making IoT devices do much more, such as send spam messages featuring dangerous malware. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices Much like most malware, botnets can be found on dark marketplaces. The source code can be purchased and leaked, depending on the type of service. In case, an IoT device is already infected, another bot can attempt to replace the infection with its code and in some cases also "repair" the security vulnerability. But most of the time it fails! No matter how innocent these proof-of-concept attacks may seem, one cannot deny the fact that IoT devices and systems aren’t properly secured. Hackers can easily gain control of them and cause complete chaos like never before. Collecting information at a cost But how much information can an IoT device collect? What I mean is that by hacking a webcam, one can see what they are pointed at without you even knowing it, smart TVs and personal assistants can pick up sound, and smart cars can give clues to whether or not someone is home. Honestly, the amount of information collected on these IoT devices cannot be determined at any cost. And with everything in the cloud, such information can be intercepted or rerouted to a malicious server and be abused if not properly secured. The more we surround ourselves with IoT devices, the more motivation cybercriminals receive to target us! With the time passing by, let’s simply hope that connected device security will dramatically improve.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilizers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announces that Bradley Air National Guard Base in East Granby, Connecticut., has installed a Delta Scientific HD300EM shallow mount wedge barricade system at the home of the ‘Flying Yankees,’ the 103rd Airlift Wing, the third-oldest Air National Guard unit in the country. Installed by American Barrier and Controls LLC, Foxboro, Massachusetts., the ‘Stop Control Safety’ ACP (Access Control Point) provides security at this constrained location with a relatively low traffic volume of less than 800 vehicles per hour per lane. Extensive history of electronic integration "Security forces and the engineering firm at Bradley chose the Delta Scientific HD300EM because of Delta's proven leadership and quality in the vehicle barrier industry," explains Dave Abromson, vice president of American Barrier and Controls. "They chose American Barrier and Controls LLC as the installer of the barrier and ACP system because of our 20-plus years as a Delta installer and service provider and our extensive history of electronic integration at such facilities as the US Army, US Navy, FBI field offices and multiple NASA locations." With only a 24 in (61 cm) foundation and a fully electric control unit, the HD300EM barrier stops a 15,000 lb (6800 kg) truck impacting at 50 mph (80 km/h) dead in its tracks with zero penetration. Fiber optic communication lines The HD300EM obviates the concerns of interference with buried pipes Upon impact, the barrier remains in its foundation and the opening stays blocked, providing a multiple hit capability. The barrier is independently test lab certified to 1 million cycles. In its M50 crash test, the HD300EM completely disabled the test vehicle, causing severe damage to the occupant compartment and power train. The maximum penetration recorded was an outstanding -1.8 m. A solid road plate design permits multiple hits and will handle low speed bumps and corner strikes for day to day reliability. The design is ideal for heavy vehicle traffic as it is rated at 66,000 lbs per axle load. The HD300EM obviates the concerns of interference with buried pipes, power lines and fiber optic communication lines. The shallow foundation also reduces installation complexity, time, materials and corresponding costs. Total protection against dust The HD300 is perfect for high water table locations and areas with corrosive soils. It provides low maintenance as all components are accessible from the sides or top of the barrier. For increased security, the HD300EM leverages Delta's proprietary counter-balanced technology to provide a 1.5 second emergency fast operation (EFO), responding to attacks very quickly. The electric actuator provides IP67 protection, meaning that the unit is totally protected against dust and the effect of immersion between 15 cm and 1 m. The HD300EM barricade provides foundation space in which maintenance personnel can easily work. There is space for heaters and sump pumps. Access is available from either the top plate or front.
