Pushing forward with the surveillance industry revolution, VIVOTEK, the globally renowned IP surveillance solution provider, launches its iNSIGHT series fixed dome camera, the FD9392-EHTV-O, and AI-box, the IE9111-O. The iNSIGHT series presents added value and deeper understanding that goes beyond the surface. Driven by the Open Security & Safety Alliance (OSSA), the initiative follows OSSA’s Technology Stack for video security devices that prescribes an open and standardized platform...
DMP releases its new line of alarm communication radios that are FirstNet Ready™ and approved for use on FirstNet®. FirstNet is built with AT&T in a public-private partnership with the First Responder Network Authority and is the only nationwide, high-speed broadband communications platform dedicated to and purpose-built specifically for America’s first responders and the extended public safety community. It’s the solution to decades-long interoperability and communica...
Vanderbilt, a provider of state-of-the-art security systems, announces the release of ACT Enterprise 2.14. ACT Enterprise is the company’s award-winning access control software that has a wealth of features and integrations. The latest additions in version 2.14 include extended integration with KONE and new video integration with Hanwha. The software has also added contact traceability reporting to its suite of tools. For instance, thanks to contact traceability reporting, users of ACT En...
Theft, fraud, and losses cost the retail industry $61.7 billion in 2019, according to the annual National Retail Security Survey conducted by the National Retail Federation, security executives reported a steep increase in incidences of shoplifting, organized retail crime, and employee theft over the year prior. The Loss Prevention Foundation (LPF), a pioneer in educating and certifying retail loss prevention and asset protection professionals, and ASIS International, the membership organizatio...
BlueVoyant, a cybersecurity services company, announces a strategic partnership with Argos Risk, a provider of financial risk intelligence. The alliance will see data from Argos Risk’s AR Surveillance™ solution utilized in BlueVoyant’s third-party Cyber Risk Management (CRx) suite of services. The aggregated, complementary third-party risk data will better enable BlueVoyant to provide customers with clarity into their own security posture, and visibility across their vendor ec...
Barix is now shipping its cost-efficient IP Former for transforming analog loudspeakers into feature-rich, networked IP speakers. Enabling easy upgrades of existing audio deployments to support advanced IP functionality, the new module lets systems integrators and installers offer customers a digital audio environment without jettisoning their current speakers. Replacing the 70/100V transformer traditionally used with analog loudspeakers, IP Former adds IP networking capabilities to new or exis...
The Alarm.com Smart Water Valve+Meter is now available to service providers partnered with Alarm.com and its subsidiaries to help protect connected homes and businesses from unexpected water emergencies and steep water bills. The award-winning device, unveiled at the Consumer Electronics Show (CES) earlier this year, is an affordable, Z-Wave water shutoff valve that combines innovative technology with high-quality plumbing hardware. Leveraging critical system and occupancy data helps the Smart Water Valve+Meter intelligently respond to large leaks, small drips and leaky appliances that cause billions of dollars in property damage every year. Preventing water damage “We are big fans of the Smart Water Valve+Meter because of the insight it provides, especially around how much water is being used and even wasted at times,” said Matt Madden, project manager at Superior Alarm & Electronics. “The data it provides can help customers be more aware of their water use and costs. Another crucial aspect is its ability to detect and react to water leaks of any size and alert the customer via the mobile app. You can’t put a price on peace of mind.” Designed and developed by Building36, a subsidiary of Alarm.com, the Smart Water Valve+Meter quickly identifies excessive or continual water flows to help prevent water damage, as well as health and safety issues that often result from prolonged low-volume leaks. Water management solution Property owners get mobile alerts about excessive water usage to avoid higher water bills As part of the Alarm.com Water Management solution and overall ecosystem, users can manage everything remotely through a single point – the Alarm.com mobile app. Property owners get mobile alerts about excessive water usage to avoid higher water bills and real-time water use data to guide conservation efforts in their homes and businesses. “Our comprehensive water solution that includes the Smart Water Valve+Meter makes homes and businesses safer from damaging and costly water problems,” said Jeff Bedell, chief strategy and innovation officer for Alarm.com. “The advantages of having a robust ecosystem of connected devices make it easy for our partners to deliver solutions that help their customers protect the things they care about most.” Integrator and installer benefits The Alarm.com Smart Water Valve+Meter has earned multiple awards this year. It received a 2020 SIA New Product Showcase award and a 2020 Security Sales & Integration Most Valuable Product award, for its unique design, function and integration features, such as: Automatic water supply shut-off when leaks are detected Remote control and automation as part of Rules or Scenes from the mobile app or customer website Durable, high-quality manufacturing and materials Monitoring for tiny leaks without the need to shut down the water supply to a property Real-time view of water consumption Patterns behavior to identify and signal when water use differs from normal There are numerous integrator and installer benefits as well, including over-the-air firmware updates to reduce post-installation customer visits and support costs.
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the INJ-C200G-bt-T. Antaira Technologies’ INJ-C200G-bt-T is an industrial high-power IEEE 802.3bt Type 4 Power over Ethernet (PoE) injector which provides up to 97 watts of power. This compact PoE injector is backwards compatible with IEEE 802.3af/at standards and provides two gigabit Ethernet ports for data. Harsh industrial applications The INJ-C200G-bt-T is IP30 rated, DIN-rail and wall mountable, and supports an extended operating temperature range of -40°C to 75°C, making it ideal for outdoor or harsh industrial applications. This industrial switch series provides high EFT, surge (2,000VDC), and ESD (6,000VDC) protection to prevent any unregulated voltage and can support the power redundancy feature using a dual-power input design with reverse polarity protection. There is also a built-in relay warning function to alert maintenance when power failures occur.
RS2 Technologies, a provider of access control systems, announces the availability of free mobile credentials for its innovation-rich platforms, such as Access It! Universal.NET, through its partnership with WaveLynx Technologies. The partnership allows RS2 to provide its customers with safe and secure access via mobile phone to doors in office buildings, government facilities, healthcare institutions, schools, residences and a growing number of enterprises. Access control system Available on both iOS and Android smartphones, the mobile credentials are easy to issue and use to grant and restrict access to users and visitors without having to issue key cards or fobs. The mobile credentials are easy to issue and use to grant and restrict access to users and visitors The WaveLynx Technologies integration with Access It! Universal.NET allows a seamless and touchless enrolment into the access control system. The application does not require any subscriptions or fees, making it an extremely flexible and affordable solution that allows organizations to transition to mobile access at their own pace. Mobile-Based credentials “Adding the capabilities of the WaveLynx credentials provides RS2 customers with another way to grant access across a variety of enterprise organizations that prioritize functionality and ease-of-use for their access control systems,” said Jeff Bransfield, National Sales Manager, RS2 Technologies. “The use of our mobile devices as a means to access a facility is growing in popularity and the team at WaveLynx has brought that ability to RS2’s customers with its level of accessibility that we haven’t seen before. As this demand for touchless access and streamlined credential issuance grows in popularity, there will be a real opportunity across the market to adopt mobile-based credentials for a broader audience.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that Security Center Omnicast™, its video management system (VMS), has received the UL 2900-2-3 Level 3 cybersecurity certification for the second year in a row. Genetec is currently the only VMS vendor in the world to have achieved this certification. The UL Cybersecurity Assurance Program (UL CAP) is a robust certification program that evaluates the security of network-connectable products and vendor processes. Physical security systems It features standardized, testable criteria from the UL 2900 series of cybersecurity standards for assessing software vulnerabilities and weaknesses in embedded products and systems. The UL 2900-2-3 Standard for Security and Life Safety Signaling Systems was created with three possible levels of certification, ranking with an increasing level of security for each tier, to specifically test physical security systems for cybersecurity robustness. Level 3, for which the Security Center Omnicast™ VMS is certified, is the most advanced. It includes a series of checks including fuzz testing, code and binary analysis, vulnerability assessment, penetration testing, and risk management methodology validation. Cybersecurity certification program “As a global safety science leader, UL is dedicated to promoting safe environments. As part of that mission, the UL Cybersecurity Assurance Program is a robust cybersecurity certification program for network-connectable products, which has to be renewed every year,” said Chris Hasbrook, UL’s vice president and general manager, Building and Life Safety Technologies division. “As a vocal proponent of cybersecurity best practices for many years, we have always given fastidious attention to our own processes and operations. Being awarded this UL 2900-2-3 Level 3 Certification for the second year is another testament to our continuous commitment to cybersecurity,” said Christian Morin, CSO at Genetec Inc.
TrackTik Software, the cloud-based security workforce management solution based in Montreal, Quebec, recently announced the issuance of Canadian Patent 2799170, which relates to the System and Method for Monitoring an Area Using NFC Tags. Simon Ferragne, TrackTik founder and CEO, originally filed the patent 8 years ago in 2012—a time when using smartphones by security personnel was rare. The technology was disruptive and innovative and this patent is now being used by security guards around the world, so its recent issuance validates that tremendous achievement. Technological advancements “From its inception, I knew NFC would play a transformational role in the evolution of guard tour systems in the security industry. The adoption of NFC and smartphones metamorphosed the way security firms deliver their services and increase their value proposition. But this is just the beginning as recent technological advancements in machine learning, artificial intelligence, and data analytics will continue to change the industry,” says Simon Ferragne. About the patent TrackTik Software was granted the patent for technology whereby a mobile device scans NFC tags and sends that data to a remote server in real time. The data may include the ID of the tag being scanned, the timestamp and/or position of the device at the time of scanning, and the ID of the employee performing the scanning. The server detects the ID of the NFC tag from the data received from the mobile device, and performs the functions associated with the NFC tag.
ReliaQuest, a pioneer in cybersecurity, announces its unique ‘Open XDR’ approach that solves modern enterprise cybersecurity challenges through its GreyMatter platform. Unlike other XDR tools that limit organizations to a single vendor tech stack, ReliaQuest’s vision centers on bringing flexibility and visibility to disparate data sets and technologies. This approach enables enterprises to gain security confidence through the centralized detection and remediation of threats across their siloed IT architecture. Disparate datasets and workflows "XDR is a new take on an old problem that aims to unify control points, security telemetry, analytics, and operations into one enterprise offering but requires the same vendor for all tools. ReliaQuest identified an opportunity to improve upon this model with Open XDR. GreyMatter unifies technologies from multiple vendors through an integrated platform that helps security teams achieve the necessary visibility from their existing tools and processes--thereby accelerating detection and response," said Brian Murphy, CEO and founder of ReliaQuest. Security analysts’ jobs are extremely complex as analysts are mired with too many alerts" “Security analysts’ jobs are extremely complex as analysts are mired with too many alerts, disparate datasets and workflows, and an ever changing attack landscape,” said Jon Oltsik, Principal Analyst and Fellow at Enterprise Strategy Group. Independent security tools “Open XDR can help by unifying toolsets, alerts, and providing the context analysts need in order to speed detection and response. With the universal translator acting as an integration platform, GreyMatter is well suited to deliver on the promise of Open XDR—directly addressing security operations complexity.” GreyMatter provides an Open XDR solution that delivers the following outcomes: Integration of multiple independent security tools for unified detection, investigation, and response Cross-technology visibility in weeks, powered by a patented ‘universal translator’ solution Aggregation of relevant data on demand, without the need to build and maintain costly and cumbersome data lakes Continuous optimization of security technologies and processes A guided reporting framework to drive security program measurement and continuously increase maturity Automation across the security lifecycle, applying the development principles of continuous integration/ continuous deployment to the security realm 24/7/365 support from a team of security and program management practitioners, dedicated to helping teams achieve security program goals Security advisory expertise “For years vendors have promised to deliver a ‘single pane of glass’ but always fell short,” said John Childers, Director, Information Security, Aqua America. “ReliaQuest GreyMatter unifies security tools for visibility across layers, aggregated alerting, faster investigation and response, bolstered by proactive threat hunting and attack simulation to continually improve your posture, all wrapped with security advisory expertise for accelerating key initiatives.” ReliaQuest recently integrated with SentinelOne’s Singularity XDR platform To further bolster GreyMatter’s Open XDR offering, ReliaQuest recently integrated with SentinelOne’s Singularity XDR platform. This integration enables organizations to prevent, detect, respond, and hunt across existing cybersecurity technologies, regardless of vendor, which vastly increases visibility across the enterprise. As part of the solution, data is collected from SentinelOne and ingested into GreyMatter’s proprietary universal translator, where it is normalized with data from a customer’s other technologies – including SIEM, multi-cloud, and third-party tools. Prominent cyber threats “CISOs are seeking a simple way to manage everything across the network – from endpoints to cloud workloads and IoT devices,” said Brandon Andrews, VP Global MSSPs & Alliances at SentinelOne. “Without having full transparency into everything that’s happening, CISOs can’t effectively protect what matters most from the elaborate schemes of today’s cybercriminals. Our partnership with ReliaQuest helps organizations overcome today’s most prominent cyber threats through complete visibility and action – empowering organizations to protect tomorrow’s threats, today.” This news comes on the heels of a banner year for ReliaQuest. In August, the company raised over $300 million in growth financing in a round led by global investment firm KKR, with participation from Ten Eleven Ventures and ReliaQuest founder and CEO Brian Murphy. ReliaQuest GreyMatter provides deep integration with and across more than 40 top enterprise technologies to provide customers with visibility and automated response capabilities across their existing technology investments.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
As we surpass 2019, it’s high time we realize that by merging the digital and physical realm, IoT is destined to change the way we live and work. I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices. IoT in every day life I must say the numbers are quite mind-boggling! And this leaves a lot of room for improvement by incorporating the Internet of Things in software development; whether it’s a cellphone app or web. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices It may interest you to know that the Internet of Things has the potential to touch every domain and nearly every aspect of human life. According to sources, impact on IoT leads to: By 2020, 50 billion devices are expected to connect to the internet In 2015, 3.5 connected devices per person have now reached almost 7 8 billion cellphone broadband access points by 2019 5 million IoT jobs by 2020 70 percent a year growth through 2018 in total sales of clothing and accessories incorporating computer technology, rising from $3 billion today to $42.5 billion $3.3 trillion market for ‘Smart City’ applications and services by 2025 The impact of smart homes Instead of saying the home is where our heart is; a home is where a bot is. However, IoT hasn’t entirely arrived in our homes. I mean, we are still required to order groceries the minute we run out of eggs and Greek yogurt. Slowly and steadily we are getting there; it seems the latest advancements in artificial intelligence and big data analytics will definitely work wonders for us. Smart homes are no longer a dream project; we can soon expect everything to be governed by the “brain” or a central platform. Moreover, bots will be seen tackling a certain set of functions related to more difficult tasks, and lastly niche bots, in charge of single tasks such as vacuuming the house or addressing more complex duties like accounting, coaching or household managing. Tech giants, or should I call them current development frontrunners like Amazon, Google, Samsung and Apple are expected to come up with something nerve-cracking. The benefits of IoT Other than this, with IoT, you will be able to work smarter and not harder. Artificial intelligence and advanced analytics can help create a more intelligent work environment. For example, the right AC temperature in shared office spaces help us book the most convenient meeting room, and moreover, take into account the room preference by setting the right temperature, lighting, and can automatically restock office supplies. This simply leads to: More efficient office operations Energy savings Comfortable work environments Consequently increased employee productivity The dark side of the Internet of Things The potential risks Every technology indeed comes as a boom, but that doesn’t mean the grass will be greener on the other side. Furthermore, we will uncover how even after offering so much convenience why IoT poses so much risk. Like I said before, IoT can be integrated into anything from coffee machines to fitness watches leading to make our lives more convenient. But what happens if they turn bad? When being unwillingly infected or hacked, these blessings can certainly turn into huge threats. IoT can be integrated into anything, leading to make our lives more convenient Devices, systems and the lack of security It may interest you to know that IoT devices can become bots that blindly follow commands to commit crimes as part of a botnet. What is a botnet, you may ask? Well, it is a network of infected devices that are mainly abused by the attacker to perform tasks such as carrying out DDoS attacks, Bitcoin mining and spreading spam emails. Mainly being used to carry out DDoS attacks and to mine for cryptocurrencies, these botnets have the potential to have a larger impact by making IoT devices do much more, such as send spam messages featuring dangerous malware. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices Much like most malware, botnets can be found on dark marketplaces. The source code can be purchased and leaked, depending on the type of service. In case, an IoT device is already infected, another bot can attempt to replace the infection with its code and in some cases also "repair" the security vulnerability. But most of the time it fails! No matter how innocent these proof-of-concept attacks may seem, one cannot deny the fact that IoT devices and systems aren’t properly secured. Hackers can easily gain control of them and cause complete chaos like never before. Collecting information at a cost But how much information can an IoT device collect? What I mean is that by hacking a webcam, one can see what they are pointed at without you even knowing it, smart TVs and personal assistants can pick up sound, and smart cars can give clues to whether or not someone is home. Honestly, the amount of information collected on these IoT devices cannot be determined at any cost. And with everything in the cloud, such information can be intercepted or rerouted to a malicious server and be abused if not properly secured. The more we surround ourselves with IoT devices, the more motivation cybercriminals receive to target us! With the time passing by, let’s simply hope that connected device security will dramatically improve.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilizers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Empire House, the luxury business members' club due to launch in West Yorkshire in a few weeks, has invested a five-figure sum in state-of-the-art, automated security systems to create a slick customer experience, intensify site security and help protect clients from COVID-19. In readiness for opening in a few weeks’ time, the Slaithwaite-based business center – which will incorporate offices, a ‘lounge’ area with stocked bar and corporate and event facilities – is set to attract businesspeople from all over West Yorkshire and offer 24-hour access to tenants. CCTV and intruder system Recognizing a need to heighten client experience and reduce the manpower required, Empire House has invested in CCTV, access control, fire and intruder alarm support from Huddersfield-based specialists, Centurion Fire & Security Ltd. The automated system has been designed to make the management of the building simple. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality Able to be programmed to allow and deny access around the building, the system ensures that no unauthorized individuals can gain entry. It is wholly integrated with the CCTV and intruder system, permitting ‘triggers’ and push-notifications to key holders when an area has been ‘breached’. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality, allowing or denying entry based on whether they are wearing a mask or not. Manned onsite teams Amy Byram is the founder of Empire House. Commenting on the investment, she said: “We wanted to provide the utmost security for our clients, whilst ensuring that their experience is slick and uninterrupted – the last thing that people want is to feel that their privacy is being intruded, and we have got that balance just right.” “I am impressed with the functionality of the software, which will allow the management team to ensure security is maximal at all times, without the costly need for manned onsite teams. We can lock and unlock doors directly from an app, whilst enabling us to mark people as safe or missing in an emergency. We hope our clients will be as equally as impressed by the technology as we are.”
Allot Communications Ltd., a global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has announced that a Tier-1 telecom operator in APAC has selected Allot HomeSecure to provide consumers with zero touch clientless cyber security and parental control services, to protect the CPEs/routers and devices in their homes. HomeSecure solution The HomeSecure solution will be deployed in CPEs provided to consumers by the operator, and in the operator’s cloud-native environment. The services are expected to be made available to millions of the operator’s fixed broadband customers. The operator has ordered an enterprise-wide perpetual license from Allot. According to the Microsoft Security endpoint threat report 2019, the malware encounter rate in APAC was 1.6 times higher than the global average. In light of these conditions, Allot HomeSecure gives telecom providers in APAC a unique opportunity to deliver zero-touch, fully automated services that protect their customers while generating supplemental revenues. Security for home IoT and smart home devices Allot HomeSecure provides security for home IoT devices and smart appliances Allot HomeSecure provides security for home IoT, smart appliances, and the devices connected to the home network. It integrates into the existing home router with the addition of a thin software client that provides home network visibility, cyber security and parental controls without the need for any configuration by the consumer. Allot HomeSecure uses AI to identify and profile connected home devices and to detect and act upon anomalous device behavior. HomeSecure has the option to be managed from an easy-to-use app for every household that gives consumers control over their network security and parental controls. “Our customer in APAC sees anti-malware protection for all home-connected devices and parental controls as basic requirements for any offering they provide to their millions of fixed broadband customers. HomeSecure gives them a single zero-touch clientless solution that satisfies both of these demands,” said Ran Fridman, EVP Global Sales at Allot.
The sailings may take as little as 22 minutes, but carrying almost 4.5 million holidaymakers and Islanders to and from the Isle of Wight every year is a huge challenge. It is perhaps not surprising therefore to discover that Wightlink has invested in the latest video security technology to help them do so safely and efficiently. The team at award-winning ferry operator Wightlink knows more than a thing or two about giving Islanders a frequent and punctual service to mainland Hampshire, as well as offering visitors an easy way to enjoy a taste of Island life. Providing ferry services Through its forerunners, Wightlink has been providing ferry services to and from the Isle of Wight for more than 160 years. As the cross-Solent ferry operator, Wightlink in a normal year would complete approximately 45,000 sailings over three routes with the help of a fleet of ships which includes six vehicle and passenger ferries and two passenger-only FastCats. Hanwha Techwin Europe’s Managing Director Bob (H.Y.) Hwang Ph.D., recently traveled to Portsmouth to see first-hand how Wisenet cameras are being used to assist Wightlink in almost every aspect of their day-to-day operations. Bob was accompanied by Jeff (Chae Won) Lee, the company’s Sales Director and Senior Strategic Sales Manager, Jon Hill. High definition images Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras Over 260 Wisenet cameras have already been installed around Wightlink’s Portsmouth and Lymington facilities, as well as on three of the company’s ships. With safety of paramount importance, some of the cameras are being used to help verify any health & safety incidents which might occur in one of the terminals or onboard the ships. On the bridge, Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras mounted at the bow and stern of the ships, which are assisting them with great precision to dock safely and efficiently. In addition, cameras supporting ANPR have also been deployed at various locations to ensure the smooth flow, identification and tracking of vehicles through every stage of their journey. IP network video surveillance The day was organized by Jim Kernahan, Managing Director of Trellisworks, a system integrator with extensive experience of designing, installing and maintaining IP network video surveillance, wireless and mobile network solutions. “The visit provided an excellent opportunity for Bob (H.Y.) Hwang and his colleagues to see how the Wisenet cameras were being put to good use,” said Jim. “However, our prime objective was to meet with members of the Wightlink team to explore how Trellisworks and Hanwha Techwin can continue to work in partnership to assist them in capitalizing on the latest advances in technology.” Hybrid energy ferry Stuart James, Wightlink’s Marketing and Innovation Director, who has the task of devising and driving the company’s strategy of continual improvement by wisely investing in new technologies and systems, provided a guided tour of the company’s Portsmouth harbor facilities and its newest and environmentally-friendly hybrid energy ferry, Victoria of Wight. We were able to generate a number of good ideas on how we can build on the success of the existing cameras" “I was pleased to host the visit and take the opportunity to express our appreciation and satisfaction with how well Trellisworks and Hanwha Techwin have been working together for our benefit,” said Stuart. “Most importantly, we were able to generate a number of good ideas on how we can build on the success of the existing cameras.” The discussions which followed on from the tour focused on how the latest technology might assist Wightlink to further enhance safety and security by supporting on shore staff and the ships’ crews, as well as ensuring every passenger has the best possible customer experience. Video security solutions Among the options considered were specialist video applications, such as passenger counting and queue management which can be run on-board Wisenet cameras and AI Deep Learning solutions. Commenting on the visit, Bob (H.Y.) Hwang said: “We are very grateful to Stuart for providing us with a great insight into Wightlink operational requirements and also to the company’s CEO, Keith Greenfield, who kindly took the time to greet us.” “We are understandably delighted that a prestigious and superbly well-run company such as Wightlink has placed its trust in Hanwha Techwin to provide effective and future proof video security solutions. We are looking forward to working ever more closely with Trellisworks, which is a member of our STEP partnership program, to ensure together we are always able to exceed Wightlink’s expectations.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that the Santa Cruz Beach Boardwalk, an iconic amusement park in California, has recently upgraded its security infrastructure with the Security Center platform. By unifying video and access control park-wide, the park’s security team is able to speed up investigations and emergency response. Touted as the ‘Coney Island of the West’, the seaside park features about 40 rides, 30 restaurants, 15 retail shops, arcades, miniature golf, bowling, and conference and banquet facilities. Video surveillance technology As an admission-free park, guests can enter through multiple entrances to buy food, purchase ride tickets, or simply walk around and enjoy the surroundings. Unlike gated parks which typically have a main security checkpoint, the park’s security team must be hyper-vigilant to spot potential security threats before they can develop. Security operators constantly monitor video cameras and work directly with field officers to handle issues. While video surveillance technology helped security teams watch over the large park, aging equipment began compromising their efficiency. As the search for a new video management system began, the team prioritized openness, reliability, and a vendor’s reputation in the market. Moreover, their aging access control system would soon need replacing too. Actively monitoring cameras The team at Santa Cruz Beach Boardwalk uses the Security Center platform to manage over 400 cameras and 220 doors The Santa Cruz Beach Boardwalk team chose the Genetec Security Center platform because of its unique ability to unify video surveillance, access control, and other systems and sensors. The flexibility of the platform was a key selling point and enabled them to choose their preferred cameras and door hardware. Today, the team at Santa Cruz Beach Boardwalk uses the Security Center platform to manage over 400 cameras and 220 doors across the entire amusement park. From one single interface, operators actively monitor cameras and doors, respond to alarms, handle investigations, and export and share video evidence. This ensures that every security incident is effectively resolved without having to switch applications. Video surveillance system “Like any busy amusement park, our guests sometimes become separated from their groups. When this happens, we are now able to use the Security Center Omnicast™ video surveillance system, along with assistance from our field officers, to quickly reunite guests with their parties,” said Will Graham, Security Technology Administrator at Santa Cruz Beach Boardwalk. If motion is detected near a perimeter after opening hours, the platform will trigger an alarm and display live video and a 10-second replay of the event on a dispatcher’s monitor. This allows them to quickly identify if it’s an actual threat. Unique access privileges The team has also expedited investigations by sharing system access with other departments. This includes food service, loss prevention and ticket sales who can handle their own preliminary investigations, if needed. The team has set up different door schedules and rules and created over 200 cardholder groups “Using the Security Center platform, all door events are linked to video which means our team can quickly gather the information needed and solve cases faster,” said Graham. With Security Center, operators get an instant view of an event as it’s unfolding. So before sending an officer to check on the area, they can quickly identify if it’s a threat or a false alarm. Using the Synergis system, the team has set up different door schedules and rules and created over 200 cardholder groups with unique access privileges for various roles and responsibilities. Managed software maintenance For added peace-of-mind, the Santa Cruz Boardwalk team receives fully managed software maintenance and monitoring via the Genetec Advantage maintenance package to help ensure their systems always available and up to date. “Using Security Center has definitely heightened our response efficiency at Santa Cruz Beach Boardwalk. Everything from video surveillance and access control to alarm management has been consolidated into one solution—it’s just a better, more effective way to work. And we’re confident that with this unified platform, we’ll be keeping our guests happy and safe well into the future,” concluded Graham.
A national center of excellence for children and young people with mental health needs has been secured by a comprehensive security system from IDIS, the largest in country video surveillance manufacturer in South Korea. The £7 million refurbishment of Austen House, a 14-bed forensic hospital in Hampshire run by Southern Health NHS Foundation Trust, prioritized keeping both staff and patients safe from harm, given their specialized needs. Security systems integrator As the sole specialist National Health Service (NHS) unit of its kind in southern England, its refurbishment means vulnerable young people and their families no longer have to travel hundreds of miles to receive vital support. Video surveillance was key to allow incidents to be investigated and care practices to be monitored and improved. The solution had to cover all social and communal areas with no blind spots, be easy for non-specialist staff to use, and would have to comply with NHS cybersecurity requirements. Specialist security systems integrator ISD Tech selected IDIS technology as the best value and most robust solution, and one that would be the quickest and least disruptive to install. Outdated security setup The enhanced video coverage improves both standards of care and accountability Working with main contractor Kier Construction, ISD Tech and IDIS replaced an outdated security setup with an affordable cybersecure system which is easy to operate and maintain. It allows caregivers a complete overview of all internal and external communal areas at Austen House, including education facilities, music and sensory spaces, a gym and an art studio, as well as higher-risk isolation rooms. The enhanced video coverage improves both standards of care and accountability. It provides a complete record of events at the facility, making it easy for incidents to be investigated and video evidence to be provided, should it be required. Active tampering alarms Almost 100 IDIS 12MP Super Fisheye cameras, plus a mix of 5MP bullet and PTZ cameras, connected to 32-channel NVRs guarantee evidential-standard video coverage with a 360º view of all communal areas, a choice of 6 view modes and the ability to dewarp footage after the event. The 5MP bullet and PTZ cameras provide 24-hour coverage of the multi-use games area, gardens, car parks and perimeter. Built-in IR enables night-time image capture at distances of up to 30m, and the cameras enable intelligent functions such as active tampering alarms, motion detection, auto-tracking, and trip zones. All the IDIS cameras benefit from true DirectIP® plug-and-play set-up, which allowed the ISD Tech engineers to complete their work ahead of schedule. The ‘one-click’ set-up is faster and eliminates the cybersecurity risks associated with manual password entry. Local area networks IDIS Smart Failover protection ensures 24/7 continued recording, even during network instability or drop-out IDIS Smart Failover protection ensures 24/7 continued recording, even during network instability or drop-out. And, crucially, the Trust can link the new system to its local area networks without increasing the risk of hacking, thanks to IDIS’s use of proprietary software, which is inherently cybersecure. “Our upgraded IDIS video solution makes it easy for our clinical teams to review incidents quickly and work with external investigators whenever required,” said Tracey Edwards, Head of Security at Southern Health NHS Foundation Trust. “It’s not just an important tool for improving patient care, it allows us to maintain full public confidence and accountability.” Supporting clinical care Nicky Stokes, Managing Director of ISD Tech, commented: “We were impressed by the consultative approach of IDIS right from the initial design and planning, through installation to commissioning, and the ongoing support that they provide both to ISD Tech and the Trust. IDIS technology even helped speed up the installation so that we could deliver the project ahead of time.” IDIS Europe Sales Director Jamie Barnfield added: “This is the 4th major project that IDIS has completed for Southern Health NHS Foundation Trust, and it is part of one of the biggest refurbishments of its kind ever undertaken in the NHS. Not only is our video tech enhancing safety and security for patients and staff, it also supports clinical care and rehabilitation, which benefits the most vulnerable members of our community.”
Dahua Technology – one of the pioneer video technology companies – has entered into a six-figure sponsorship deal with Celtic FC, supplying the club with state of the art video-based technology and equipment. Under the sponsorship deal, Dahua is supplying video walls for locations such as the Celtic Store and Media Center at Celtic Park, high-tech quad-rotor drones to help with player training and development, and electronic whiteboards to be used for staff training, as well as meetings and presentations for staff and visitors. Highly visible aspects As part of the new partnership, Dahua will be appearing across a range of Club assets, on LED pitch-side banners, and on the club’s website and match programs. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland “We are thrilled about our sponsorship of Celtic FC,” said Michael Lawrence, Marketing Director at Dahua Technology UK & Ireland. “As well as the highly visible aspects of the sponsorship, this deal represents a real partnership between Celtic FC and Dahua, and is an example of our engagement with communities across the UK and Ireland.” High quality technology Commenting on the deal, Cheng Zeng, Business Development Manager for China and Asia at Celtic FC said: “We are delighted to launch this partnership today with Dahua Technology. Their expertise and high quality technology will enhance both fan experience in our stores and business operations as a whole. We hope to work with Dahua long into the future.” As well as the equipment supplied to Celtic FC, Dahua Technology manufactures a range of innovative and technically advanced video equipment. These include TiOC, a three-in-one camera that integrates 24/7 full-color monitoring, active deterrence and Artificial Intelligence into one smart unit; WizSense, a series of products and solutions that utilize Artificial Intelligence and deep learning algorithms; and its Starlight range of low-light video technology.
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security devices: Manufacturers & Suppliers
- Dahua Technology Security devices
- Vicon Security devices
- Bolide Security devices
- Vanderbilt Security devices
- Seagate Security devices
- Bosch Security devices
- Aritech Security devices
- Hanwha Techwin Security devices
- Parabit Security devices
- VIVOTEK Security devices
- LILIN Security devices
- BCDVideo Security devices
- Hikvision Security devices
- Sony Security devices
- ComNet Security devices
- Videotec Security devices
- CEM Security devices
- Pelco Security devices
- Arecont Vision Security devices
- HID Security devices