Sectigo, a globally renowned company in digital identity management and web security solutions, has announced the launch of its new Secure Partner Program, furthering Sectigo’s commitment to the company’s base of more than 1,200 partners worldwide. Partners in the program gain myriad benefits, including access to the new Sectigo Connect Partner Portal, advancing their ability to build new capabilities, deliver more value to customers, drive higher profits, and accelerate growth in t...
“While it has certainly been a tough year for in-person events, the Electronic Security Association (ESA) sees the value that the Electronic Security Expo (ESX) delivers each year to the pro-installed electronic security and life safety industry,” says ESA President, Jamie Vos. “As a previous co-owner of ESX, ESA has now acquired full ownership of the industry’s only national tradeshow developed by and for the pro-installed community. ESX is a place where you can feel th...
Allied Universal, a globally renowned security and facility services company in North America, has announced the acquisition of SecurAmerica, a privately held, Atlanta, Georgia-based security company with 49 offices located throughout the United States of America. Terms of the deal were not disclosed. US-based, private security firm SecurAmerica was founded by Frank Argenbright, a Georgia entrepreneur who, over the past 40 years, has built both security and facilities management companies with...
SATO (SATO Europe) has underpinned its leading range of labeling solutions with the launch of its new PV4 mobile printer, a next-generation mobile printer aimed at providing operators with enhanced efficiency across supply chains. The globally renowned company in the development of auto-ID and labeling solutions has designed the printer for on-the-go tasks across a wide range of fast-paced environments where performance and precision are crucial, such as logistics and distribution centers. With...
Fugue, the company putting engineers in command of cloud security and compliance, announces new capabilities for bringing public cloud container resources into compliance and ensuring the continuous security of container runtime configurations. The new capabilities deliver security and compliance visibility and reporting for managed container services offered by Amazon Web Services and Microsoft Azure and turnkey support for the CIS Docker Benchmark. The new Fugue features provide continuous co...
In light of the current global events, most of the human workforce is confined to their homes and business owners are actively seeking new ways to guard their personal and commercial assets 24x7. Enterprises of all sizes need smart and scalable security solutions to protect their physical capital and properties automated drones to guard assets Using automated drones to guard assets round the clock has become a necessity, and businesses are reaping great value by adopting autonomous drones for...
Evolv Technology has announced the appointments of a pair of executives with proven track records for guiding high-growth digital technology companies into global market leaders. Eric Pyenson joins as General Counsel from VMware Carbon Black (part of Carbon Black, Inc.) and A.J. De Rosa as Chief Revenue Officer (CRO) from Orbital Insight. Evolv just completed its most successful year since being founded in 2013. Scaling operations across all functions, the company is the world’s first and only commercially successful provider of artificial intelligence (AI)-based touchless security screening systems. Evolv Express Evolv Express is deployed worldwide and has been used to screen more than 50 million people Evolv Express is deployed worldwide and has been used to screen more than 50 million people, second in numbers only to the U.S. Department of Homeland Security’s Transportation Security Administration (TSA). Pyenson is a veteran technology industry lawyer and management executive with broad private and public company experience, including managing multiple initial public offerings (IPOs) and strategic transactions, as well as building respected in-house legal teams. Technology industry expert He joins Evolv as general counsel from VMware Carbon Black, where he served as vice president and general counsel of the Carbon Black Security Business Unit following VMware’s US$ 2.1 billion acquisition of Carbon Black in 2019. Previously, as Carbon Black’s General Counsel and a member of the executive team, he helped lead its US$ 175 million IPO in 2018. He also served in a similar role with A123 Systems, which had one of the most successful IPOs in the clean technology sector. Notably, he has significant international and security experience serving the U.S. government on counterterrorism matters earlier in his career. New sales and revenues head As Evolv’s new Chief Revenue Officer (CRO), De Rosa is responsible for all sales, business development, customer success and strategic partnership initiatives. Most recently, he served as CRO at Orbital Insight, where as head of all client-facing operations, sales, customer success and marketing efforts he helped the company to establish a global leadership position in the geospatial analytics sector. With expertise in advanced sensors, data analytics, SaaS-based models and sales optimization methodologies, he brings to his new role more than 25 years of experience scaling global sales organizations, building strategic relationships and driving customer success. Combining vision with advanced technologies We’re living in chaotic, stressful times and having a sense of safety has never been more important" Earlier in his career, as Senior Managing Director and Co-head of Global Sales at Eze Software Group, he built a team that grew annual sales in excess of US$ 100 million. “We’re living in chaotic, stressful times and having a sense of safety has never been more important,” said Evolv Technology’s Chief Executive Officer (CEO), Peter George, adding “Evolv identified early on that human security had to be fundamentally rethought in order to provide substantially better outcomes – capable of addressing known threats as well as risks that would inevitably present themselves in the future.” Peter further said, “By combining our vision with advanced technologies, we’re leading that digital transformation. We’re thrilled to welcome Eric and A.J. to the team. They’ll play important roles as we accelerate our growth and keep even more people safe around the globe.” Digital transformation of physical security Evolv is leading the digital transformation of physical security, one that is touchless and addresses the ‘new normal’ threat of pandemic viruses as well as concealed weapons. Using AI software and powerful sensors, Evolv Express can screen up to 3,600 people per hour, 10 times faster than legacy approaches such as metal detectors, hand wands and manual inspections. The system enables social distancing at entrances and other security checkpoints, while minimizing person-to-person interaction, requiring no stopping, no emptying of pockets or removing bags. Screening technologies deployed at various sites People being screened simply walk through naturally, alleviating potential crowding and long lines while greatly reducing contact between guests, employees and security staff. In use at hundreds of outdoor entertainment venues, cultural landmarks, corporations, warehouses, schools, hospitals, stadiums and large-scale events worldwide, Evolv’s customers include Six Flags Entertainment Corporation, L.L. Bean, Wynn Las Vegas, Oakland International Airport, two South Carolina school districts, Hersheypark, Set Jet, the Biltmore Estate and the Pittsburgh Symphony Orchestra. By using Evolv Express, organizations optimize the performance of their security teams, while reducing screening expenses by as much as 70 percent.
GAI-Tronics, the globally renowned company in manufacturing industrial and commercial communication solutions, has announced the release of its new access control feature to the HUBBCOM family of products, Temperature Sensing. Temperature sensing Temperature sensing is a new way to facilitate a contactless check-in process for employees and authorized visitors in a building. “GAI-TRONICS is proud to have developed an access control feature that complies with WHO COVID-19 safety standards and guidelines to ensure peace of mind and promote health and safety,” said Stuart (Stu) Foote, Senior Product Manager at GAI-Tronics. Benefits of Temperature Sensing Access Control include: Body temperature reading while wearing a mask Minimization of face-to-face contact when checking into a building Reduction of contact transmission by reporting irregular body temperatures Reduction of manual temperature scanning workload Compliance with COVID-19 safety standards and regulations How Temperature sensing works? Access to a building or facility is denied if an irregular body temperature is detected An authorized user walks into a business’s vestibule/lobby, scans their access card and is prompted to align their face with the template that appears on the screen. Body temperature is read within 2-5 seconds and, if a satisfactory temperature is detected, access is granted. Access to a building or facility is denied if an irregular body temperature is detected. An email report of the body temperature and photo are sent to a pre-determined individual (security personnel or facility operations management etc.). What makes GAI-TRONICS’ system different? HUBBCOM devices provide numerous functionalities from access control and point-to-point audio/video intercom to SIP telephony and facility-wide or zoned broadcasting and alarm generation. Temperature sensing is an option offered on HUBBCOM models (GSC1100TS, GSC2100TS, GSC3100TS and GSC4100TS). Temperature sensing access control is an ideal security solution for businesses across a wide range of markets including manufacturing facilities, offices, educational institutions, healthcare and almost any building with an indoor vestibule/entry way.
Ensuring the safety of residents and staff in specialized housing environments has always been a priority for those in the sector. Karen Trigg of Allegion UK highlights the steps decision-makers must make to keep occupants in sheltered, extra care or supported housing safe and secure. Whether it’s adhering to fire safety or infection control guidelines, a topic that is never far from ones thoughts at the moment, there are many options that decision-makers can take to ensure maximum safety and compliance in specialized housing settings. Only recently, the pandemic has left facilities such as care homes and their staff under scrutiny over their infection control methods. And now, with the winter period playing a role in the spread of common colds and such, infection control, along with the safety of occupants, is rife in the news. So, with that in mind, what are the steps that must be taken to ensure occupants in supported housing stay safe and secure? Safe environment Providing a safe environment for all doesn’t have to be a complex process, although it is important that the process is thorough, with occupants in these settings potentially far more vulnerable to injury or worse in the event of a fire. The same is true for infection control, where robust policies and protocols should be in place to protect those living in supported housing, as well as the staff looking after them. Fire safety NFCC comprehensive guide includes proposals designed to protect residents situated in specialized housing The National Fire Chiefs Council’s (NFCC) comprehensive guide for specialized homes, published in 2017, includes many proposals, all designed to protect the estimated three-quarters of a million residents situated in specialized housing in the U.K. Further to this, in January 2020, the Scottish Government strengthed its response to fire safety – the Practical fire safety for existing specialized housing and similar premises: guidance – which is aimed at housing and care providers, as well as care regulators and care service commissioners. Both reports detail ways in which specialized homes should work to minimize fire risk to protect both the people living, working and visiting there and the building itself. Risk assessment & fire safety management Examining the statistics surrounding fire safety in these environments, it’s unsurprising that it remains a priority. According to the NFCC report, sheltered and extra care housing accounts for about 2% of housing stock, but between 2010 and 2016, they accounted for about 7% of fires – a critical finding. From this, London Fire Brigade’s eight-page document distilled the main information and includes a person-centered fire risk assessment checklist and a list of the main fire safety management procedures, such as testing fire doors and fire alarms, record-keeping and essential maintenance. Crucially, fire doors and their appropriate door hardware, such as mechanical and electromagnetic closers and panic emergency exit hardware, must be fitted correctly and regularly checked to ensure these heavily used products are fit for purpose. Comfortable usage Key for specialized housing, it’s important to remember that there is no one-size-fits-all solution to fire safety products. Residents, for example, must be comfortable using fire doors and their hardware, thus removing the risks associated with heavy or non-functional doors that residents in these settings may have additional problems operating. Decision-makers are advised to consult a door hardware expert, who will provide further guidance as to the products that will best meet the needs of a specific facility. These experts consider such issues as assessing the emergency access and egress systems, as well as establishing how best to accommodate the needs of all occupiers and staff. Infection control 80% of infections spread through the environment and 71% of healthcare facilities use environmental cleaning to prevent the spread of infection Infection control has long been front and center of people’s minds – and never more so since the COVID-19 pandemic, which highlighted the endemic risks in all commercial, healthcare, domestic, and cares home settings. In 2018, a report conducted by Allegion UK revealed that while 80% of infections are transmitted through the environment, only 71% of healthcare facilities used environmental cleaning to prevent the spread of infection. Furthermore, just 52% of healthcare respondents said they were satisfied that their existing infection control measures were robust and effective. The potential for exposure to pathogens is significant within specialized home settings. While handwashing and disinfection protocols, as well as ventilation procedures, all form an important part of infection control, there are additional measures that can be taken, such as installing antibacterial door hardware, handles, and levers in high-traffic areas. Antibacterial protection These solutions contain added antibacterial protection to help eliminate potentially harmful bacteria and defend against the spread of microorganisms. In an environment where health risks are more probable, this provides extra peace of mind when it comes to maintaining the highest levels of hygiene and minimizing the risk of contamination. It’s also key to observe the building’s emergency exits. Emergency exit devices can also be coated with antibacterial properties, contributing to both fire safety standards and now infection control, by reducing the risk of cross-contamination, providing long-lasting protection, and enabling people to escape a building quickly. Furthermore, touchless electromagnetic door controls can assist with ease of movement, fire safety, and infection control by being linked to the building’s alarm system, closing shut in the event of a fire, and eliminating the need for people to wedge the doors open. Taking responsibility In what is now a critical time for many specialized housing facilities, decision-makers must take responsibility in their choices to help meet both the fire safety and infection control requirements that have been set. While it’s true that the varied nature of running sheltered, extra care, and supported housing facilities can make decisions feel like complex challenges, today’s hardware solutions provide one helpful and easy solution, enabling higher levels of building safety and security and that, in the current environment, is more important than ever.
Synology Inc., globally renowned high-performance, reliable, versatile, and environmentally-friendly NAS servers and storage solutions firm, has announced the launch of the RackStation RS1221+ and RS1221RP+ (redundant power) 2U 8-bay rackmounted storage servers, which have been specially built to deliver high performance in a space-efficient and cost-effective manner. “The RackStation RS1221+ and RP+ storage server units are designed for small businesses, and indeed, ‘small’ they are,” said Michael Wang, Product Manager at Synology, Inc. Michael adds, “These units not only pack in a huge leap forward in performance, but do it at a modest depth for 2U units in their class. What's more, for businesses that require higher availability, the RP+ version is equipped with dual power supplies for redundancy and added reliability.” RackStation RS1221+ and RS1221RP+ storage servers The new RackStation series units deliver 3.6X higher compute performance and 3.8X random read IOPS at 108K The RS1221+ and RS1221RP+ rackmounted storage servers are the first RackStation series units built around the AMD Ryzen V1500B processor. Compared to their predecessor, the new RackStation series units deliver 3.6X higher compute performance, 3.8X random read IOPS at 108K, and 2.3x higher sequential write performance at 1,147 MB/s. This basically translates to faster performance in data management and backup tasks, while also allowing businesses to scale to higher numbers of concurrent users and services, and the same time maintain a high performance output. Compact servers for space-sensitive deployments At only 306.6 mm and 407.5 mm deep (including front server handles), the RackStation RS1221+ and RS1221RP+ storage servers are less than half the depth of standard 2U rackmounted devices, making them ideal for smaller rackmount enclosures, such as wall mounted cabinets, or two-post racks (RS1221+ only), where space is at a premium. The RackStation RS1221+ and RP+ storage server units are configured with 4 GB of DDR4 ECC memory by default, upgradable to 32 GB. Its PCIe 3.0 slot enables easy upgrading to 10GbE with a compatible NIC, or to add super-fast NVMe cache via Synology M.2 cards and Synology SVN3000 series SSDs. These rackmounted server units can scale to 12 drive bays using an RX418 expansion unit and compatible drives. For businesses wanting extended support, its 3-year limited warranty and can be extended to 5 years. Efficient data management and protection Synology DSM enables backup of IT infrastructure with the Synology Active Backup suite Synology Diskstation Manager (DSM), Synology's unified operating system, simplifies difficult and cumbersome data management processes while still giving users ample control over decisions that matter. Synology DSM enables backup of IT infrastructure with the Synology Active Backup suite and hosting of on-premises private cloud with Synology Drive, virtual machines with Virtual Machine Manager, mail servers with MailPlus, and other SaaS services. Global availability RS1221+ and RS1221RP+ are available from Synology resellers globally. The predecessor, the RS1219+ contains an Intel Atom C2538 processor. Performance figures are achieved in the Synology lab with optimized network and configuration settings. Actual performance could vary in different environments. Comparison done against prior-generation RS1219+. Check compatibility list for compatible Network Interface Cards. 2 SSD cache can be enabled using the E10M20-T1 and M2D20 M.2 SSD adapter cards with Synology SNV3500 or SNV3400 NVMe SSDs. SSD caching is also supported via SFF (2.5") SSDs. The capacity of the RS1221+ and RS1221RP+ can be expanded using a Synology RX418 expansion unit, purchased separately. Supports LFF (3.5 inch) or SFF (2.5 inch) SATA drives. Check compatibility list for validated drives. RS1221+ and RS1221RP+ include a 3-year limited hardware warranty, which can be extended to 5-years with the optional EW201 bundle, a 7-year Extended Warranty service add-on.
Heald, an innovator in the field of perimeter security technology and the largest manufacturer of quality security equipment in the UK, has announced a partnership with Singapore-based ESCO Pte Ltd as it continues its international growth. The partnership will strengthen its position as a leading supplier of hostile vehicle mitigation solutions across Asia following installations including the Keppel Marina East Desalination Plant in Singapore. The distributor agreement will grant exclusive authority to ESCO to market and sell the Heald Matador and Viper within Singapore and South East Asia countries including Malaysia, Thailand, Laos, Cambodia, Vietnam, Philippines, and Indonesia, enabling Heald to strengthen its customer support and product offering in the region. High-security solution Heald's modified designs fit individual site requirements and meet the demanding needs of organizations With innovation at the core of Heald, they continue to bring to market unique, patent-protected products from bollards to road blockers. Heald's bespoke designs are made to fit individual site requirements and meet the increasingly demanding needs of organizations that require high-security solutions against the threat of vehicular attack, in particular locations that require shallow or surface mount installs. The director of ESCO Pte Ltd, Sanjeev Bhat, has played a pivotal role in Singapore’s adoption of British security standards and measures having more than ten years of experience in the industry. Singapore has led the way in its commitment to hostile vehicle mitigation with other Asian countries following suit, making it one of the most active security markets in the world. Authority comments Debbie Heald MBE, managing director at Heald Ltd, commented, “We have been supplying to the SEA region for 10 years, however, this collaboration will see the partnership with ESCO offer greater in-country support to our existing customers and also the promotion of our current range and new innovative hostile vehicle mitigation systems to these Countries. These are growing regions with exciting opportunities and we are thrilled to be working with ESCO and our long-term experienced partner Sanjeev Bhat.” Sanjeev Bhat, Director, Hostile Mitigation from ESCO Pte Ltd, commented, “ESCO is a solution-driven business where multiple products are combined to design a one-stop solution to the end-user. Having Heald’s innovative and patented products under our offerings not only widens our product range, but also the range of applications. Our regional presence will facilitate Heald’s presence and position in the region. We are excited at the opportunity to bring Heald’s innovative product solutions to customers within Asia with enhanced technical and after-sales support.”
Interface Security Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, announced the completion of a $60 million equity financing transaction led by its current sponsors SunTx Capital Partners and Prudential Capital Partners. The additional equity capital will help facilitate the company’s growth strategy and strengthen its capabilities, featuring highly differentiated managed services. Overall customer experience This new capital comes in the wake of a highly productive 2020 where Interface has: Made significant investments in innovation, product development, and new technology infrastructure Scaled operations and expanded service offering to a broader range of verticals Launched new services and strategic partnerships Achieved a 250% YoY growth in new customer acquisitions Further enhanced the overall customer experience Increasing security threats This new capital will catalyze the growth phase that Interface is already in" Michael Shaw, CEO of Interface Security Systems, said, “We see a major digital transformation taking place within numerous distributed enterprise business models seeking to adapt to changing consumer behavior and increasing security threats. Interface is a leading provider of innovative business security solutions, remote managed video monitoring, and networking infrastructure that provides distributed enterprises with next-generation store technology and 24/7 system management to keep pace with these trends. This capital infusion will enable us to continue to stay ahead of the technology curve and further solidify our position as a key technology partner for consumer-facing businesses.” Ned Fleming, Founding Partner of SunTx Capital Partners, said, “This new capital will catalyze the growth phase that Interface is already in. We believe the company is strongly positioned to help businesses integrate the management of their security, managed networks, and business intelligence, particularly as we emerge from the global health crisis.” Supply chain management Robert Derrick, Managing Director and Partner with Prudential Capital Partners, said, “Interface is well-positioned to support consumer-facing distributed enterprises as they transform their business models. We are happy to be a part of this new round of investment to help fuel their evolution and growth.” “As the economy emerges from the pandemic, we will see many new business models develop to support remote working, curbside delivery and smarter supply chain management that will require innovative networking, enhanced security, and business analytics solutions,” comments John Mack of Imperial Capital, an advisor to Interface. “This growth capital positions Interface to take advantage of opportunities in areas where they have a demonstrated track record of success.”
Like most industries, the fields of security, access, and safety have been transformed by technology, with AI-driven automation presenting a clear opportunity for players seeking growth and leadership when it comes to innovation. In this respect, these markets know exactly what they want. They require solutions that accurately (without false or negative positives) classify and track people and/or vehicles as well as the precise location and interactions between those objects. They want to have access to accurate data generated by best-of-class solutions irrespective of the sensor modality. And, they need to be able to easily deploy such solutions, at the lowest capex and opex, with the knowledge that they can be integrated with preferred VMSs and PSIMs, be highly reliable, have low install and maintenance overheads and be well supported. With these needs in mind, camera and computer vision technology providers, solutions providers, and systems integrators are forging ahead and have created exemplary ecosystems with established partnerships helping to accelerate adoption. At the heart of this are AI and applications of Convolutional neural networks (CNN), an architecture often used in computer vision deep learning algorithms, which are accomplishing tasks that were extremely difficult with traditional software. But what about 3D sensing technologies and perception? The security, safety, and access market have an additional crucial need: they must mitigate risk and make investments that deliver for the long-term. This means that if a systems integrator invests in a 3D sensing data perception platform today, it will support their choice of sensors, perception strategies, applications, and use cases over time without having to constantly reinvest in alternative computer hardware and perception software each time they adopt new technology or systems. This begs the question - if the security industry knows what it needs, why is it yet to fully embrace 3D sensing modalities? Perception strategy Intelligent perception strategies are yet to evolve which sees designers lock everything down at the design phaseWell, one problem facing security, safety, and access solutions providers, systems integrators, and end-users when deploying first-generation 3D sensing-based solutions is the current approach. Today, intelligent perception strategies have yet to evolve beyond the status quo which sees designers lock everything down at the design phase, including the choice of the sensor(s), off-the-shelf computer hardware, and any vendor-specific or 3rd party perception software algorithms and deep learning or artificial intelligence. This approach not only builds in constraints for future use-cases and developments, it hampers the level of perception developed by the machine. Indeed, the data used to develop or train the perception algorithms for security, access, and safety use cases at design time is typically captured for a narrow and specific set of scenarios or contexts and are subsequently developed or trained in the lab. Technology gaps As those in this industry know too well, siloed solutions and technology gaps typically block the creation of productive ecosystems and partnerships while lack of commercial whole products can delay market adoption of new innovation. Perception systems architectures today do not support the real-time adaptation of software and computing engines in the field. They remain the same as those selected during the design phase and are fixed for the entire development and the deployment stage. Crucially, this means that the system cannot deal with the unknowns of contextually varying real-time situations where contexts are changing (e.g being able to reflex to security situations they haven’t been trained for) and where the autonomous system’s perception strategies need to dynamically adjust accordingly. Ultimately, traditional strategies have non-scalable and non-adaptable competing computing architectures that were not designed to process the next generation of algorithms, deep learning, and artificial intelligence required for 3D sensor mixed workloads. What this means for industries seeking to develop or deploy perception systems, like security, access, and safety, is that the available computing architectures are generic and designed for either graphic rendering or data processing. Solutions providers, therefore, have little choice but to promote these architectures heavily into the market. Consequently, the resulting computing techniques are defined by the computing providers and not by the software developers working on behalf of the customer deploying the security solution. Context…. we don’t know what we don’t know Perception platform must have the ability to adjust to changes in context, thereby improving the performance post-deployment To be useful and useable in the security context and others, a perception platform must have the ability to adjust to changes in context, can self-optimize, and crucially, can self-learn, thereby improving the performance post-deployment. The combinations of potential contextual changes in a real-life environment, such as an airport or military base, are innumerable, non-deterministic, real-time, often analog, and unpredictable. The moment sensors, edge computing hardware, and perception software are deployed in the field, myriad variables such as weather, terrain as well as sensor mounting location and orientation all represent a context shift where the perception systems’ solution is no longer optimal. For example, it might be that a particular sensor system is deployed in an outdoor scenario with heavy foliage. Because the algorithm development or training was completed in the lab, the moving foliage, bushes, or low trees and branches are classified as humans or some other false-positive result. Typically, heavy software customization and onsite support then ensue, requiring on-site support by solutions vendors where each and every sensor configuration needs to be hand-cranked to deliver something that is acceptable to the end customer. A new approach for effective perception strategies Cron AI is building senseEDGE, which represents a significant evolution in the development of sensing to information strategy. It is a 3D sensing perception and computer vision platform built from the ground up to address and remove the traditional deployment and performance bottlenecks we’ve just described. senseEDGE is aware of the user application reaction plan indication to trigger an alarm or turning on a CCTV camera The entire edge platform is built around a real-time scalable and adaptable computing architecture that’s flexible enough for algorithms and software to scale and adapt to different workloads and contexts. What’s more, it has real-time contextual awareness, which means that the entire edge platform is, at any time, aware of the external context, the sensor and sensor architecture, and the requirements of the user application. Furthermore, when it produces the object output data, it also aware of the user application reaction plan indication, which could be triggering an alarm or turning on a CCTV camera when a specific action is detected. This approach turns traditional perception strategies on their head: it is software-defined programmable perception and computing architecture, not hardware-defined. It is free from the constraints imposed by traditional CPU or GPU compute dictated by hardware architecture providers and not limited to the perception built defined during design time. And, being fully configurable, it can be moved from one solution to another, providing computation for different modalities of sensors designed for different use cases or environments, and lower risk of adoption and migration for those developing the security solution. Future perception requirements senseEDGE is also able to scale to future perception requirements, such as algorithms and workloads produced by future sensors as well as computational techniques and neural networks that have yet to be invented. Meanwhile, latency versus throughput is totally software-defined and not limited by providers of computing architecture. Finally, contextually aware, it is fully connected to the real world where the reflexes adapt to even the subtlest changes in context, which makes all the difference in time and accuracy in critical security situations. This is how CronAI sees the future of perception. It means that security and safety innovators can now access and invest with low risk in a useable and scalable perception solution that can truly take advantage of current and future 3D sensor modalities.
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
As the new Chief Executive Officer of Milestone Systems, Thomas Jensen pledges to continue the company’s focus on protecting people and assets and to help organizations gain insight and optimize their business processes. Seeking to fulfill Milestone’s mission to ‘Make the World See,’ Jensen will maintain Milestone’s approach of being an open video management system (VMS) platform and having an open company culture. End-User communities “I will also be working to expand Milestone’s VMS into new areas and applications —for example, to monitor beach erosion as the climate continues to warm up around the world,” says Jensen. “I believe the future of VMS is about bridging the gap between security and applications that go beyond security.” Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel. His experience as a generalist – extending beyond IT – enables understanding of the business side of things in addition to the skills, strengths and motivations of the people who work at Milestone, its channel, partner networks and the end-user communities. People-First approach “One crucial thing my career taught me is the importance of your team members,” he says. “A former manager once told me that success is the sum of the success of your team. And, luckily, Milestone already has a strong culture and people-first approach. This is one of the things that attracted me to this job.” The new CEO plans to spend his first 90 days building relationships and getting to know the company and the team members. He will be present in conversations with all Milestone people as well as partners and system integrators. “I want to ensure there is continuity and resilience so that my joining Milestone is a seamless transition,” Jensen says. “Furthermore, my focus will be to further build on the strengths of Milestone to create long-term sustainable growth.” Video-Enabled insights Jensen sees security through two lenses: on one hand, protecting people and property, and on the other, providing video-enabled insights for public and private companies to be able to make better decisions. On the protection side, businesses have room to grow as technologies move to provide more affordable, more powerful, and more interoperable solutions. A transformative element in the future evolution of video management is the cloud Regarding video-enabled insights, there is great potential, and Milestone is forging deeper relationships with partners and system integrators of important verticals such as cities, education, transportation, and retail. A transformative element in the future evolution of video management is the cloud, which will advance the deployment of technologies across the board. Best software integrations “I will be spending time working with our organization and partners to evolve Milestone’s cloud strategy and cloud partnerships to address the opportunities that lie ahead,” says Jensen. “I also think that Milestone’s belief in being open and giving integrators and end-users the freedom to choose the best software integrations available in the market is a philosophy that we've held dear from the very beginning — and this will become critical in the future as VMS solutions continue to evolve.” Safer business environment As the COVID-19 pandemic has raged on, Milestone Systems has continued its operation as usual, deploying safety measurements as needed to protect both employees and the partners they work with. COVID-19 has impacted everyone, every business and every government and organization around the world, says Jensen. We’re working with our partners to design a safer business environment with VMS-enabled solutions" “I think it taught us all a lesson in empathy and how we need to respect differences in behavior, regulations and compliance, customs and even each other,” he says. “At Milestone, we’re working with our partners to design a safer business environment with VMS-enabled solutions for social distancing, queue management, and contact tracing.” Creating security solutions “The past 50 years of digital technology and the past 20 years of IP technology have taught us that technologies eventually converge, and in some cases merge,” says Jensen. “Sometimes functions merge and channels converge, other times it’s the networks that come closer together, but none of this is absolute and universal.” “This is why we need to listen and learn from each other and be respectful of differences in the industry and the channel—particularly cultural and regional differences.” Jensen adds: “The technology company of the future — which I believe Milestone is becoming — will not dictate solutions but will instead partner with IT and security stakeholders to create security solutions that meet each customer’s unique challenge and environment.”
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Historically, concerns about inclusion and diversity have not been widely discussed in the security market. In the last couple of years, however, the Security Industry Association (SIA) and other groups have worked to raise awareness around issues of diversity and inclusion. Specifically, SIA’s Women in Security Forum has focused on the growing role of women in all aspects of security, and SIA’s RISE community has focused on “rising stars” in an industry previously dominated by Baby Boomers. The next generation of security leaders There is a business case to be made for diversity and inclusion, says a report by McKinsey & Company. According to the management consulting company, gender-diverse companies are 24% more likely to outperform less diverse companies, and ethnically diverse companies are 33% more likely to outperform their less diverse counterparts. Furthermore, the “next generation of security leaders” – employees under 30 – are particularly focused on diversity and inclusion. Diversity refers to the traits and characteristics that make people unique A panel discussion at ISC West’s Virtual Event highlighted aspects of inclusion and diversity, starting with a definition of each. Diversity refers to the traits and characteristics that make people unique. On the other hand, inclusion refers to the behavior and social norms that ensure people feel welcome. “We are all on a journey, and our journey takes different paths,” said Willem Ryan of AlertEnterprise, one of the SIA panelists. “There are opportunities to improve over time. We can all change and increase our ability to have a positive impact.” Industry responsibility The industry has a responsibility to the next generation of industry leaders to address issues of inclusion and diversity. Forbes magazine says that millennials are more engaged at work when they believe their company fosters an inclusive culture. So the question becomes: How do we unify and create opportunities to work with and champion tomorrow’s leaders? SIA is driving change in our industry to achieve that goal. More women are active in SIA than ever before. The SIA Women in Security Forum now has 520 members, said Maureen Carlo of BCD International, the SIA Women in Security Forum Chair and another panelist. Also, more women than ever are chairing SIA committees and serving on the SIA Board of Directors. More women than ever are chairing SIA committees Overcoming unconscious bias Former SIA Chairman Scott Shafer of SMS Advisors, another of the panelists, noted that SIA awarded the Chairman’s Award to the Women in Security Forum in 2019, and to the RISE community steering committee in 2020. “There are lots of ways we are seeing the elevation of women and ethnic groups in the security industry,” said Shafer. One topic of interest is the problem of “unconscious bias,” which can be overcome by looking at something through some else’s lens. Ryan suggested use of the acronym SELF – Slow Down, Empathize, Learn, and Find commonalities. Ryan recalled the value of being mentored and having someone shepherd him around the industry. “Now I want to give back,” he said. “We need to look at the things we can change in ourselves, in our company, in our communities, and in our industry. Change comes from the bottom and the top.” Increasing representation “It takes all of us to increase representation everywhere,” said Kasia Hanson of Intel Corp., another panelist. “We have in common that we are all human beings. Let’s make sure the next generation all have opportunities.” Diverse companies can attract better talent Moving forward, the panelists urged the industry to get involved and create opportunities because inclusion drives diversity. Diverse companies can attract better talent and attain a competitive advantage. Awareness of unconscious bias, and working to eliminate it, is an important element of change. Despite the progress the security industry is making, change continues to be incremental. As Ruth Bader Ginsburg has said, “Real change, enduring change, happens one step at a time.”
Synectics, a globally renowned company in the design, integration and support of advanced security and surveillance systems, announced that the company has won a new contract with Irish Rail (Iarnród Éireann) to upgrade all InterCity Mark 4 rolling stock on the Dublin to Cork route to an IP-based video surveillance solution, following a competitive bid process. The IP video security system contract will see Synectics develops and installs an innovative safety-critical IP video surveillance system that enables full connectivity from trains to the control room, there by replacing the existing CCTV approach. Safety-critical IP video surveillance system installation Each eight-coach train set, using Synectics’ T2000 platform, will help utilize a suite of IP 360-degree ‘fish-eye’ cameras Each eight-coach train set, using Synectics’ T2000 platform, will help utilize a suite of IP 360-degree ‘fish-eye’ cameras, in the vestibules and saloon areas, to provide high-quality surveillance information. Installation is expected to commence in September 2021, to be followed by an additional support contract to provide a five-year in-territory maintenance program. IP video security technology Iain Stringer, Managing Director of Synectics, commented “We are delighted that Irish Rail has chosen our IP video security technology, alongside our design, program management and installation capabilities, to upgrade surveillance on one of their premier InterCity routes.” Iain adds, “This win with Irish Rail represents a further step into on-vehicle heavy rail solutions for our Synectics Security business, building on our deep experience across light-rail markets.” Smart technology developments He further stated, “Irish Rail is our second public transport win in Ireland over the last few months and reflects our growing reputation for smart technology developments that meet next generation operator requirements. Our approach is opening up new opportunities for all rail operators to transition their video management capability to the cloud and improve operational effectiveness.”
The first phase in a pioneering smart transport project to transform security, passenger service, and operational management across Berlin’s S-Bahn rail network has officially gone live. Teams based at S-Bahn’s ‘4S’ operational headquarters are now, via the latest developments in Synectics’ Synergy hybrid cloud software platform, able to connect, respond, and collaborate with passengers and staff on-board trains, at stations, and with field personnel working anywhere across the network. Synergy hybrid cloud software The new capabilities, including an innovative mobile application, mark a revolutionary step forward in the way operational command, control, and communications are carried out within urban rail environments. The project, which went live as scheduled on 1 January, is the result of an innovative partnership between S-Bahn Berlin GmbH (a subsidiary of Deutsche Bahn) and command and control solutions expert, Synectics. The two companies’ combined ambition has led to the development of a tailored system that delivers a positive customer experience both now and well into the upcoming decade. Integration with S-Bahn’s proprietary systems Leveraging powerful tools to form custom API gateways, Synergy integrates to S-Bahn’s proprietary systems Leveraging powerful tools to form custom API gateways, Synergy integrates to and interoperates with S-Bahn’s proprietary systems, as well as all third-party technologies, devices, and communication solutions vital to passenger service, safety, and security. This is achieved in real time, and continuously informed by sensor data obtained from integrated systems crucial to operating safe and efficient passenger services. The new Synergy mobile application will enable S-Bahn’s workforce to receive automated task assignments based on their role, skills, and location, and to directly update the system on their delivery of those tasks, the sophisticated level of integration and interoperability achieved is unprecedented. Intelligent digitization of workflows Henning Oelze, Project Manager at S-Bahn, commented “Synergy’s powerful integrations, intelligent digitization of workflows, workforce management capabilities, and computer-aided dispatch functionality combine to deliver a hugely exciting outcome. The platform offers complete visibility of network-wide activity and the ability to coordinate and automate the right response, at the right time, to any requirement.” Henning adds, “It was with huge pleasure that we saw our first trains and Security and Service teams utilizing the new Synergy system, especially given how challenging this last year has been. It really is a revolutionary step forward in our mission to deliver outstanding passenger service, while at the same time, making life much easier for our personnel through the advanced automation of operational processes.” Rapid resource communication and deployment From fulfilling a planned maintenance task to sending people with the most appropriate training to deal with an evolving security or safety issue, Synergy will facilitate the rapid communication, deployment, and appropriate action of different teams. This will equip S-Bahn to process and react to events within pre-defined response times, and to manage its workforce as effectively as possible. The project is scheduled to continue during 2021, with the two organizations building further technical capabilities and driving ahead with continuous improvement. Key enhancements will see extensions to the workforce management functionality and more developments to improve operational efficiency within incident and task management assignments. Smart transport systems standards Some of the software developments driven by this project will have long term implications for the sector" Greg Alcorn, Director, Global Sales & Customer Success at Synectics, said “S-Bahn Berlin is viewed as a technological trail-blazer and we’ve thoroughly enjoyed working with such a well-organized team to deliver the first step in their truly inspirational vision for urban transport.” Greg adds, “Some of the software developments driven by this project will have long term implications for the sector. I have no doubt that there are new standards being set here for smart transport systems of the future.” Future of smart transport operations In addition to the ground-breaking technology used, the project also demonstrates the advances that can be achieved through international collaboration. Henning Oelze stated, “Having such direct access to Synectics’ product development team in the UK and knowing that they understood how agile we needed this solution to be, has made a huge difference." He adds, “They shared our vision for the future of smart transport operations in a major European capital and worked in close partnership with the S-Bahn team, successfully navigating their way through the technical, logistical and cultural challenges of a major international project. The close nature of this collaboration is the reason we have reached this crucial go-live milestone, despite all the hurdles that 2020 put in our way.”
Globally renowned security video wall technology and audio visual solutions expert, Ultimate Visual Solutions (UVS) has announced that the company has secured its first contract in Poland, as part of a concerted sales drive across Central and Eastern Europe. The project deal, for a client in the energy sector, is to supply a control room with UVS Lucidity video wall controller technology. This deal takes the number of countries where Ultimate Visual Solutions has worked in or supplied equipment to 17 in the last two years. UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology during lockdown, to a client brought to UVS by the audio-visual distributor, Business International Group. The AV distributor, based in Warsaw, Poland provides professional solutions, devices and audio-visual accessories to a wide range of clients. UVS technology will be at the heart of a new operations center, where it will be providing the monitoring of key Supervisory Control And Data Acquisition (SCADA) systems and other critical data. Monitoring of SCADA systems and critical data Business International Group was introduced to Ultimate Visual Solutions by Pawel Religa, the UVS representative in Central and Eastern Europe, who was recruited to take advantage of the region’s fast-growing audio-visual markets. He was given technical support by UVS’s certified and authorized Eastern Europe pre-sale and after-sale service support partner, Robert Chlebowski of SIGE Poland. Pawel Religa has a wealth of experience in the AV sector, with previous employers including, Edbak (EDBAK Sp. Zo.o.). He is focusing on Russia, Poland and other key parts of the European mainland. Live demonstrations of UVS technology Pawel Religa commented, “The fact that Ultimate Visual Solutions (UVS) were able to provide Business International Group and their end client with very specific online live demonstrations and evaluations of the proposed UVS technology, and using the exact same SCADA application as the end client has implemented, convinced the end client that it was providing the correct solution.” Pawel further adds, “Ultimate Visual Solutions support during the sales, procurement and installation cycle has been excellent and Business Group are looking forward to a long term business relationship.” UVS remote services suite Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility Earlier this year, Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility, in order to provide full video wall technology evaluations for partners and their clients, even in lockdown or self-isolation due to the COVID-19 pandemic. Steve Murphy, Managing Director of Ultimate Visual Solutions (UVS), which is based in the Business First - Burnley Business Centre, said “This contract is the first to come as a result of the many proposals we have been doing during lockdown for Business International Group in Poland, which have benefitted greatly from our ability to provide online demonstrations.” Video wall displays and AV solutions provider Steve Murphy adds, “The investment we made at the beginning of 2020 in our remote demonstration and remote support capability is proving invaluable and has contributed to a very strong finish to 2020.” Ultimate Visual Solutions (UVS), which has its headquarters at the Business First - Burnley Business Centre in Burnley, United Kingdom, provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. It changed its name from eyevis UK in September 2018, following the acquisition of eyevis GmbH by the Leyard Group.
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
Two museums, a single security environment. As a result, access management was eating up significant time and budget for the museums’ Technical and Security Manager. The solution for simpler access management was eCLIQ, an electronic locking system built around easy-to-fit cylinders and programmable, battery-powered keys. The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential — for both internal and external users. They needed a system able to cope easily with changes, site extensions and two-site operation; a solution which would remove the need to change all cylinders when an employee loses a key. Simplified access management Now the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders across the two sites. The eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key-holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Monitoring service providers Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to both employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers — and their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. Fitting eCLIQ locking was simple and wire-free: museum staff performed the installation themselves. One training session with the admin software was sufficient to put them at ease with their new system. Efficient energy management Looking after eCLIQ components is also easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. AES encryption, rapid processing and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. “I am very happy with the eCLIQ solution,” says M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums. “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council to show the effectiveness and simplicity of the eCLIQ solution. Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
St Louis-headquartered insurance brokerage Crane Agency is to roll out CyberCube’s Broking Manager, the cyber risk analytics platform for insurance intermediaries. Crane Agency is a US top 100 retail insurance broker, the oldest west of the Mississippi. Established in 1885, the business is licensed in 50 states and has four other offices in Missouri with over 250 staff. Broking Manager is the first software-as-a-service application CyberCube has built specifically for the insurance broking community. It offers a streamlined approach to generating financial exposure impact that helps clients make informed decisions on coverages and limits. Financial impact of cyber risk Broking Manager will allow Crane’s team to quantify and explain to their clients the sources and financial impact of cyber risk exposure. The platform also produces reports that can be used to educate prospects and clients on potential sources of loss, recent and relevant cyber events, and peer-to-peer benchmarking. Authority comments Pascal Millaire, CEO for CyberCube, said, “Crane Agency is a forward-looking insurance business that sees much potential in the cyber market. It’s been a pleasure to work with them and we’re thrilled they’ve chosen to use Broking Manager to assist with understanding their clients’ needs.” Beth Martin, Management Liability and Cyber Practice Leader, Crane Agency, said, “We’re very excited to be partnering with CyberCube. It’s our firm belief that Broking Manager will provide exceptional insights for our clients at a time when the cyber risk landscape is changing markedly.” “The pandemic and the shift in working patterns it has generated mean new risks, new modes of cyber-attack, and new vulnerabilities. With businesses coming to terms with these changes, we see considerable potential for growth in the cyber insurance market.” Portfolio Manager and Account Manager Broking Manager complements CyberCube’s two other products, Portfolio Manager and Account Manager, which are designed for risk carriers and are used by foremost companies across the insurance ecosystem.
Round table discussion
For several decades, Baby Boomers represented the largest sector of employees in the physical security market. However, these security professionals born between 1946 and 1964 are now nearing retirement – or have already retired. How will the security market change as the next generations step up to make their contributions? We asked this week’s Expert Panel Roundtable: As Baby Boomers approach retirement age, what are the positives and negatives in the physical security market?
Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analyzing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Security management: Manufacturers & Suppliers
- Dahua Technology Security management
- Vicon Security management
- Seagate Security management
- Bosch Security management
- CEM Security management
- IFS Security management
- VIVOTEK Security management
- Vanderbilt Security management
- Hikvision Security management
- Parabit Security management
- BCDVideo Security management
- Pelco Security management
- ComNet Security management
- Arecont Vision Security management
- TESA Security management
- Hanwha Techwin Security management
- DSC Security management
- Messoa Security management
- FLIR Systems Security management
- Delta Scientific Security management
10 Step Guide to Staying Ahead of Emerging Security ThreatsDownload
2021 Trends in Video SurveillanceDownload
Exploring New Vertical Markets for Professional Security SystemsDownload
Capture New Opportunities With Computer Vision And Video AnalyticsDownload