A global hyper- and supermarket giant has transformed an ailing legacy CCTV system and enhanced storage capacity across its Middle East operations with a high performance surveillance and business intelligence solution. Carrefour Jordan operator Majid Al Futtaim turned to specialist systems integrator Ametrad Technology Services to upgrade its video technology as it prepares for growth. Increasing operational efficiency The Dubai-based retail pioneer, which first introduced Carrefour to the Middle East in 1995 and now operates 70 outlets across the region, has ambitious expansion plans and is looking to open new express stores and hypermarkets. Ametrad are deploying video technology built around IDIS Solution Suite (ISS) video management software (VMS) for the Majid Al Futtaim security team, whose priority is to prevent losses, improve safety and security, enhance the customer experience and greatly increase operational efficiency across its existing eight express stores and hypermarket. Failover providing protection The legacy CCTV system was proving costly to maintain and time-intensive to operate ISS VMS is modular and scaleable, giving Carrefour a cost-effective centralized monitoring environment with multi-layered failover providing protection against network instability and power outages. The legacy CCTV system was proving costly to maintain and time-intensive to operate, while low bandwidth at some stores was limiting performance. These problems were being compounded by new requirements to move from 30 to 90 days storage. Ametrad managing director Ahmad Shanawani says: “We have not experienced a single hard disk drive failure, a request for an NVR reset, or any gaps in footage due to a power outage. This is tangible evidence of IDIS’ quality, resilience and failover technology.” Ensuring pin-Sharp image capture All the hardware is backed by a cost-free warranty and the ability to easily add new stores as they come online – vital as Carrefour serves over 200,000 customers every day across the region and is continuing to expand – ensuring low total cost of ownership. Using a phased upgrade approach 32 2MP domes and bullets already provide coverage at the hypermarket in Irbid City Center, with a further 64 legacy cameras earmarked for upgrade, while an average of 28 cameras deliver situational awareness across each express store. The IDIS cameras ensure pin-sharp image capture in varying light conditions, including in darkness up to 30 meters, and cope with varying light and shade thanks to true wide dynamic range. 32-channel NVRs and a user-friendly interface for authorized retail staff at each supermarket provide 370Mbps throughput and up to 960ips UHD real-time recording. High performance live monitoring These technologies also allowed Carrefour to double the camera count at each store This ensures high performance live monitoring and forensic video retrieval, while native RAID 1 provides an important additional layer of redundancy. Ametrad engineers connected each device in minutes thanks to true plug-and-play IDIS DirectIP® technology, and IDIS For Every Network (FEN) technology allowed one-click configuration linking each store to the control center. The hierarchical connection structure between IDIS DirectIP devices also guaranteed the most efficient method of cabling into the compact control room. Limited bandwidth was solved with IDIS Intelligent Codec, which typically reduces storage and bandwidth requirements by up to 75% compared to H.264, while dynamic multi-stream control has alleviated latency. These technologies also allowed Carrefour to double the camera count at each store to provide comprehensive coverage without the need to upgrade networks. Intelligent reporting capabilities Ametrad is also deploying IDIS VA in the Box analytics, to provide each store with heatmapping, people counting, queue management and intelligent reporting capabilities – thus helping improve sales and marketing performance and providing store managers with valuable business and customer behavioral insight. ISS control panels provide live monitoring, playback, event search, system health reports, and navigation via store layouts, allowing control room staff to troubleshoot and manage 100s of video streams and devices across multiple stores. These intuitive functions have reduced the time needed to find and export video clips from hours to minutes. Carrefour has contracted Ametrad to provide maintenance services and is working with the Ametrad team with a view to adopting new IDIS technologies such as IDIS Deep Learning Analytics.
Manufacturer of road blockers, bollards and vehicle barriers, ATG Access, has committed resources to protect hospitals across the country from external threats amidst the ongoing COVID-19 pandemic. Through its partnership with deployment partner, event protection business Crowdguard, ATG’s hostile vehicle mitigation (HVM) solution, Surface Guard, has been installed to protect the temporary 500-bed London Nightingale Hospital built at the ExCel Center, London. Potential security vulnerability After having originally having been alerted of a potential security vulnerability to vehicle attacks at the ExCel Center, Crowdguard were quick to respond, successfully installing 40 meters of ATG Access’ Surface Guard across three locations on-site within 36 hours. The solution is fully pedestrian-permeable, and Crowdguard has also deployed a separate Authorized Vehicle Access Unit in front of the hospital, ensuring that hospital operations remain entirely unaffected by the new measures. Following the successful initial installation of Surface Guard, ATG Access has now also been commissioned to secure the 2,000-bed capacity field hospital built by a temporary conversion of Cardiff’s Principality Stadium, from Monday 20th April. All necessary security products, once again deployed by Crowdguard, have been donated free of charge to ensure the hospital, staff and patents are fully protected from attack. Minimizing disruption to event operation A Surface Guard barrier can withstand the impact of a 7,200kg vehicle travelling at 32kph Furthermore, Hardstaff Barriers, part of the wider HS Security Group, has also been enlisted to protect the Nightingale Hospital in Harrogate. Both Hardstaff Barriers and ATG Access are part of HS Security, a group of the UK’s physical security specialists owned by Hill & Smith Holdings PLC. Designed in response to the surge in vehicular attacks across Europe in recent years, a Surface Guard barrier can withstand the impact of a 7,200kg vehicle traveling at 32kph and has been tested twice in accordance to the IWA 14 crash test standard. The barrier’s lightweight and modular design means that it can be deployed quickly and efficiently by four men in under an hour, minimizing disruption to event operation and the surrounding area. Implementing the necessary solutions We wanted to ensure that people don’t have to worry about security during these difficult times" Iain Moran, director at ATG Access, said, “Now, as ever, the public’s safety remains top priority and, to this end, we wanted to ensure that people don’t have to worry about security during these difficult times.” “We have a long-standing relationship with the ExCel Center, having worked to protect the venue across a number of high-profile events in the past, so we knew what security measures would be needed for the temporary hospital. Due to Crowdguard’s expertise and unparalleled deployment network, we were able to work together to implement the necessary solutions rapidly and effectively, keeping key workers and critical infrastructure safe in these challenging times.” Deborah Ainscough, operations director at Crowdguard, said, “We are proud that, through innovations such as Surface Guard, we are at the forefront of securing the nation’s hospitals and, through this, ensuring that both vital key workers and patients affected by COVID-19 are kept safe.”
Verint® Systems Inc., The Customer Engagement Company™, announces one of the world’s largest banking organizations selected Verint as its new standard solution for enterprize fraud and security investigations. The selection resulted after a thorough analysis of technologies that best fit the bank’s fraud investigation, cybersecurity and deployment management requirements. The bank chose Verint’s enterprize-class recording platform to enhance compliance and fraud control across its network of retail branches and ATMs. The solution combines the powerful network video recorder with robust software for review and enterprize management. Delivering innovative solutions “Verint is focused on developing innovative technologies that help financial institutions reduce fraud and security risk, drive productivity, and help these organizations simplify and modernize their operations,” says Verint’s Matt Tengwall, General Manager, fraud and security solutions. “As the market leader, Verint’s suite of fraud and security solutions are designed to address the unique requirements of banks and credit unions." "We believe the bank’s selection provides validation of our proven ability to deliver innovative solutions that address compliance and fraud control and help leading banks reduce loss and address potential risk.” Verint’s advanced fraud and security solutions can help banks and credit unions identify risks and vulnerabilities in real time, helping fraud investigators mitigate threats, and ensure compliance.
STANLEY Security, one of the UK’s security providers, is pleased to announce it will be providing its round the clock safety monitoring and emergency response management services to Blackline Safety customers across the UK and Europe. Blackline Safety is a supplier of wirelessly connected gas detection and lone worker monitoring products. Blackline’s technology monitors for atmospheric hazards and the wellbeing of personnel working alone, whether in populated areas, indoors within complex facilities or remotely. Safety monitoring services A key part of its service is live 24/7 monitoring and wireless gas detection, helping teams working in hazardous environments by responding to emergencies in real-time and managing efficient evacuations. STANLEY Security will take over the role of safety monitoring services for Blackline in the UK Under this new partnership, STANLEY Security will take over the role of safety monitoring services for Blackline in the UK, Netherlands and Belgium this month, with a further seven countries in Europe throughout 2020. STANLEY Security will additionally provide backup support for Blackline’s Calgary-based Safety Operations Center, increasing protection for the Blackline’s North American customers. Smooth transition of monitoring and response services The choice of partners was, in a large part, due to both companies being BS 8484:2016 accredited and has made the transition of 24/7 monitoring services near seamless. BS 8484:2016 is the Code of Practice for the Provision of Lone Worker Services, which advises on best practice when seeking a solution to reduce and/or eliminate the risk to staff operating away from the ability of colleagues to provide direct assistance. Blackline Safety Europe is the only manufacturer of gas detectors to achieve this standard. To further ensure the smooth transition of monitoring and response services, STANLEY Security has established a continuous training program for employees across Europe. The training not only ensures operatives have in-depth knowledge of Blackline’s emergency response protocols, products and features, but are kept up to date at all times.
The German company, Siemens, one of the companies in Europe, purchases the Safeture Enterprise platform for its employees with a focus on business travellers. The initial order value is estimated to 767 thousand EUR over the next three years. Safeture is a Software as a Service (SaaS) company based in Lund, Sweden. The company offers a complete cloud-based platform, Safeture Enterprise, designed to manage employee security and safety and risk/crisis management and is used globally by more than 3000 major companies. Internal security analysts The platform enables the implementation of security processes and the distribution of reliable and fast security-related information to individuals and organizations. Siemens will use Safeture Enterprise open platform architecture to mix content from Safeture analytic departments with content from Siemens internal security analysts. “Siemens is a world class industry leader with global operations. We are very happy to begin working with them and at the same time strengthen our DACH operations.,” says Magnus Hultman CEO of Safeture AB. “Safeture enables us to keep up two-way-communications with our travelers and employees in case of an emergency. Real-time mass notifications and strong geo location services enhance our travel security portfolio for the sake of our employees’ life and limb”, says Marco Mille, Head of Siemens Corporate Security.
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security devices: Manufacturers & Suppliers
- Dahua Technology Security devices
- Vicon Security devices
- Bolide Security devices
- Vanderbilt Security devices
- Seagate Security devices
- Bosch Security devices
- Aritech Security devices
- Hanwha Techwin Security devices
- Parabit Security devices
- VIVOTEK Security devices
- LILIN Security devices
- BCDVideo Security devices
- Hikvision Security devices
- Sony Security devices
- ComNet Security devices
- Videotec Security devices
- CEM Security devices
- Pelco Security devices
- Arecont Vision Security devices
- HID Security devices
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload