Interphone, the security systems and building technology integrator, is embracing the latest iris and facial recognition technology to meet the growing demand for touchless door entry and access control. The company has launched a range of advanced and affordable solutions available for any new build or retrofit building requirement in the commercial residential marketplace. Significance of touchless technologies “The COVID pandemic has placed hygiene, infection control and risk mitigati...
Pyronix has released news of its new logo, as part of an ongoing program of activities, aligning the brand with their long heritage and status as a renowned player in the United Kingdom and Ireland (UK&I) security markets. Pyronix brand refresh Commenting on the brand refresh, Pyronix Marketing Director, Laurence Kenny, said “Our new logo is reflective of our position in the UK&I markets as a technology based, forward-looking, fresh and dynamic organization. We pride ourselves on...
Auth0, the modern identity platform solutions provider, has announced the Auth0 identity operating system (identity OS), a cloud-native and adaptable platform for development teams. Auth0 identity OS Built with extensible building blocks, the Auth0 identity OS enables organizations to manage the complexities of modern identity management, while also prioritizing the security, privacy and convenience of their end users. Striking the perfect balance among these priorities requires identity to i...
Alcatraz AI and Netronix Integration have announced a strategic partnership to expand their access control solutions to security business users. The two companies are partnering to deliver Alcatraz’s industry-renowned facial authentication solutions, through Netronix Integration’s global network and customer base. Alcatraz AI and Netronix partnership The new, innovative partnership leverages the respective technology and leadership strengths of Alcatraz AI and Netronix Integration...
Gozio Health, an industry-renowned, customizable end-to-end mobile platform, and CriticalArc, creators of SafeZone, the unified safety, security and emergency management solution, have announced a partnership that enables hospitals and health systems to enhance security and safety, by adding CriticalArc’s SafeZone to Gozio’s location-based services platform. SafeZone - Gozio integration Nearly 75% of workplace assaults occur in a healthcare setting, according to the Bureau of Labor...
The Open Security & Safety Alliance (OSSA), an industry body comprised of stakeholders from all facets within the security, safety and building automation space, is proud to point the industry to its newly established ‘Driven by OSSA’ camera portfolio page. ‘Driven by OSSA’ camera products This central repository provides a convenient online location to feature OSSA members’ growing line-up of progressive video security cameras and edge devices that are part o...
No matter if the speaker is 8 Ohm, 25 Volt, or 70 Volt – any option works with the new PSA-IP analog to IP speaker adapter. “The PSA-IP adapter will be the go-to for customers looking for a cost-effective way to convert their existing analog paging speakers to SIP/multicast speakers,” said Greg Yocom, Engineering Manager, Viking Electronics. Key features The PSA-IP features a high-efficiency 6 Watt class D amplifier. This allows a single PSA-IP to power up to six paging speakers in a single paging zone providing approximately 1 Watt of paging power to each speaker. Installation is easy; simply mount the PSA-IP magnetically to the back of an analog speaker magnet or to the 25/70V transformer mounting holes on the speaker frame using the included mounting screws. The PSA-IP’s speaker output connects to the input of the speaker. Connect the PSA-IP to an open port on a PoE switch and use Viking’s IP Programming software to enter SIP and network credentials. After the quick conversion, the speaker can then be used for standard one-way SIP endpoint paging or multicast paging.
Boon Edam Inc., a global pioneer in security entrances and architectural revolving doors announced the resumption of on-site entry evaluations, a building or campus analysis that aids security managers in creating a defensible physical security entrance strategy against the costly liabilities associated with tailgating and piggybacking. These evaluations have proven to be critical to the success of entrance projects. During the COVID pandemic, to support community health and safety, Boon Edam shifted from conducting on-site evaluations to virtual ones. With the loosening of COVID restrictions in the United States, Boon Edam is resuming on-site, in-person entry evaluations. Uncover vulnerable entry points Boon Edam initially began offering consultative entry evaluations with the recognition that every facility has a unique set of risks, resources, and capital. In addition to this, security entrances offer a wide range of intrusion mitigation capabilities – they are not a “one size fits all” solution. Turnstiles, security revolving doors, and mantrap portals differ in several categories, ranging from security level and a guard needs to capital and operating expenditures. Because security entrances are a significant investment, it is critical that security professionals understand the differences between entrance types to best align with their physical security strategy. Assess entrance solutions The goal is to define vulnerable entry points and discuss other unique but critical concerns Entry evaluations are “walk-throughs” conducted by experienced entry experts who traverse a building or campus with the client’s security team and other stakeholders. The goal is to define vulnerable entry points and discuss other unique but critical concerns. These may include throughput, supervision available, and industry compliance requirements; today’s need for “touchless” entry to minimize germs and promote social distancing; local safety codes for emergency egress and ADA compliance; and how existing security technologies such as access control systems, cameras, etc. will integrate with the entrance solutions. Actionable entry evaluation report At the conclusion of the evaluation, Boon Edam’s entry experts develop a comprehensive summary with recommendations for improvement, including: The client’s current state of security as it relates to the entry, as well as any regulatory needs specific to their industry or organization. A review of each entry location requiring a physical barrier and the recommended solution based on the security goals discussed. Custom photo renderings of each entry location to help the client visualize what the discussed entrance solutions will look like at their site. Ensuring best practices “It’s always amazing to see what gets uncovered during an evaluation and how often a decision or assumption can change after a great discussion. We’ve always put considerable emphasis on security entrance education and consultation, and as COVID-19 threatened to reduce our ability to perform these invaluable evaluations, we were able to pivot and offer virtual evaluations,” says Greg Schreiber, Senior Vice President of Sales at Boon Edam Inc. “Now, with COVID restrictions lessening, we continue to offer virtual evaluations but are very excited to resume in-person entry evaluations as organizations begin to accept outside vendor visits.” Schreiber further notes that all entry evaluations are solely for the determination of best practices around the entrances at the facility being assessed. The evaluation does not encompass a full vulnerability and threat evaluation usually conducted by a security consultant firm.
