The automatic or semi-automatic analysis of data plays an increasingly important role in video security technology. Here, the image quality is decisive for the result of the analysis. At the GPEC 2020 trade fair, Messe Frankfurt, Europe's closed specialized exhibition for police and security authorities, from 18 to 20 February 2020, Hall 11, Booth E068, the German manufacturer of video information technology Dallmeier will show visitors how they can implement future-proof video analysis applicat...
InnerVision Security appoints Ken Alexander to the position of Outside Sales Representative for this supplier of advanced technology solutions to the security industry. He is responsible for sales and technical support for Innervision Security accounts nationwide. Mr. Alexander’s extensive experience includes more than 10 years of managing highly technical capital equipment programs in both private industry and for the federal government (U.S. Customs and Border Protection). Holding Nume...
360 Vision Technology, a UK CCTV manufacturing company, has announced that with effect of 15th January 2020, Sales Director Ashley Knowles has retired from the company, and the Security Industry. “Ashley has been a founding director of the business since 2003, having previously worked at Video Controls Ltd, and has thoroughly enjoyed being part of the 360 Vision team,” says Mark Rees, 360 Vision’s Managing Director. “Over the years he has contributed to make the co...
“Normally when we talk about trends and the future, we are actually thinking more about the present. The reason we are keen on understanding trends is because we want to know how they will affect our current business and how we should act now to avoid being outdated.” Significant changes have shaped the security industry during the last decade, and more exciting innovations should be expected in the 2020s. Emerging technologies and applications, such as multi-dimensional perception,...
IWCE the annual event for critical communications technology professionals, unveils its full program for its 44th annual conference to be held at the Las Vegas Conference Center, March 30th to April, 3rd 2020. Organizers expect more than 7,000 attendees for this year’s five-day day event which offers a two-day expo, educational workshops, short courses, power sessions, keynote addresses, town hall meetings, and networking events. The event will also host over 400 exhibitors from April 1-2...
Mission 500 is excited to announce this year’s Security 5k/2k fundraiser at ISC West 2020 will be held on Thursday, March 19th. The event will be located at 2601 East Sunset Road, in Las Vegas, Nevada and will benefit children and families in need across the United States. Registrations to participate in this year’s event are open. Those who are unable to attend or participate in the physical event can sign up and donate as a virtual runner or walker. Wide array of new securit...
Anixter International Inc. announces that the Anixter Board of Directors (the ‘Anixter Board’) determined that an offer from WESCO International, Inc. (‘WESCO’) constitutes a ‘Superior Company Proposal’ as defined in Anixter’s previously announced definitive agreement and plan of merger with an affiliate of Clayton, Dubilier & Rice, LLC (‘CD&R’). Under the terms of WESCO’s revised offer, WESCO would acquire Anixter for nominal consideration of $100.00 per share, reflecting an enterprise value of approximately $4.5 billion including net debt. The proposed consideration consists of $70.00 per share in cash, 0.2397 shares of WESCO common stock, and $15.89 per share in face amount of WESCO perpetual preferred stock. Common stock consideration Based on the closing price on January 8, 2020, the total consideration would be $100.16 The cash portion of the merger consideration will be increased by up to $2.82 to the extent the value of the WESCO common stock consideration, calculated using a volume weighted average before closing, declines below $14.11 per share, providing Anixter stockholders with 20% down-side protection based on WESCO’s closing price on January 2, 2020. Anixter stockholders would receive the benefit of any increase in the value of the WESCO common stock consideration above $14.11 per share. Based on the closing price on January 8, 2020, the total consideration would be $100.16. WESCO has told Anixter that the perpetual preferred stock is expected to be listed on the New York Stock Exchange, will be non-callable for five years and will pay dividends at a fixed rate subject to reset every five years. Careful review and consideration WESCO has also informed the Company that the proposed acquisition of Anixter will not require the approval of WESCO’s stockholders. “After careful review and consideration and consultation with our financial and legal advisers, the Board of Anixter has determined that the current WESCO offer is superior to the existing CD&R agreement,” said Sam Zell, chairman of Anixter. CD&R has the option for the next five business days to negotiate Anixter has notified CD&R of the Anixter Board’s determination and, pursuant to the CD&R Merger Agreement, CD&R has the option for the next five business days to negotiate an amendment of that agreement so that WESCO’s offer will no longer be a ‘Superior Company Proposal.’ Paying the termination fee Under the CD&R Merger Agreement, Anixter is required to pay a $100 million termination fee to CD&R if the Anixter Board terminates the CD&R Merger Agreement in order to enter into an agreement with WESCO. WESCO has agreed to pay the termination fee on Anixter’s behalf in such event. At this time, Anixter remains subject to the CD&R Merger Agreement and the Anixter Board has not changed its recommendation in support of the CD&R transaction or the existing CD&R Merger Agreement, or its recommendation that Anixter’s stockholders adopt the CD&R Merger Agreement. There can be no assurances that a transaction with WESCO will result from WESCO’s offer, or that any other transaction will be consummated. There can be no assurance that CD&R will seek to negotiate with Anixter or will make a revised offer.
Ambarella, Inc., an AI vision silicon company, Lumentum, a designer and manufacturer of innovative optical and photonic products, and ON Semiconductor, a provider of CMOS image sensor solutions, announced a joint 3D sensing platform for the development of intelligent access control systems and smart video security products, such as smart video doorbells and door locks. The platform is based on Ambarella’s CV25 CVflow AI vision system on chip (SoC), structured-light powered by Lumentum’s VCSEL technology, and ON Semiconductor’s AR0237IR image sensor. Ambarella, Lumentum, and ON Semiconductor will demonstrate the platform during CES 2020. Dedicated ASIC Lumentum has worked to enable diverse applications of our VCSEL technology into ext-generation 3D sensing products" Traditional structured-light solutions need to use both an infrared (IR) camera and a separate RGB camera and typically, a dedicated ASIC for depth processing. This new platform leverages a single ON Semiconductor AR0237 RGB-IR CMOS image sensor to obtain both a visible image for viewing and an infrared image for depth sensing. The Ambarella CV25 AI vision SoC powers depth processing, anti-spoofing algorithms, 3D facial recognition algorithms, and video encoding on a single chip, significantly reducing system complexity while improving performance. “Lumentum has worked to enable diverse applications of our VCSEL technology into next-generation 3D sensing products,” said Dr. Andre Wong, vice president, product line management, 3D Sensing at Lumentum. “We are excited to partner with Ambarella to help expand the use of 3D sensing in new applications including video security and more broadly AI vision.” Single sensor solutions “ON Semiconductor’s RGB-IR sensor technology enables single sensor solutions to provide both visible and IR images in security and vision IoT applications,” said Gianluca Colli, vice president and general manager of the Commercial Sensing Division at ON Semiconductor. “Ambarella’s CV25 computer vision SoC, with its next-generation image signal processor (ISP), brings out the best image quality of our RGB-IR sensor, while providing powerful AI processing capability for innovative use cases in security applications.” It delivers 3D sensing with reduced system complexity as well as improved reliability and security “We are delighted to partner with Lumentum and ON Semiconductor to deliver a hardware platform for the next generation of intelligent access control systems and video security devices,” said Fermi Wang, president and CEO of Ambarella. “Powered by Lumentum’s VCSEL solution, ON Semiconductor’s RGB-IR technology, and our CV25 SoC, it delivers 3D sensing with reduced system complexity as well as improved reliability and security. We look forward to seeing the innovative products our customers will build with this hardware platform.” High dynamic range (HDR) processing Ambarella’s CV25 chip includes a powerful ISP, native support for RGB-IR color filter arrays, and advanced high dynamic range (HDR) processing, which results in exceptional image quality in low-light and high-contrast environments. CV25’s CVflow architecture delivers the computational power required for liveness detection and 3D face recognition, while running multiple AI algorithms for advanced features such as people counting and anti-tailgating. CV25 includes a suite of advanced security features to protect against hacking including secure boot, TrustZone and I/O virtualisation. The 3D sensing platform will be shown to select Ambarella and Lumentum customers and partners at their respective private events during CES 2020. ON Semiconductor will offer CES 2020 demonstrations of the 3D sensing platform in their demo room at the Venetian/Sands Convention center, Murano 3302.
New ways to identify fake security devices on banknotes, passports and other secured documents will be at the heart of the Optical Document Security conference for central banks, ID issuers and authorities, banknote and ID printers / integrators and secure document component suppliers. The Optical Document Security conference, which takes place in San Francisco, California (January 29 – 31, 2020), will provide insight and guidance for everyone involved in improving the specification, design, production and examination of security documents. Optical document security features The 2020 event will focus on the latest innovations in optical document security features. Among the topics will be caustic optics, asymmetric microstructures and plasmonic technologies from international industry leaders. This well-established and respected conference takes place as the transition from the physical to the digital world gathers pace, so it brings together the best aspects of each being used to secure personally sensitive and financial information. Only people with a legitimate interest in the topic will be accepted for it The Short Course which precedes the conference has forensic examiners from Interpol and the US Department of Homeland Security explaining how they set about examining documents and detection and the trends they are seeing in fraudulent optical features. Given the sensitive nature of this course, only people with a legitimate interest in the topic will be accepted for it. Anti-counterfeiting strategies Sessions will examine human factors and design in optical document security, novel materials, production methods and the rapid adoption of smartphone technology in anti-counterfeiting strategies. The conference, organized by Reconnaissance International, an authoritative source on secured documents, is for people in the public and private sectors involved with the design, production or examination of government issued security documents including financial, tax and ID documents. An essential part of the conference is the exhibition of novel optical security features which takes place during the conference dinner. This allows participants to examine and learn more about items covered in the conference papers. Smartphone recognition The conference comes as a timely opportunity to engage in the debate and examine the most pressing issues" Conference director Dr Mark Deakes, of Reconnaissance International, said, “We are living through a watershed period in how we manage what must be secure documents and secure information. So, the conference comes as a timely opportunity to engage in the debate and examine the most pressing issues, particularly as the co-existence between the physical and the digital worlds gathers pace.” There will be papers from SICPA on caustic optics, OVD Kinegram on asymmetric microstructures and SURYS on its latest plasmonic features. Plasmonics also features in papers from OpSec and Shanghai Jiao Tong University, a newcomer to ODS. Conference newcomers PulseTech Security, Demax and Polytechnique Montreal will present on reflection holograms with QR codes for smartphone recognition, plasmonic color control for smartphone verification, and electrochromic materials respectively. Central banks are also on the agenda - a paper from the European Central Bank will focus on analyzing fake Euro holograms while the Bank of Canada will report on its work on perception studies.
Pulse Secure, the provider of software-defined Secure Access solutions, announces a new distribution partnership with SecureWave, a data security and IT infrastructure value added distributor, to grow its sales channel across the Israel to meet accelerating demand for Zero Trust access security. SecureWave, part of the Exclusive Networks Group is present in more than 30 countries around the world, and maintains an active community of more than 350 partners. The company will offer the integrated portfolio of Pulse Secure solutions, including virtual private network (VPN), software defined perimeter (SDP), network access control (NAC), and virtual application delivery controllers (ADC). Sales and technical enablement SecureWave will support Pulse Secure partners with sales and technical enablement The agreement will include Pulse Secure’s Zero Trust-based Access Suite which delivers protected connectivity, operational intelligence and threat response across mobile, network and cloud environments. “Pulse Secure has been a driving force behind the adoption of Zero Trust Secure Access and we look forward to helping our channel partners to benefit from its visionary position through our expertise, knowledge and experience within this market,” says Moran Gerassi, CEO for SecureWave. As part of the new distribution agreement, SecureWave will support Pulse Secure partners with sales and technical enablement, lead generation and a full educational program. Global distributor network “SecureWave is a highly respected distributor that is well suited to help us expand and support our partner community to match our growing solution portfolio,” said Laurent Delattre, Sales South EMEA for Pulse Secure, “The addition of SecureWave to our global distributor network is a recognition that the move to Zero Trust is prompting significant change in the security landscape and provides a major and untapped opportunity for the channel to capitalize upon.” The Zero Trust security market size is projected to grow from USD 15.6 billion in 2019 to USD 38.6 billion by 2024, at a CAGR of 19.9% from 2019 to 2024 according to MarketsandMarkets Research. Pulse Secure’s Zero Trust focus is delivered with the Pulse Access Suites. Virtual application delivery controller This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability The Suites provide remote, mobile, cloud, network and application security with comprehensive VPN, mobile device management (MDM), single sign-on (SSO), endpoint and IOT device security, network access control (NAC) and virtual application delivery controller (ADC) functionality. Pulse SDP is a Suite add-on which activates software defined perimeter (SDP) components within existing Pulse solutions to provide direct device-to-application trusted connectivity only after successful user, device and security state verification. This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability, deployment flexibility, automated provisioning and resource optimization. In November, Pulse Secure won the Software Defined Vendor of the Year at CRN Channel Awards 2019 recognizing its development of new software defined technologies to help the channel meet growing demand for Zero Trust security.
Ambarella, Inc., an AI vision silicon company, will demonstrate advanced ADAS and AD applications based on Ambarella’s CVflow® SoC family at a private event during CES 2020 in Las Vegas. Ambarella will perform autonomous driving and parking demonstrations using its Embedded Vehicle Autonomy (EVA), a self-driving vehicle, on Las Vegas roads. EVA builds upon 20 years of autonomous vehicle research and utilizes CVflow embedded processors to run AI-based computer vision algorithms. Its camera perception and 8-megapixel stereovision are implemented using Ambarella CV2 processors. Vision-Powered self-Driving vehicles “With EVA our goal is to continue to push the limits of what’s considered achievable with computer vision-powered self-driving vehicles,” said Dr. Alberto Broggi, general manager of Ambarella, Italy. “CV2 provides the needed computational power with up to 20 times more AI performance compared to our previous generation CV1 chip.” Key third-party demonstrations are as follows: Mercedes-Benz will demonstrate its CV2-based Cargo Recognition and Organization System (CoROS): A camera assistant in the cargo space automatically recognizes registered parcels using barcodes and the symbols on the outside of the parcels. This process is done in fractions of a second, replacing manual, time-consuming scanning and sorting of each shipment. Germany-based ADAS software supplier HELLA Aglaia will feature its latest suite of deep learning ADAS algorithms including multi-class object detection, detection of driving area limitations, depth estimation, and classification of traffic lights and traffic signs. Running on a single Ambarella CV22 CVflow SoC, this ADAS platform supports the development of single-box, forward-facing ADAS cameras. Korea-based StradVision will demonstrate its suite of front ADAS and driver monitoring system (DMS) algorithms running on a single CV22. Connected to an 8-megapixel front-facing camera and an additional interior facing camera, this system will be installed and running in a vehicle. Israel-based EyeSight’s driver monitoring solution (DMS) will be shown on a system with three cameras. In this demonstration, Ambarella’s CV25 simultaneously processes a monochrome driver-facing camera, and two RGB-IR in-cabin cameras (each with a different field of view). Israel-based Brodmann 17’s ADAS solutions suite will showcase the company’s deep learning algorithms which include vehicle detection, distance estimation, and real-time forward collision warning running on a CV22 SoC. Other live demonstrations will include camera-based electronic mirrors with blind spot detection (BSD) and intelligent around view monitoring (AVM).
AES Corporation, the manufacturer of wireless mesh communication products and services designed for your monitoring needs, announces the appointment of Laura Wall to the position of Director of Product Management. Laura is the newest member of AES Corporations Leadership Team. She is an experienced and highly collaborative product management leader who specializes in conducting extensive market research. Her expertise in Voice of the Customer (VOC) data collection and strong analytical skill set will be vital in helping the organization to prioritize customer focus and define product requirements. Managing the complete product lifecycle In her new role at AES, Laura will work cross-functionally with all departments to align sales objectives, marketing strategy, and customer support with the engineering product roadmap. This involves managing the complete product lifecycle from concept, to design and development, product launch, and end of life products/components. Prior to joining AES, Laura worked in chain retail, global manufacturing, distribution, and start-up environments. I am excited to work on projects that will deliver high quality products and meet the needs of our customers" Her appointment supports the Company’s plan for growing revenue and market share by strengthening its product line. “This is an exciting time to join AES with many strategic plans and initiatives in place to grow the business not only in the alarm industry, but also into other new markets,” said Laura. “Having spent the past several years working in product management roles, I am excited to work on projects that will deliver high quality products and meet the needs of our customers." Successfully developing and delivering new products Jim Burditt, Vice President of Sales, commented, “Laura is a perfect fit for this new position. I am confident that her experience, knowledge, and leadership skills will help us to successfully develop and deliver new products with ongoing customer feedback.” Laura graduated with a Master of Business Administration from Simmons School of Management, a Bachelor of Science degree in Marketing from Bentley University, and holds an Insight for Innovation certification credential from IDEO U. She is an active member of several industry groups including Product Development and Management Association (PDMA), New Product Development and Agile Innovation (NPD), Product Management Professionals, and Boston Product Management Association.
As we surpass 2019, it’s high time we realize that by merging the digital and physical realm, IoT is destined to change the way we live and work. I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices. IoT in every day life I must say the numbers are quite mind-boggling! And this leaves a lot of room for improvement by incorporating the Internet of Things in software development; whether it’s a cellphone app or web. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices It may interest you to know that the Internet of Things has the potential to touch every domain and nearly every aspect of human life. According to sources, impact on IoT leads to: By 2020, 50 billion devices are expected to connect to the internet In 2015, 3.5 connected devices per person have now reached almost 7 8 billion cellphone broadband access points by 2019 5 million IoT jobs by 2020 70 percent a year growth through 2018 in total sales of clothing and accessories incorporating computer technology, rising from $3 billion today to $42.5 billion $3.3 trillion market for ‘Smart City’ applications and services by 2025 The impact of smart homes Instead of saying the home is where our heart is; a home is where a bot is. However, IoT hasn’t entirely arrived in our homes. I mean, we are still required to order groceries the minute we run out of eggs and Greek yogurt. Slowly and steadily we are getting there; it seems the latest advancements in artificial intelligence and big data analytics will definitely work wonders for us. Smart homes are no longer a dream project; we can soon expect everything to be governed by the “brain” or a central platform. Moreover, bots will be seen tackling a certain set of functions related to more difficult tasks, and lastly niche bots, in charge of single tasks such as vacuuming the house or addressing more complex duties like accounting, coaching or household managing. Tech giants, or should I call them current development frontrunners like Amazon, Google, Samsung and Apple are expected to come up with something nerve-cracking. The benefits of IoT Other than this, with IoT, you will be able to work smarter and not harder. Artificial intelligence and advanced analytics can help create a more intelligent work environment. For example, the right AC temperature in shared office spaces help us book the most convenient meeting room, and moreover, take into account the room preference by setting the right temperature, lighting, and can automatically restock office supplies. This simply leads to: More efficient office operations Energy savings Comfortable work environments Consequently increased employee productivity The dark side of the Internet of Things The potential risks Every technology indeed comes as a boom, but that doesn’t mean the grass will be greener on the other side. Furthermore, we will uncover how even after offering so much convenience why IoT poses so much risk. Like I said before, IoT can be integrated into anything from coffee machines to fitness watches leading to make our lives more convenient. But what happens if they turn bad? When being unwillingly infected or hacked, these blessings can certainly turn into huge threats. IoT can be integrated into anything, leading to make our lives more convenient Devices, systems and the lack of security It may interest you to know that IoT devices can become bots that blindly follow commands to commit crimes as part of a botnet. What is a botnet, you may ask? Well, it is a network of infected devices that are mainly abused by the attacker to perform tasks such as carrying out DDoS attacks, Bitcoin mining and spreading spam emails. Mainly being used to carry out DDoS attacks and to mine for cryptocurrencies, these botnets have the potential to have a larger impact by making IoT devices do much more, such as send spam messages featuring dangerous malware. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices Much like most malware, botnets can be found on dark marketplaces. The source code can be purchased and leaked, depending on the type of service. In case, an IoT device is already infected, another bot can attempt to replace the infection with its code and in some cases also "repair" the security vulnerability. But most of the time it fails! No matter how innocent these proof-of-concept attacks may seem, one cannot deny the fact that IoT devices and systems aren’t properly secured. Hackers can easily gain control of them and cause complete chaos like never before. Collecting information at a cost But how much information can an IoT device collect? What I mean is that by hacking a webcam, one can see what they are pointed at without you even knowing it, smart TVs and personal assistants can pick up sound, and smart cars can give clues to whether or not someone is home. Honestly, the amount of information collected on these IoT devices cannot be determined at any cost. And with everything in the cloud, such information can be intercepted or rerouted to a malicious server and be abused if not properly secured. The more we surround ourselves with IoT devices, the more motivation cybercriminals receive to target us! With the time passing by, let’s simply hope that connected device security will dramatically improve.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilizers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
STANLEY Security, one of the UK’s pioneer security providers, installs a biometric access control system at beverage company Finlays’ Pontefract site to protect its server rooms. A company with over 265 years heritage, Finlays owns and operates tea estates, extraction facilities for tea, coffee and plant extracts, packing facilities and R&D laboratories across four continents. Finlays already had a PAC access control system in place for exterior doors, and number code locks were fitted to the doors of their server rooms but, reviewing security, Finlays wanted to improve the level of security for the latter. Deciding a biometric system The key requirement was to ensure access to the server rooms be controlled by Finlays IT department only" The key requirement was to ensure access to the server rooms be controlled by Finlays IT department only. IT staff work standard office hours so should access be required to the server rooms outside of this, the code for the locks would have to be shared with others or a member of the IT team would have to return to site. Finlays had ruled out a card/tag based access control system due to the inherent issues with lost, stolen or borrowed cards, and had decided a biometric system would be the right solution for them. A number of security companies were approached, including STANLEY Security, which were awarded the contract. “It’s a name we knew and we have a lot of STANLEY product on site,” states Stephen Firth, Finlay’s Group Senior IT Support Engineer. Biometric fingerprint readers “We also have a PAC system which shares the same software that the STANLEY biometric system runs on, so it meant we could easily add to the existing system and view both using the same software, although they are run as stand alone systems for added security.” STANLEY Security installed ievo® biometric fingerprint readers to four server room doors at Finlays STANLEY Security installed ievo® biometric fingerprint readers to four server room doors at Finlays. The system features advanced image reading sensors that take a detailed scan of a finger from the surface and subsurface levels of the skin, to capture a highly accurate digital image whilst protecting against fake and spoof fingerprints. Specific data from the image is converted into a digital template used for fingerprint identification. Biometric access control system Providing a user presents a finger that matches a stored user template, then access will be granted. ievo captures clear, clean images, even when surface features are absent or hard to distinguish due to age, dirt, finger pressure and skin or environmental conditions. Finlays are pleased with the new biometric access control system as it provides the company with the security required but also convenience, as Stephen comments: “Now, IT has full control of who enters the server rooms and there is an audit trail. We don’t have to worry about who has keys to the IT office and who knows the code for the server rooms door locks. What’s more, IT can open any door on the system remotely should it be required, rather than having to return to site. With one of the racks on our server belonging to someone else, that’s an important consideration should they need to gain access out of office hours.”
When Swinkels Family Brewers wanted to unify its access control internationally, it chose AEOS, which enabled this producer of world-famous Bavaria beer to design a system around the people using it. The facts & figures : 6 breweries 27 brands 130 countries 1,800+ employees Swinkels Family Brewers had grown quickly and needed to review its security and apply more stringent measures. It was using two access control systems and wanted to unite everything on one platform. Most importantly, Swinkels Family Brewers wanted a system that would match its people-first approach, and provide the flexibility to adapt and scale in the future. New security policy Initially, Swinkels Family Brewers established a cross-department project group, which developed a new security policy. With that in place, the project group identified AEOS as the system to meet its long and growing list of requirements. During the planning stages, they consulted department managers on their needs. And before AEOS was implemented they ensured their people knew what to expect and why the change was happening. Key benefits: The system is designed around the people using it. Security is stronger but there’s a welcoming sense of warmth and openness. One unified system fulfills all access control needs. Several systems are linked to AEOS and updates transfer automatically. Flexibility to easily add new functionality, such as video monitoring, or scale the system. Impressed with the stability of AEOS Stefan Fehlhaber, Facility Manager at Swinkels says: “We’re very impressed with the scalability, stability and robustness of AEOS. It’s very practical to use in daily life and is easy for our security people to operate. It’s also very convenient for our employees to be able to use one badge at different locations.”
PACOM Systems, which designs, develops, and manufactures security platforms for enterprise multi-site and campus environments, announces that Hancock Whitney Corporation continues to roll out the PACOM GMS security management platform to their growing number of bank financial centers and ATMs. Hancock Whitney Corporation operates bank offices and financial centers in Mississippi, Alabama, Florida, Louisiana, and Texas, offering comprehensive financial products and services, including traditional and online banking; commercial and small business banking; private banking; trust and investment services; healthcare banking; certain insurance services; and mortgage services. Multi-Site security management platform GMS meets end-user demands for a multi-site security system with multiple integrations PACOM’s relationship began with Hancock Bank in Mississippi and, after Hancock’s acquisition of Louisiana-based Whitney Bank in 2011, blossomed further still. Currently, the PACOM GMS software platform manages card access and intrusion monitoring at 258 locations and growing. Hancock Whitney does all its own 24/7/365 alarm monitoring from a central location in Gulfport, Mississippi. There are also two company data centers monitored and protected by PACOM GMS. GMS is a robust multi-site security management platform, providing integration between access control, intrusion, video, intercom and virtually any building management or security solution. Designed to manage thousands of locations simultaneously through a single interface, while providing industry-leading availability and redundancy. GMS meets end-user demands for a multi-site security system with multiple integrations. Third-Party monitoring companies “One of the biggest advantages of the PACOM system,” commented Al Tapper, CPP, Manager, Bank Protective Services for Hancock Whitney Corporation, “is it’s all-inclusive with integrated card access and alarms. We have our entire company on a single, integrated platform. We do our own alarm monitoring, which is a big plus because we can immediately verify what is going on in any of our financial centers.” One of our banking acquisitions had two third-party monitoring companies" Tapper continued, “One of our banking acquisitions had two third-party monitoring companies. It was one false alarm after another. That’s dangerous, and it can be quite expensive. With PACOM and self-monitoring, we avoid that. The PACOM system also helps with disaster recovery. We can see what’s going on in our financial centers and know if our alarms are working.” Central monitoring station Hancock Whitney has launched another phase to their company-wide security platform: video integration. When an alarm goes off in any branch, the central monitoring station will automatically be able to see events associated with that alarm. Eventually, all branches and ATMs will have video monitoring with a number of integrated cameras at each location. The system currently provides access to more than 5,000 card holders with varying levels of access privileges. Alarm protocols are in place for each location, with Tapper and his team managing and monitoring the system. “PACOM helps us adapt the system to our changing needs; and when we provide feedback, PACOM listens and will consistently respond directly to that feedback, said Tapper.”
As one of the most important provinces of Argentina, Buenos Aires Province has been seeking to improve work efficiency and emergency response speed of its police force. However, the local police was always lacking of evidence when performing legal actions towards violence, traffic accidents, and other social incidents. This created temporary loopholes in law enforcement that criminals and erring people took advantage of in order to escape legal sanctions. For this reason, the Ministry of Security of Buenos Aires Province required powerful security tools to assist the local police in patrolling and enhancing the overall level of safety throughout the province. Strong and modern security equipment The Ministry of Security of Buenos Aires authorized the Dahua team to conduct research The Buenos Aires police sought strong and modern security equipment that could monitor the roads during police patrol, while keeping records as evidence. Additionally, they required a management terminal on the dashboard of each patrol car to allow the user to view videos in real time and manage all the surveillance equipment via the system. The technical equipment must be installed in a suitable position to avoid damage in case of car accident or airbag activation, and to ensure passenger safety under adverse conditions, such as weather changes, vehicle temperature shift, etc. After presenting Dahua Mobile Solution that could fulfill the aforementioned requirements, the Ministry of Security of Buenos Aires authorized the Dahua team to conduct research and implementation of this project. Monitoring road conditions The Dahua Mobile Solution covered 400 patrol cars of the Buenos Aires police, each of which was equipped with six HD cameras, including two different models of 2MP Mobile HDCVI IR Dome Camera – HDBW1200F-M and HDBW2241F-M-A, 3MP Network IR Mini-Bullet Camera IPC-HFW1320SP, and 2MP Mobile HDCVI IR Cube Camera HAC-HMW3200. Five cameras were also installed outside each patrol car to monitor road conditions from every angle In addition, five cameras were also installed outside each patrol car to monitor road conditions from every angle: HDBW2241F-M-A on both sides; HDBW2241F-M-A and IPC-HFW1320SP on the front top; and HAC-HMW3200 at the back. All of the products support IP67& IP6K9K, shock-proof, and resistant to vibration and severe weather conditions. HDBW1200F-M was installed inside each car to monitor its situation and regulate police behavior. As part of the requirement, the management terminal was installed at the center of the dashboard and linked to the central server through a 10/100 wired Ethernet connection via an RJ45 connector. Automatic recognition technology In addition to the cameras, Dahua Mobile Video Recorder MXVR4104-GFW was also deployed for efficient video storage. Its embedded GPS positioning allows the user to track the vehicle in real time. In case of emergency, it will trigger the alarm and automatically upload the data on time. It also supports image capturing of suspected vehicles and uploads them to the management platform It also supports image capturing of suspected vehicles and uploads them to the management platform. Indeed, Dahua Technology has launched a smart police car solution to aid the police in identifying suspected vehicles and people. Featuring automatic recognition technology, the new device can compare suspected vehicles and people with the information in its database, achieving efficient mobile control and identification. Mobile video surveillance solution With the implementation of Dahua Mobile Solution, the Buenos Aires police can now manage social security better through a comprehensive monitoring system. The mobile surveillance system with high-definition image quality and other advanced functions enabled the police to obtain first-hand evidence, achieve timely intervention and control dangerous and detrimental activities during their patrolling. This significantly improved their work efficiency, stabilized social order, and helped build a safe and harmonious community. “We are very satisfied with Dahua products. The mobile video surveillance solution used in police cars enables our police to work more efficiently and safely because the surveillance center is available 24 hours a day, providing appropriate assistance in solving various issues or incidents that the police may encounter. ” Said Dr. Ignacio Greco, Deputy Secretary of the Provincial Ministry of Security, Buenos Aires.
Protecting assets and people has always been a top priority for Kirkland’s, a global home décor retailer. With over 400 stores in 37 states, Kirkland’s is a go-to spot for a broad selection of distinctive merchandise: art, mirrors, candles, lamps, frames, accent rugs, furniture and more. When they evaluated their security solutions in 2016, they determined they needed to upgrade the analog video surveillance systems in use at their existing locations and plan for new stores. Analog video surveillance cameras Management wanted a camera that provided a clear picture, while minimizing bandwidth usage Saraya Charlton, Kirkland’s Loss Prevention Investigator, said the analog video surveillance cameras they had in place were acceptable, but they desired cameras with wider coverage and better resolution. The department was also frustrated with the amount of time it took to investigate incidents for loss prevention and personal injury claims. Each time they were called to investigate an incident – vandalism, theft, employee misconduct, a slip and fall, or a cut from broken merchandise – each individual store had to extract the footage from the analog DVR at that location and send it to loss prevention at Kirkland’s headquarters. Charlton said Kirkland’s sought an IP-based solution that could be accessed remotely, that would make the loss prevention investigation process more efficient and would provide additional benefits. Management wanted a camera that provided a clear picture, while minimizing bandwidth usage and had analytics capability. IP video surveillance solution Working with several systems integrators, Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient enterprise Video Management Software (VMS). The first phase of the security upgrade has included the deployment of 1,800 Hanwha Wisenet X series XNV-6011 2 megapixel HD dome cameras and Wisenet Lite vandal-resistant dome cameras at 200 Kirkland’s locations, as well as the distribution center and the e-commerce building. As new stores are built by this growing retailer, they will also include the Hanwha-Salient security solution. They expect to have a full migration to IP at all locations by 2021. Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient enterprise VMS Perfect fit for The retail environment The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less Each Kirkland’s location is outfitted with approximately eight cameras that are positioned to capture the entrance, the sales floor and the back of house operations. Charlton said Hanwha’s cameras provide the most comprehensive view of the store possible. “The wide-angle capability – as well as the quality of the camera – is really what sold us on Hanwha,” said Charlton. “We are getting the best views possible and they are allowing us to see the entire sales floor which is exactly what we wanted and needed.” Hanwha’s Wisenet X series of cameras is a perfect fit for the retail environment. The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less. Pulling recorded video Charlton said the Hanwha cameras are particularly useful at store entrances because, thanks to the WDR feature, video images are not affected by the bright sunlight that often shines through the windows and they can still see faces clearly. And because many of Hanwha’s cameras offer license free analytics, Kirkland’s will begin exploring that capability in the future to gain information on people counting, heat mapping and dwell time. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot The Hanwha-Salient solution has improved Kirkland’s loss prevention investigation efficiency since the team is able to pull recorded video from any camera via the Salient VMS rather than wait for information to be extracted from an analog DVR. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot and resolve any camera issues remotely first rather than unnecessarily sending out a service technician. Video surveillance and security bandwidth In addition to offering quality images, improved field of view and more efficient operations, the Hanwha solution has also helped Kirkland’s conserve valuable bandwidth with Hanwha WiseStream II compression technology, said Charlton. WiseStream II dynamically controls encoding, balancing quality and compression according to movement of the image. Combined with H.265 compression, bandwidth efficiency can be improved by up to 75 percent compared to current H.264 technology. “We share our video surveillance and security bandwidth with our Point of Sale system and we don’t ever want to take away from the bandwidth of POS transactions or impact the speed at which they go through,” said Charlton. “Hanwha’s Wisestream compression technology fits our business model and along with Salient helps preserve and efficiently manage bandwidth. It’s really helpful to have a camera that’s smart enough to be able to tweak and regulate itself.”
Bluebird House is a specialist UK inpatient facility, providing treatment and care for young people with complex mental health problems which mean they pose a risk to themselves or others. Run by Southern Health NHS Foundation Trust, the center also houses adolescents detained under the Mental Health Act, so the highest standards of care, protection and security are required. As part of a wider review of security and safety across the trust, Bluebird House was earmarked for a comprehensive video surveillance upgrade and IDIS technology was chosen as the best-fit for this major project. Providing comprehensive coverage All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients Galeco engineers installed 110 IDIS 12MP Super Fisheye cameras in communal and therapeutic areas inside the facility and over 40 bullets and 13 PTZ cameras cover the exterior. All the cameras are connected to six 32-channel NVRs and managed via IDIS Center video management software (VMS). All IDIS equipment uses true plug-and-play set up, which minimizes disruption and disturbance to patients, while protection against gaps in footage is provided by IDIS Smart Failover ensuring 24/7 continued recording even during network instability or drop-out. Implemented across three secure wards and two high care units, the 12MP IR Super Fisheyes provide comprehensive coverage much more affordably than two or more fixed lens cameras. Advanced IDIS video capture technology delivers complete high-definition scene coverage in all lighting conditions and allows staff to de-warp in live view as well as playback. Automatic object detection The 5MP bullet cameras, deployed around the building exteriors provide coverage of gardens, courtyards and car parks. IR LED that allows night-time image capture at distances up to 30m and includes intelligent functions such as active tampering alarms and trip zones and will notify the security team to any breach. Each camera is set to perform virtual guard tours at specific times throughout the day and night IDIS 31x Zoom IR PTZ cameras are installed along the perimeter to provide clear night-time image capture at distances up to 200m. Each camera is set to perform virtual guard tours at specific times throughout the day and night. Featuring automatic object detection, the cameras recognize and automatically track objects, people or cars capturing useful footage and alert operators of any suspicious activity. To meet patient privacy requirements, access to live and recorded footage, is limited to staff according to their ward and role. Access to advanced features and functionality Staff can only view and review footage from their area of responsibility at designated monitoring stations using specialist IDIS monitors designed for high-performance surveillance operations. To meet future requirements, the new IDIS solution can be linked to the trust’s local area networks (LANs) without increasing cyber- security concerns, thanks to IDIS’s use of proprietary software which is inherently resilient. The totally cost-free IDIS Center video management software (VMS) gives security managers and senior staff a complete overview of the entire site from a 24/7 manned and centralized control room. Using the intuitive IDIS Center interface, operators have complete command and control of each camera and access to advanced features and functionality to ensure the secure and smooth day-to-day running of the site. Authorized monitoring and access of footage IDIS technology made this easy, and it was also the quickest and least disruptive to install Video surveillance is a key resource for clinicians, Sr. managers and security staff at Bluebird House as they need to work closely together to deal with incidents and reduce risks of harm. Improved video coverage was needed as it would allow ongoing review of care standards and full investigation of any alleged incidents. Patient privacy is also of paramount importance, so specialist integrator Galeco Communications was selected to implement a solution that would allow authorized monitoring and access of footage for specific rooms and wards. IDIS technology made this easy, and it was also the quickest and least disruptive to install, the most secure against cyber-attacks - in compliance with NHS requirements – and yet would deliver the lowest total cost of ownership (TCO). Ensuring better safety and security Replacing the centre’s aging camera system, the IDIS solution would give complete coverage of corridors, wards and other high-risk areas in all lighting conditions. The IDIS solution has improved security, safety and care at Bluebird House by providing a complete video record of events. Exterior cameras ensure better safety and security in outdoor communal areas Footage from the 12MP Super Fisheye cameras give a full 360 view without any blind spots with a choice of 6 view modes and crucially provides staff with the ability to de-warp footage retrospectively. Now, if incidents need to be investigated it’s a simple task to retrieve video and provide any high-definition evidence required. Exterior cameras ensure better safety and security in outdoor communal areas, while security operators can quickly detect and respond to any suspicious activity on the perimeter. Access and review recordings "A key benefit for us is that this new system is so easy to use, and particularly for our clinical staff who can now access and review recordings to help them improve patient care. This video technology gives us extra confidence that our patients and staff are safe and protected” said Tracey Edwards, Head of Security at Southern Health NHS Trust. With minimal disruption, and working in this sensitive location, Galeco engineers were able to replace an outdated system with an affordable, high-performance, cybersecure solution that is easy to maintain and operate without any ongoing license fees.
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security devices: Manufacturers & Suppliers
- Dahua Technology Security devices
- Vicon Security devices
- Bolide Security devices
- Vanderbilt Security devices
- Seagate Security devices
- Bosch Security devices
- Aritech Security devices
- Hanwha Techwin Security devices
- Parabit Security devices
- LILIN Security devices
- VIVOTEK Security devices
- BCDVideo Security devices
- Hikvision Security devices
- Sony Security devices
- ComNet Security devices
- Videotec Security devices
- CEM Security devices
- Pelco Security devices
- Arecont Vision Security devices
- HID Security devices