PSA, one of the largest systems integrator consortium announced that it will expand its LenelS2 product offerings. In addition to the feature-rich OnGuard® access control system, PSA will also carry the NetBox™ browser-based, appliance-oriented access control system and the Elements™ cloud-based access control and video management system for purchase by authorized and approved PSA value-added resellers. Advanced physical security solutions LenelS2 is a global pioneer in advanced physical security solutions, including access control, video surveillance, and cellphone credentialing, and is a part of Carrier Global Corporation, the global provider of healthy, safe, and sustainable building, and cold chain solutions. “LenelS2 has been a valued PSA vendor for many years and has had tremendous success in the PSA network so far,” said Tim Brooks, Vice President of sales and vendor management for PSA. “We are thrilled to expand LenelS2 offerings to our integrators and know how valuable it is for us to provide more best-in-class solutions.” Cellphone-first, intuitive UI Elements system includes video management functionality to view live or recorded video The recently launched Elements system is designed to be easily installed and simple to use with a cellphone-first, intuitive user interface. Information is available at any time and accessible from anywhere on any device. By leveraging the power of the cloud, businesses benefit from automated updates, reduced on-site maintenance, predictable monthly billing, and minimized training requirements. As a unified solution, the Elements system includes video management functionality, providing system configuration, real-time video verification of alarms and events as well as the ability to view live or recorded video through a single user interface. SaaS solution “Bringing the NetBox and Elements systems into the PSA portfolio reiterates our commitment to their channel,” said Speros Venios, vice president of strategic sales for LenelS2. “The addition of Elements will also provide a new software-as-a-service solution for PSA members.”
Aqua Security, the pure-play cloud native security solutions company, has published new research from Team Nautilus revealing that a significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services. According to the new findings from Aqua Security’s ‘2021 Cloud Security Report: Cloud Configuration Risks Exposed’, these misconfigurations, for example leaving bucket or blog storage open, can open companies up to critical security breaches. 2021 Cloud Security Report When you consider that a single cloud misconfiguration can expose organizations to severe cyber risk" Reflecting the overwhelming amount of configurations that practitioners must address, even when companies are aware of errors, most have not addressed the bulk of these issues in a timely manner. Especially larger enterprises, as they take an average of 88 days to address issues after discovery. “When you consider that a single cloud misconfiguration can expose organizations to severe cyber risk, such as data breaches, resource hijacking and denial of service (DoS) attacks, the consequences of failing to address misconfiguration issues are all too real to ignore,” said Assaf Morag, Lead Data Analyst with Aqua Security’s Team Nautilus. Aqua Security’s research methodology & findings Over a period of 12 months, Aqua Security’s research team analyzed anonymized cloud infrastructure data from hundreds of organizations. Users were divided into two groups, based on the volume of cloud resources that they scanned - SMB (small and midsize business), who scanned between one and several hundred resources, and enterprise users, who scanned from several hundred up to a few hundred thousand distinct resources. The research findings point to important security gaps including: Less than 1% of enterprise organizations fixed all detected issues, while less than 8% of SMBs fixed all detected issues. More than 50% of all organizations receive alerts about misconfigured services, with all ports open to the world, but only 68% of these issues were fixed, taking 24 days on average. Over 40% of users had at least one misconfigured Docker API, taking an average of 60 days to remediate. Security posture issues across IaaS and PaaS accounts These findings point to numerous security posture issues across Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) accounts, which suggest both a lack of understanding, as well as an overwhelming number of issues requiring attention. Cloud-native applications improve agility by giving more people access to define the environment" “Cloud-native applications improve agility by giving more people access to define the environment, but we see many organizations move away from a centralized approach to security,” said Morag, adding “The traditional model of permitting only a small, highly skilled team of security practitioners to make all configuration changes has given way to a modern, decentralized approach. Development teams are making configuration decisions or applying services, and that can have dramatic implications for the security posture of an organization’s production environment.” Causes of cloud-setting misconfigurations The Aqua report examines the mistakes that lead to five common types of cloud-setting misconfigurations - storage (bucket/blob) misconfigurations, identity and access management (IAM) misconfigurations, data encryption issues, exploitable services behind open ports, and container technology exploitation. The Aqua 2021 Security Report also provides recommendations on the best practices and policies that organizations can implement immediately, in order to mitigate the risk of cloud misconfigurations, including: Instituting a formal remediation process to prioritize issues. Treating all API issues as critical, as adversaries actively scanning for exposed API ports. Applying various IAM controls to establish layers of access control, such as multi-factor authentication (MFA) and identity federation. Proactively fixing cloud misconfiguration issues “Whether an organization adopts a single or multi-cloud environment, it must be proactive in monitoring for and fixing service configuration issues that can unnecessarily expose it to threats,” said Ehud Amiri, Senior Director of Product Management at Aqua Security. Ehud Amiri adds, “Failure to do so will inevitably result in damage that can be much greater than the traditional OS or on-premises workloads.” Aqua Security’s '2021 Security Report: Assessing Cloud Infrastructure Risks' is available now.
Achilles Information, a global pioneer and partner of choice for supply chain risk and performance management, is to partner with Orpheus, UK Government accredited cyber threat intelligence company. Highlights of the pilot scheme They include: In partnership with Orpheus, Achilles will provide cyber risk ratings on suppliers and share these ratings with buyer and supplier members of Achilles networks Suppliers can reduce their cyber risk by subscribing to Orpheus’ monthly cyber risk rating reports and actioning the highlighted attack surface issues on their network, and Achilles customers will receive preferential rates on subscriptions. Buyers will also have the option to get a tailored supply chain cyber risk assessment report on their chosen supply chain, giving them deep insights into the specific threats and risks they could be exposed to. Third-party cybersecurity Cyber risk is increasing significantly, with adversaries looking to exploit poor third-party cybersecurity as a means of attacking more protected targets. In addition, as organizations continue to have employees working remotely, the number of points of weakness through which a cyber-attack could be launched, increases. Accurate and robust advice The cybersecurity of even the biggest buyer is only as strong as the weakest supplier" Katie Tamblin, Chief Product Officer at Achilles, commented, “Recent examples of sophisticated cyber-attacks demonstrate that the cybersecurity of even the biggest buyer is only as strong as the weakest supplier in their supply chain.” “We know that this is a complex, constantly changing landscape that our customers need real-time, accurate, and robust advice on, and so we’ve partnered with Orpheus, the only provider of cyber risk ratings with UK Government accreditation.” “We know that ongoing monitoring is critical to effective cybersecurity. These cyber risk ratings provided on the Achilles’ platform will enable our customers to be confident they are making decisions based on the best, market-leading intelligence. I’m looking forward to working with the team at Orpheus and seeing the considerable value they can bring to customers.” Cyber risk ratings Oliver Church, CEO Orpheus, commented, “Cyber risk ratings are becoming an integral way for companies to manage the risk associated with third parties. Our partnership with Achilles provides their customers with increased oversight of the cyber risk they face from their supply chain.” “Our cyber risk ratings focus on the vulnerability and the threat level companies face, backed up with award-winning machine learning. We are excited to partner with Achilles and their customers, to help make them more secure.”
Traffic management takes many forms. Traffic management can involve closing a roadway during a major city event such as a motion picture awards show or traffic management can simply entail a traffic arm that raises and lowers after a fee has been paid in a parking garage. Traffic management can include directing traffic in one direction during peak hours or closing a facility to vehicle traffic after hours. It can also prevent wrong-way entry or ensuring vehicles cannot encroach on pedestrian areas. Barriers for security In most cases, it is quite easy to breach the entrance to the parking lot. Once entered, the vehicle can pick up speed to crash through one of the gates or entrances to get within the stadium itself. To provide increased security, Delta Scientific DSC501 barriers are used at the Mercedes Benz Stadium in Atlanta at main entrances where players and VIPs, among others, enter with their cars. K54 certification The DSC501 protects against a “second hit” risk from a second vehicle The DSC501 is the only K54-certified retractable vehicle barricade in the world. Set in a foundation only 18 inches deep, it will survive and operate after a 5.4-million foot-pound impact. That’s equivalent to a 65,000-pound truck hitting it at 50 mph. Stopping the truck or car dead in its tracks, the DSC501 protects against a “second hit” risk from a second vehicle. Deployable vehicle crash barriers In another example, on May 22, 2020, an armed assailant attempted to drive through entryway gates at the Naval Air Station-Corpus Christi. The suspect was stopped almost instantaneously. A wounded sailor, a security team member, managed to raise a barricade despite her injuries. The shooter, the would-be trespasser, died in the incident, which could have been made much worse had the station not taken appropriate measures to keep intruders at bay. At this location, the totally self-contained Delta Scientific MP5000 mobile deployable vehicle crash barriers guarding that base carries an ASTM rating as high as M50, able to stop and disable a 15,000 lb (66.7 kN) G.V.W. vehicle moving at 50 mph (80.4 kph). The barricade tows into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. To remove, procedures are reversed and the barriers are towed away. Traffic control devices With so many traffic management scenarios, it is no wonder that Delta Scientific manufacturer’s more than fifty types of barriers and traffic control devices. Delta can assist any facility in controlling the flow of traffic through devices such as traffic arms, lights, spike teeth or even crash tested vehicle barricades.
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.
The Annual Fraud Indicator estimates that fraud costs the United Kingdom approximately £190 billion every year. The private sector is hit the hardest and loses around £140 billion a year, while the public sector loses more than £40 billion, and individuals lose roughly £7 billion. The effects of fraud can be devastating on both individuals and organizations. Companies can suffer irreversible damage to reputation and be forced to close, and individuals can experience significant personal losses. Everyone should be aware of the risks and take steps to protect themselves against fraudulent activity. Fraud detection technology Fraud detection technology has advanced rapidly, over the years and made it easier for security professionals to detect and prevent fraud. Here are some of the key ways that Artificial Intelligence (AI) is revolutionising fraud detection - with insight from Tessema Tesfachew, the Head of Product at Avora. An anomaly can be described as a behavior that deviates from the expected An anomaly can be described as a behavior that deviates from the expected. According to Tessema Tesfachew, “Autonomous monitoring and anomaly detection specifically, have made detecting fraudulent activity faster and more accurate. Machines can monitor data 24/7 as it comes in, build patterns of behavior that take into account seasonality and shifting trends, and identify events that don’t fit the norm.” For example, banks can use AI software to gain an overview of a customer’s spending habits online. Having this level of insight allows an anomaly detection system to determine whether a transaction is normal or not. Suspicious transactions can be flagged for further investigation and verified by the customer. If the transaction is not fraudulent, then the information can be put into the anomaly detection system to learn more about the customer’s spending behavior online. Accurate root cause analysis Root cause analysis goes one step further than anomaly detection, by allowing security professionals to pinpoint what caused the anomaly. Tessema explains how an example of this would be if a system detects that the rate of fraudulent transactions has increased. Root cause analysis would pinpoint the specific ATM or point of sale, where this increase is occurring. Swift action can then be taken to prevent fraudulent activity at that location in the future. Fewer false positives As mentioned, false positives can occur if a fraud detection system identifies behavior that goes against the norm, for instance, if a customer makes a transaction in a new location. In many cases, customers are required to complete identity verification to prove that a transaction is not fraudulent. Digital customer identity verification can help brands build a strong and reputable image. That said, forcing users to complete identify certifications regularly can cause frustration and harm the customer experience. AI anomaly detection AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data AI anomaly detection is far more accurate and results in fewer false positives. Increasing the accuracy of anomaly detection helps companies improve customer relationships and build a strong reputation. This will have a positive impact on brand image and sales revenue. AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data. Machines are more efficient than even the most skilled fraud analysts and make fewer errors. This is why AI fraud detection software is the preferred option in larger organizations. Importance of fraud analysts However, fraud analysts still play an important role in fraud prevention. Using a combination of human intervention and AI is usually the most effective approach when it comes to fraud detection. According to pymnts.com, innovative organizations now use a variety of AI and supervised and unsupervised machine learning to identify and protect against fraud. AI systems can complete time-consuming and repetitive tasks, such as data collection and analysis. This means that fraud analysts can focus their time and attention on critical tasks that require human intervention, e.g. monitoring risk scores. AI can automate processes and enhance the quality of the fraud analysts’ work. Conclusion In to Tessema Tesfachew’s opinion, “Fraud detection has become vastly more efficient and effective with the introduction of Artificial Intelligence (AI). Previously, methods for detecting fraudulent activities were still data-rich, but relied more on human intervention and expert bias, and were thus, more time consuming and prone to error.” AI technology, particular anomaly detection, has streamlined fraud detection and created a more efficient, and accurate system for detecting and preventing fraud. Covid-19 has increased the number of online transactions, which creates more opportunities for fraudulent activity. However, it also allows businesses to gain more information on their customers and enhance the capabilities of AI security software. It is more important than ever for organizations to utilize AI technology in fraud detection strategies.
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data center world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
Imagine a world where video cameras are not just watching and reporting for security, but have an even wider positive impact on our lives. Imagine that cameras control street and building lights, as people come and go, that traffic jams are predicted and vehicles are automatically rerouted, and more tills are opened, just before a queue starts to form. Cameras with AI capabilities Cameras in stores can show us how we might look in the latest outfit as we browse. That’s the vision from Panasonic about current and future uses for their cameras that provide artificial intelligence (AI) capabilities at the edge. Panasonic feels that these types of intelligent camera applications are also the basis for automation and introduction of Industry 4.0, in which processes are automated, monitored and controlled by AI-driven systems. 4K network security cameras The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications Panasonic’s 4K network security cameras have built-in AI capabilities suitable for this next generation of intelligent applications in business and society. The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications. The AI engine is directly embedded into the camera, thus reducing costs and Panasonic’s image quality ensures the accuracy of the analytics outcome. FacePRO facial recognition technology Panasonic began advancing AI technology on the server side with FacePRO, the in-house facial recognition application, which uses AI deep learning capabilities. Moving ahead, they transitioned their knowledge of AI from the server side to the edge, introducing i-PRO security cameras with built-in AI capabilities last summer, alongside their own in-house analytics. Moreover, in line with the Panasonic approach to focus more on collaboration with specialist AI software developers, a partnership with Italian software company, A.I. Tech followed in September, with a range of intelligent applications, partially based on deep learning. Additional collaborations are already in place with more than 10 other developers, across the European Union, working on more future applications. i-PRO AI-capable security cameras Open systems are an important part of Panasonic’s current approach. The company’s i-PRO AI-capable cameras are an open platform and designed for third-party application development, therefore, applications can be built or tailored to the needs of an individual customer. Panasonic use to be a company that developed everything in-house, including all the analytics and applications. “However, now we have turned around our strategy by making our i-PRO security cameras open to integrate applications and analytics from third-party companies,” says Gerard Figols, Head of Security Solutions at Panasonic Business Europe. Flexible and adapting to specific customer needs This new approach allows the company to be more flexible and adaptable to customers’ needs. “At the same time, we can be quicker and much more tailored to the market trend,” said Gerard Figols. He adds, “For example, in the retail space, enabling retailers to enhance the customer experience, in smart cities for traffic monitoring and smart parking, and by event organizers and transport hubs to monitor and ensure safety.” Edge-based analytics offer multiple benefits over server-based systems Edge-based analytics Edge-based analytics offer multiple benefits over server-based systems. On one hand, there are monetary benefits - a cost reduction results from the decreased amount of more powerful hardware required on the server side to process the data, on top of reduction in the infrastructure costs, as not all the full video stream needs to be sent for analysis, we can work solely with the metadata. On the other hand, there are also advantages of flexibility, as well as reliability. Each camera can have its own individual analytic setup and in case of any issue on the communication or server side, the camera can keep running the analysis at the edge, thereby making sure the CCTV system is still fully operational. Most importantly, systems can keep the same high level of accuracy. Explosion of AI camera applications We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications" “We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications,” said Gerard Figols, adding “However, it doesn’t mean the hardware is not important anymore, as I believe it’s more important than ever. Working with poor picture quality or if the hardware is not reliable, and works 24/7, software cannot run or deliver the outcome it has been designed for.” As hardware specialists, Figols believes that Panasonic seeks to focus on what they do best - Building long-lasting, open network cameras, which are capable of capturing the highest quality images that are required for the latest AI applications, while software developers can concentrate on bringing specialist applications to the market. Same as for smartphones, AI applications will proliferate based on market demand and succeed or fail, based on the value that they deliver. Facial recognition, privacy protection and cross line technologies Panasonic has been in the forefront in developing essential AI applications for CCTV, such as facial recognition, privacy protection and cross line. However, with the market developing so rapidly and the potential applications of AI-driven camera systems being so varied and widespread, Panasonic quickly realized that the future of their network cameras was going to be in open systems, which allow specialist developers and their customers to use their sector expertise to develop their own applications for specific vertical market applications, while using i-PRO hardware. Metadata for detection and recognition Regarding privacy, consider that the use of AI in cameras is about generating metadata for the detection and recognition of patterns, rather than identifying individual identities. “However, there are legitimate privacy concerns, but I firmly believe that attitudes will change quickly when people see the incredible benefits that this technology can deliver,” said Gerard Figols, adding “I hope that we will be able to redefine our view of cameras and AI, not just as insurance, but as life advancing and enhancing.” i-PRO AI Privacy Guard One of the AI applications that Panasonic developed was i-PRO AI Privacy Guard Seeking to understand and appreciate privacy concerns, one of the AI applications that Panasonic developed was i-PRO AI Privacy Guard that generates data without capturing individual identities, following European privacy regulations that are among the strictest in the world. Gerard Fogils said, “The combination of artificial intelligence and the latest generation open camera technology will change the world’s perceptions from Big Brother to Big Benefits. New applications will emerge as the existing generation of cameras is updated to the new open and intelligent next generation devices, and the existing role of the security camera will also continue.” Future scope of AI and cameras He adds, “Not just relying on the security cameras for evidence when things have gone wrong, end users will increasingly be able to use AI and the cameras with much higher accuracy to prevent false alarms and in a proactive way to prevent incidents." Gerard Fogils concludes, “That could be monitoring and alerting when health and safety guidelines are being breached or spotting and flagging patterns of suspicious behavior before incidents occur.”
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
Thermal cameras can be used for rapid and safe initial temperature screening of staff, visitors and customers. Used the right way, the cameras can help prevent unnecessary spread of viruses like the novel coronavirus. During the global pandemic, use of thermal cameras has increased, but they have not always been used correctly, and therefore, not effectively. Hikvision’s temperature screening thermal products are currently assisting users in initial temperature screening across the global market. During 2020, demand increased in most markets, and the company highly recommends that Hikvision’s thermographic cameras be used in accordance with local laws and regulations. Limitations of the technology include throughput and the impact of ambient conditions. Detect viruses and fever Hikvision releases a video that illustrates how skin temperature measurements are normalized within minutes Thermal cameras cannot detect viruses and fever and should only be used as a first line of screening before using secondary measures to confirm, says Stefan Li, Thermal Product Director at Hikvision. “We also believe it is important for businesses and authorities to use [thermal cameras] alongside a full program of additional health and safety procedures, which includes handwashing, regular disinfection of surfaces, wearing protective clothing such as masks, and social distancing.” Hikvision has released a video that illustrates how skin temperature measurements are normalized within minutes after someone emerges from the cold. Mr. Li says the video demonstrates the accuracy of forehead measurement under difficult circumstances when people come inside from a cold outdoor environment. Temperature screening facilities “There have been some claims that measuring the forehead temperature is not as accurate as measuring the inner canthus, and we believe this video demonstrates the accuracy of forehead measurement very well,” he says. “We also illustrate how the skin temperature will experience a process of recovery (warming up), no matter if it is measured by a thermal camera or a thermometer.” Mr. Li adds that people should wait five minutes in such circumstances before starting a temperature measurement. “We hope that stakeholders who are involved in the design of temperature screening facilities and associated health and safety procedures will recognize how important it is to consider the skin temperature recovery time, and that forehead measurement can provide accurate test results,” says Mr. Li. Thermal imaging manufacturers The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced The temperature measurement principle of thermal imaging is to detect the heat radiation emitted by the human body. The detected heat value often does not reflect the true internal body temperature of an individual. Furthermore, the temperature varies among different parts of the human, such as the forehead, ears, underarms, etc. A temperature compensation algorithm can be used to adjust the measured skin temperature to align with the internal body temperature. The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced. At present, thermal imaging manufacturers in the market, and even forehead thermometer manufacturers, have developed their own algorithms to map the skin temperature measured by the camera to the internal body temperature, so as to compensate the skin temperature to the internal body temperature. Thermal cameras This is also why Hikvision recommends that the "actual body temperature" should be checked with a secondary device for confirmation. The calibration work for a thermal camera is completed in the production process at the factory, including calibration of reference values and detection point and so on. At the same time, the equipment parameters should be adjusted before on-site use to ensure accurate temperature reads. Hikvision does not deny the accuracy of temperature measurement at the inner canthus but prefers forehead temperature measurement and algorithms based on actual use scenarios, says Mr. Li. A large amount of test data and practical results indicates that the forehead is a correct and easy-to-use temperature measurement area, says the company. There are advantages and disadvantages of choosing different facial areas for temperature measurement. Default compensation temperature Two main approaches direct the measurement area and how compensation algorithms are applied: Forehead area + default forehead compensation algorithm value Upper half face (forehead + canthus) + default inner canthus compensation algorithm value. Both methods deploy compensation algorithms, but the default compensation temperature of the inner canthus will be less than the default compensation temperature of the forehead, generally speaking. The reason is that the temperature of the inner canthus of most people is higher than their forehead, so the temperature compensation is relatively low (i.e., closer to the actual temperature inside the body.) Upper face area Hikvision found that selecting the upper face area plus the default compensation value for the inner canthus resulted in situations when the calculated temperature is lower than the actual temperature. For the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face Mr. Li explains: “The reason is that when the camera cannot capture the position of the inner canthus (for example, when a person is walking, or the face is not facing the camera), the camera will automatically capture the temperature of the forehead. Then the result that appears is the sum of the forehead temperature plus the default compensation temperature of the inner canthus, which is lower than the actual temperature of the person being measured. Therefore, errors are prone to occur.” Thermal imaging products But for the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face. Also, the default forehead compensation temperature is based on rigorous testing and can also correctly mimic the actual temperature of the person being measured, says Mr. Li. After many test comparisons, considering that the results of forehead temperature measurement are relatively more stable, and in order to avoid the false results from inner canthus temperature measurement, Hikvision chose the forehead temperature measurement approach. “We look forward to bringing thermal imaging products from a niche market where there is a relatively high-end industry application to a mass market and serving more users,” says Mr. Li. Facial recognition terminals Additional application parameters can maximize effectiveness of thermal cameras for measuring body temperature: Positioning and height - All cameras must be mounted appropriately to avoid loss of accuracy and performance. The installation height of each camera must be adjusted according to camera resolution and focal length, and stable installation is needed to avoid errors caused by shaking. Ensuring a ‘one-direction path’ - The detection area must ensure that cameras capture the full faces of all those passing by or stopping, and obstacles should be avoided in the field of view, such as glass doors that block the camera. Adequate start-up and usage - A waiting time of more than 90 minutes is required for preheating, after the initial start-up. Before conducting a thermal scan, people should be given three to five minutes to allow their body temperature to stabilize. When Hikvision MinMoe facial recognition terminals are used, people must stand at a fixed distance, pass one by one, make a short stop, and face the camera directly. Hikvision cameras support efficient group screening, but one-by-one screening is suggested for more accurate results, says Mr. Li. Unstable environmental condition An unstable environmental condition may affect the accuracy of thermal camera systems Environmental factors can impact the accuracy of thermal cameras, and the idea of using a black body is to provide the camera with a reference point that has a stable temperature. The black body is heated to a specific temperature and helps the thermal camera to know how much error is caused by environmental factors in the room, and how the camera should calibrate itself in real time to improve its accuracy. A black body can help increase the temperature measurement accuracy, and the most common improvement is from ±0.5 degrees to ±0.3 degrees. However, it also increases the cost of the installation. In some markets, customers may require black bodies in order to comply with regulatory accuracy requirements. An unstable environmental condition may affect the accuracy of thermal camera systems for measuring temperature. Medical temperature measurement Therefore, Hikvision suggests that the ambient conditions should be met for installation and use. First of all, users should avoid installing devices in hot or changeable environments. All cameras require indoor environments with calm air, consistent temperature and no direct sunlight. Installation should also be avoided in semi-open locations that may be prone to changes in ambient conditions, such as doorways, and there should be enough stable, visible light. All devices should be installed to avoid backlighting, high temperature targets, and reflections in the field of view as far as possible. “We often see the misconception that thermal cameras can replace medical temperature measurement equipment, which is not the case,” says Mr. Li. Rapid preliminary screening “Temperature screening thermographic cameras are designed for the detection of skin-surface temperatures, and the measurement should be conducted to achieve rapid preliminary screening in public areas. It is really important that actual core body temperatures are measured subsequently with clinical measurement devices.”
An intelligent network of 20 Axis EN fire panels from fire and life safety systems manufacturer, Advanced, have been installed at HaDo Centrosa Garden in the heart of Ho Chi Minh City, Vietnam. HaDo Centrosa Garden is a 70,000 sq. m development of eight 30-story luxury residential towers and 115 townhouses, located in the heart of Vietnam’s Ho Chi Minh City. The upscale condominium complex’s facilities will include a swimming pool, tennis and basketball courts, fitness center, rooftop gardens, a park, school, library and commercial center. System with high-speed networking capabilities Vietsafe and KP Technology were confident in Axis EN’s ability to deliver the seamless networking needed A key requirement for this large-scale complex was a system with high-speed networking capabilities, to enable instantaneous sharing of communications between panels. To meet this need, fire protection companies Vietsafe and KP Technology chose 20 Advanced Axis EN fire alarm control panels, alongside 3,000 addressable devices, for installation in the eight residential towers. With many successful installations of Advanced products undertaken by both companies, Vietsafe and KP Technology were confident in Axis EN’s ability to deliver the seamless networking needed, while its ease of installation, testing, commissioning and operation would ensure minimal issues once the panels were on site. Axis EN fire alarm control panels installed Le Manh Dung, Director of Vietsafe, said “An Axis EN fire system was the clear choice for a project of this nature. Advanced is well respected in the fire industry, and its solutions are straightforward in terms of installation and operation, thanks to features such as built-in isolators for sequence addressing, which considerably reduces installation time.” Axis EN is EN54 parts 2, 4 and 13 approved and its panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop networks of up to 200 nodes covering huge areas. Advanced’s reputation for ease of installation and configuration, as well as its wide peripheral range make its products customizable to almost any application. False alarm management and reduction Pham Thanh Phong, Director of KP Technology, said “As a key partner to KP Technology, Advanced is a fire system supplier we can trust, to deliver high-performing, high-quality solutions that are easy to install and to use. Features such as Axis EN’s false alarm management and reduction capabilities are extremely useful in high-rise residential sites, such as HaDo Centrosa Garden.” Pham Thanh Phong adds, “Repeated false alarms are not only intrusive, they can also lead to complacency and delayed reactions to real fire alarms. Having the ability to refine and configure protection so specifically, and according to the requirements of specific areas within a building, helps to keep unwanted alarms to a minimum and reduces disruption and risk for residents.” AlarmCalm software and MxPro 5 fire system AlarmCalm software comes as standard with any Axis EN and MxPro 5 fire system AlarmCalm software comes as standard with any Axis EN and MxPro 5 fire system, taking advantage of Advanced’s high-speed robust panels and networks to offer a best-in-class solution for managing verification and investigation delays to outputs. It allows the false alarm management strategy for a site to be refined precisely and to take account of occupants’ needs and area usage. It also includes the optional AlarmCalm button, a loop device that allows residents or trained staff to indicate whether they believe a signal in their area is due to a false alarm. Axis EN fire system Tin Le Than, Advanced’s Sales and Business Development Manager for South East Asia, said “As a modern, vibrant complex for thousands of people living and working in the center of Ho Chi Minh, the fire protection for the HaDo Centrosa Garden development is a key priority.” Tin Le Than adds, “As an industry-renowned solution, the Axis EN fire system will deliver complete peace of mind to the building owners and residents of the complex. I am pleased to have been able to support our fantastic partners at Vietsafe and KP Technology with the equipment needed to fulfill their requirements.” Global projects Advanced, owned by FTSE 100 Company, Halma PLC, protects a wide range of sites across South East Asia including the Hong Kong-Zhuhai-Macau Bridge, University of Macau and Hong Kong Central Library. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.
Two renowned systems integrators have improved their ability to more effectively specify and design advanced physical security systems, using the dedicated tool, AXIS Site Designer. AXIS Site Designer AXIS Site Designer is a unique and free web application from Axis Communications, a market renowned company in network video solutions, which makes the specification and design of complex security systems quicker and easier. Having recently deployed the solution, two of Axis partners, Southern Fire & Security Ltd. and Acctive Systems, have been able to evidence a more sophisticated process and have won clients as a result. Security devices and sensors As physical security technology continues to advance, in order to keep up with the ever-evolving threat landscape, coupled with more security devices and sensors being added to IT networks, the task of specifying such systems has become more complex. The principal challenges for those working in the industry are to be able to properly illustrate to buyers the capabilities of such devices and also to demonstrate how they can work together to secure a site. This web application holds the solution. Powerful and versatile design tool AXIS Site Designer revolutionizes the specification and design process AXIS Site Designer revolutionizes the specification and design process, by allowing an entire solution to be mapped out to the finest detail. The powerful and highly versatile tool removes any guesswork or element of trial and error, making it easy to create the right system to fit the exact operational requirements and needs of a prospect or client. The application even allows floor plans of the target site to be added, and virtual placement of cameras and devices enables viewing of the coverage they will provide, once installed. Partner with Southern Fire & Security and Acctive Systems Sean Mcnaboe, Axis Communications’ Key Account Manager, explains “The benefits of AXIS Site Designer are numerous. It helps streamline design workflow, simplify demos of security products and accessories, and even generate quotations and change items in a bill of materials within minutes.” Sean Mcnaboe adds, “Axis has been working closely with two partners, Southern Fire & Security and Acctive Systems, to help them drive their businesses forward while meeting, and often exceeding, the evolving requirements of customers.” Security and surveillance systems specification Southern Fire & Security has recently taken on the specification of security and surveillance systems for several high value properties around the London area, so being able to accurately specify dedicated solutions is critical to secure ongoing business. Acctive Systems, a renowned integrator of electronic security systems, needed a method of specifying security systems that would allow it to demonstrate an entire setup and its component parts via digital means. Efficient designing of surveillance systems AXIS Site Designer is an empowering leap forward in the design of surveillance systems Steve Wilson, Director at Southern Fire & Security, explains “Being able to make only basic recommendations around the use of appropriate technologies has been a key challenge for us. It’s very difficult to plan some of the more involved projects in detail, so we desperately needed a way to be able to visualize an entire estate and how a solution would operate.” AXIS Site Designer is an empowering leap forward in the design of surveillance systems, allowing for greater speed and efficiency, and enabling more effective management of any project. Enhancing customer satisfaction High quality designs and other outputs create a level of professionalism that is a major plus point when vying for business, ultimately improving customer satisfaction and pointing towards greater revenue prospects. Gerry Numa, the Chief Technical Officer (CTO) of Acctive Systems, said “AXIS Site Designer delivers everything we anticipated, and more, setting us ahead of our competitors when it comes to slick, professional looking project design. I would encourage other businesses to reach out to Axis to find out how the application can benefit them too.”
Adani Group is a multi-national conglomerate headquartered in Ahmedabad, Gujarat, India and has a diversified portfolio of businesses, including resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with Mundra being the country's largest commercial port. With multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders across 25+ business units. Managing staff attendance and diverse shifts Adani Group is widely engaged in multiple business units and ports with 50,000+ workers under 900+ contractors, employed at various locations. Maintaining and managing entire attendance, diverse shifts and leave policies for the various locations, and numerous workers at a central place was critical for them. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management. To provide approved and appropriate induction of each worker at a defined level, monitor the progress status of each work order and its segregation based on reports were quite challenging. Report generation to eliminate the fraudulent and erroneous payment of wages at contractors' end had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. COSEC Contract Workers Management COSEC Contract Workers Management offers centralized attendance management solution for various branches After comprehensive discussion regarding problems and requirements, Matrix offered COSEC Contract Workers Management solution for their 50,000+ workers, who have been employed under 900+ contractors, spread across four locations in India. COSEC Contract Workers Management offers centralized attendance management solution for various branches, spread across multiple locations, which automates all processes, right from recording entries and exits up to processing salaries. Enrolment of the worker credentials COSEC Contract Workers Management facilitates enrolment of the worker credentials, along with a photograph, documents, and induction details. It helps contractors to manage workers efficiently, using contractors' self-service portal. The solution provides multiple connectivity possibilities via Ethernet, Wi-Fi and mobile broadband. It eases the tracking of work order progress. It offers seamless integration with SAP using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations via email and SMS. Results: Enhanced security with effective worker's enrollment process abiding by various induction levels. Increase in productivity of admin by 20%. Easy decision making due to the generation of customized reports. Smooth and effective monitoring of work orders. Improved security with centralized control and monitoring - Reduced time spent by the security department. Error-free man hours' computation for quick & effective wages' calculation. Minimized manual interventions. Matrix products and solutions Offered: COSEC CENTRA LE - Application Software Platform expandable up to one million users. COSEC LE CWM - Contract Workers Management Module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF Card-based Door Controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare Card and NFC-based Door Controller. COSEC VEGA FAX - Fingerprint and RF Card-based Premium Door Controller with Touch Sense LCD, IP65, Wi-Fi, PoE. COSEC DOOR FOP - Fingerprint and RF Card-based Premium Door Controller with LCD and Keypad.
The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential, for both internal and external users. The museums needed a system that will be able to cope easily with changes, site extensions and two-site operation, and a solution that would remove the need to change all cylinders, when an employee loses a key. eCLIQ locking cylinders installed Now, the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders, across the two sites. ASSA ABLOY’s eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights, and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Designed for museum security Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact, and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers, along with their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. eCLIQ locking system Fitting eCLIQ locking system was a simple and wire-free task, and the museum staff, performed the installation themselves. One training session, with the admin software, was sufficient, to put them at ease with their new system. Looking after eCLIQ components is also easy, an integrated lubricant reservoir ensures cylinders, don’t require maintenance for up to 200,000 cycles. AES encryption, rapid processing, and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. Easy and effective access control “I am very happy with the eCLIQ solution,” said M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums, adding “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council, to show the effectiveness and simplicity of the eCLIQ solution.” Guyot adds, “Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
GMB has struck a deal with Securitas to become the first security provider to sign up for the union’s ground-breaking disability passport. The passport- developed by GMB and the TUC - is a straightforward, worker-owned process, that removes the stress and uncertainty many disabled workers face around reasonable adjustments. Securitas employs 355,000 people in 48 markets including more than 9,000 UK Employees. The move will mean all staff will be covered by the policy - which agrees the adjustments for employees with disabilities need to stay in work. Disability passport Securitas first security employer to sign up to life-changing reasonable adjustments disability passport Nell Andrew, GMB National Equality and Inclusion Officer said, “GMB commends Securitas for making this potentially life-changing commitment for their disabled staff. We believe this passport will promote dignity and highlights the value of disabled workers' work." "Disabled workers want the opportunity to thrive in the workplace - not just survive and we believe this short policy, will go a long way in achieving this.” Supporting disable workers Sarah Hayes, HR Director, Securitas Security Services UK, said, “We are delighted to be working in partnership with the GMB to support any employee with a disability and who may need help to thrive in their work." "The disability passport will help us make sure we make any reasonable adjustments an employee may need in the workplace environment, whether it be removing physical barriers or providing additional support. This fantastic initiative is one of a number of tools we are using to help us be a more inclusive employer and develop the expertise and diversity of our people.”
82% of schools and colleges in both the US and Northern Europe see a potential role for CCTV/video monitoring systems in supporting a safe return to face-to-face teaching in school buildings and across further education college campuses, following the pandemic. Many schools and colleges have already adapted their video monitoring systems. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 12 months. Video monitoring systems The AVA Security Education Sector Security Survey provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 12 months. Safe-specific video analytics Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the next year. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels in retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 12 months. Contactless access control The education sector is a deployer of facial recognition analytics in existing cameras Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 12 months. However, the education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22 percent of schools and colleges have deployed facial recognition to date, although this is set to more than double as 29% over the next 12 months. Reduced VMS costs The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely in 2021. Cybersecurity has become a key IT priority As IT, Operations, and Security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few weeks, the University of Hertfordshire experienced a major cyberattack which led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely’ that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. Smarter, easier to use video systems There was some disquiet about the quality of existing video systems’ core capabilities, the Ava Security research found. For example, 29% thought it was a ‘High Priority’ to improve the speed of finding and retrieving video evidence after a security or safety incident. A further 40% saw it as ‘Somewhat a Priority’ to improve the systems’ retrieval capabilities to find ‘required footage of incidents easier and quicker. It currently takes too long.’ Further, 22% saw the need for ‘better integration between video monitoring camera systems and other security-related systems, such as access control or alarm systems’ as a ‘High Priority’, while over half (57%) saw wider security systems integration as ‘Somewhat a Priority’ now. Nearly two-thirds (66%) of video monitoring system decision-makers in the education sector were keen to make their video monitoring systems ‘more intelligent, using video analytics to support better post-event decision-making’ – placing this improvement as either a ‘High Priority’ or ‘Somewhat a Priority’. Cloud on the horizon 73% of the education sector is experiencing accelerated cloud migration Others were more focused on Cloud Migration of more IT Systems. Over half (51%) confirmed that their cloud migration plans had been accelerated in 2020/21 and a further 32% confirmed that a new budget had already been allocated for moving more services into the cloud in the financial year 2020/21. That means that altogether (net) 73% of the education sector is experiencing accelerated cloud migration. Linked to this, the same study uncovered that 58% found ‘adoption of Video Surveillance as a Service (VSaaS) i.e., moving their video monitoring system into the cloud’, as a ‘net priority’ for improving and optimizing their video monitoring systems looking forward. VSaaS selection criteria For the 82% of all education respondents actively considering VSaaS options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS right now, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people’. Third-party cameras While 24% of education sector decision-makers considering VSaaS, said it was critical that the provider was not headquartered in mainland China. A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment.' A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Latest analytic capabilities An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and color searching’. Balance of power The Ava study also explored whether the events of the last year had prompted changes in terms of who looks after the management of video monitoring systems. There was some evidence in the education sector that as CCTV has increasingly been migrated onto the network, IT departmental control is increasing. According to the study, nearly a third (31%) of schools and colleges’ video systems passed more control of their video monitoring systems to their IT department – taking the total percentage of video systems run by IT in the education sector to 39%. However, security and/or facilities management still holds the balance of power in the running of these systems with 50%, with 24% gaining responsibility for video monitoring during the pandemic. Only 4% of systems confirmed they had fully outsourced video system management and 7% confirmed that more of the management, upgrading, and running of their systems had been outsourced over the last year. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimizing the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection There is a strong determination to adapt existing school surveillance systems to new COVID-safe requirements" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Cloud Connector Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
Round table discussion
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
Security installation: Manufacturers & Suppliers
- Dedicated Micros Security installation
- VIVOTEK Security installation
- Panasonic Security installation
- UltraView Security installation
- Tamron Security installation
- Seagate Security installation
- Vicon Security installation
- Vanderbilt Security installation
- Arecont Vision Security installation
- Hanwha Techwin Security installation
- Teleste Security installation
- Dahua Technology Security installation
- Messoa Security installation
- LTV Europe Security installation
- Sony Security installation
- Luxriot Security installation
- MOBOTIX Security installation
- Parabit Security installation
- Bosch Security installation
- Climax Technology Security installation
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload