SALTO Systems, a globally renowned manufacturer of electronic access control solutions, has received carbon-neutral certification for its factory headquarters in Spain and across all of its operations. Edge electronic access control Carbon neutrality is achieved by calculating a carbon footprint and reducing it to zero through a combination of efficiency measures in-house and supporting external emission reduction projects. SALTO’s renowned edge electronic access control hardware...
ASIS International, the globally renowned association for security management professionals, has announced that General Stan McChrystal, US Army (RET), will present a Global Security Exchange Plus (GSX+) keynote address on Military & Law Enforcement Appreciation Day at GSX+. The presentation, titled Leading in a New World, will take place on Wednesday, 23 September. Global Security Exchange Plus “GSX+ offers a unique opportunity to share the insights and guidance from global thought...
Patriot One Technologies Inc., is pleased to announce a development partnership with ecoMine Technologies Corporation (ecoMine) to advance ecoMine’s innovative, low-cost, on-the-spot pathogen screening technology, ecoScreen. ecoScreen screening technology ecoMine’s technology platform, ecoScreen has significant potential in this current pandemic, (especially when it comes to enabling the safe return to work across multiples sectors of the economy) as well as a broad range of other...
Research carried out by a renowned Cyber Security company, Intruder has revealed that on average, an exposed Mongo database is breached within 13 hours of being connected to the internet. The fastest breach recorded was carried out 9 minutes after the database was set up. MongoDB database program MongoDB is a cross-platform document-oriented database program that consistently ranks in the top 5 most-used databases worldwide. It is used by a wide range of organizations all over the globe to sto...
Researchers at Check Point have identified security flaws in Apache Guacamole, one of the world’s most popular IT infrastructures for remote work. With over 10 million downloads, the free open-source software enables remote workers to access their company’s computer network from anywhere, by using only a web browser. Apache Guacamole software Apache Guacamole runs on many devices, including mobile phones and tablets, giving remote workers ‘constant, world-wide, unfettered acc...
Vistacom, a globally renowned provider of audiovisual and communications solutions, has announced that its annual Tech Expo, which highlights the latest technology innovations from its audiovisual, control room and technology partners, will go virtual with a four-part webinar series designed to highlight the latest AV and technology innovations. Earlier this year, Vistacom canceled the in-person expo owing to the ongoing concerns with the spread of coronavirus (COVID-19), but has decided to off...
Allied Universal, a renowned security and facility services company in North America, announces the availability of distance screening solutions as companies continue to launch their ‘return to workplace' initiatives. Distance screening solutions Allied Universal Technology Services experts are working with customers to design and implement the screening solutions that best fit their company's environment, requirements and existing security operations. The screening solutions include state-of-the-art technology that connects artificial intelligence and human response to better protect people with accurate, real-time data and safer social interaction. The comprehensive suite of distance screening solutions includes: Fixed and Semi-Permanent Thermal Screening Solutions - American-made handheld, fixed and semi-permanent or fully automatic systems that use thermal imaging and data analytics as effective pre-screening solutions. These imagers and smart scan stations help prevent the spread of COVID-19 by detecting elevated body temperature. Robotic Solutions - Robotic distance screening solutions that combine the intelligence and reliability of robots with the personal problem-solving capabilities of humans. The interactive robots perform access control, communications and screening functions with key functionalities that support COVID-19 protocols and social distancing guidelines. Kiosk Screening Solutions - Thermal checkpoint kiosks solutions provide unmatched screening accuracy. The camera and system were designed, calibrated, and lab-tested to address the critical elements that skew temperature readings when deploying a thermal camera in environments typically affected by heat variances from open doors, drafts, heat and A/C ducts. Handheld Thermal Screening Solutions - Handheld imagers are calibrated to target the highest temperate reading on a person's face. Employee safety and risk management "With new and evolving COVID-19 guidelines, organizations in every industry are trying to determine how best to minimize risks and move forward," said Jim Geyer, Vice President of Sales for Allied Universal Technology Services at Allied Universal. Jim adds, "With the right protocols, trained security personnel and technology solutions, organizations will be able to reduce their health risks at their facilities and continue to move their businesses forward."
SecurityHQ, formerly known as Si Consult, the globally renowned provider in managed security services, has announced the launch of their new brand identity with a redesign of their company logo and official website, as part of their rebranding strategy. Managed Security Service Provider Over recent years, SecurityHQ has evolved into one of the most renowned and advanced Managed Security Service Provider (MSSP) in the world, with six Security Operation Centers spread across the United Kingdom, the Middle East, Americas, India, and Australia. The company has received global recognition for SecurityHQ, and became finalists for the IBM Beacon Awards for their security features. Known by their clients, partners, employees, and audience for their services as SecurityHQ, the company has, therefore, made the decision and taken significant steps to represent who they are as a company, by adopting SecurityHQ as their new brand name. Security Intelligence Redefined As part of the rebranding strategy, SecurityHQ also revealed its motto - Security Intelligence Redefined" Feras Tappuni, the Chief Executive Officer (CEO) at SecurityHQ said, "As part of the rebranding strategy, SecurityHQ also revealed its motto - Security Intelligence Redefined. We are delighted with the re-brand, the new logo and website design. These changes represent who we are as an organization, and our position in the managed security service industry.” He adds, "It is important to note that our company values have not altered. We continue to pride ourselves on our transparency, integrity, and availability. There has been no change in staff ownership or shares.” Seamless service provider Feras further stated, “Our services will continue to run seamlessly. All existing contracts, NDA's, and legal elements with partners and clients will remain the same. The only difference is what few people know us for as Si, now many will know us for as SecurityHQ."
ELATEC, a globally renowned manufacturer of innovative multi-frequency RFID readers, will have a new CEO as of July 1, 2020. Robert Helgerth takes over the management of the company and will set the course for the company's growth in the future. In Robert Helgerth, who was most recently responsible for Microsoft's partner business in Asia, ELATEC has gained a visionary manager with great expertize in the strategies, structures and processes of internationally successful corporate management. Enhancing corporate profile The previous CEO, Stefan Haertel, is moving from operational responsibility to a strategic consulting role for product development and acquisitions. Robert Helgerth, who holds a degree in business administration, has written success stories as a managing director of corporations, medium-sized companies and start-ups. A visionary and pragmatist at the same time, Robert Helgerth brings with him an extensive worldwide network through his many years of work in the USA and most recently in China. IT security sector veteran There is hardly any other industry in which you have to be more open to progress and innovation" "There is hardly any other industry in which you have to be more open to progress and innovation. This is why I appreciate the ‘doing’ mentality of medium-sized companies like Elatec: addressing issues, drawing up a joint plan, implementing it decisively and then celebrating success together with our customers," said Robert Helgerth, the new Chief Executive Officer (CEO) of ELATEC GmbH. Robert Helgerth looks back on a successful career in the IT industry, with positions in the management of Microsoft, Compaq Computer GmbH (part of Hewlett Packard (HP) Enterprise), Digital Equipment GmbH and other large IT companies. The starting point of his career was Nixdorf Computer AG. Former Elatec CEO to continue in advisory role The former CEO of ELATEC, Stefan Haertel will remain as a member of the Advisory Board and as the Senior Advisor for Strategy, he will continue to advise the management board on strategic issues. His focus will be on product development, new markets and mergers & acquisitions. "We are very pleased to have found a competent manager in Robert Helgerth, who - with his expertize in the areas of vision, strategy, structure and processes - will steer our company with a sure hand through the new challenges of a changed future," said Stefan Haertel, who will support his successor from his new position with his knowledge and passion for ELATEC.
Videotec is once again showing its ongoing commitment to keeping up to date with worldwide technological innovations with the announcement that most of the company’s products are available as Building Information Models (BIMs), created with BIMscript technology. Building Information Modeling Building Information Modeling (BIM) is a process based on 3D metadata that is full of useful information for the design, planning and integrated management of infrastructure or building projects. In particular, BIM offers huge economic and competitiveness advantages to architects, designers and project managers. Videotec BIM library The new Videotec BIM library has 3D models of the company’s video surveillance products, complete with data such as volume and dimensions, materials, appearance and technical characteristics. These are ready to be imported directly into a project or technical document. The Videotec BIM library is constantly being updated as it is filled with new documents that cover the latest product releases and it can be downloaded from the BIM Object portal.
ISC West 2020, scheduled to take place from October 5th to October 8th 2020 in Las Vegas, Nevada, has been canceled due to industry and market circumstances. While the organizers cannot convene in person in 2020, Reed Exhibitions, along with Premier Sponsor, SIA (Security Industry Association), will transform ISC West 2020 into an all-virtual event that has been scheduled for October 5th to October 7th, 2020 to serve the security and public safety community. ISC West 2020 event canceled During this time of major change and transformation in the U.S., the ISC West community of security integrators, installers, dealers and consultants, along with corporate, government and law enforcement/first responder practitioners, have frontline essential services and mission-critical responsibilities. Amidst travel and budget restrictions, security industry professionals and solution providers are playing a major role in serving regional communities, as businesses are working on re-opening and re-designing facilities in order to ensure public health and safety across all cities and communities. Connecting via digital programs and virtual events We look forward to continuing to help the ISC West community engage via digital programs, resources and connections" “While we are very disappointed to not be able to meet face-to-face this year in Las Vegas, we look forward to continuing to help the ISC West community engage via digital programs, resources and connections. Our team, along with our valued venue partner, Sands Expo and Venetian, is working on detailed planning and protocols for ISC West 2021, which will take place March 23-26, 2021,” said Will Wise, Group Vice President, Reed Exhibitions. Pierre Trapanese, Security Industry Association (SIA) Chairman said, “We at SIA sincerely regret not being able to meet face-to-face in Las Vegas in 2020. We know the importance of ISC West to our community and know that we have a responsibility to our industry to adapt during this period.” ISC West 2020 Virtual Event Pierre adds, “We will continue to provide our members with timely information and resources on an on-going basis. We look forward to producing a great virtual event with the ISC team, anchored by a compelling SIA Education@ISC conference program delivered in a dynamic format in October.” “We will be rolling out additional information on the ISC West 2020 Virtual Event very soon, including formats for education, discussion groups, matchmaking, showcased solutions and technologies, plus elements to celebrate the security community, and support our charity partner Mission 500 and their key role in helping kids and families in crisis,” stated Mary Beth Shaughnessy, Event Director of ISC Security Events. ISC East 2020 event under continuous assessment She adds, “Regarding ISC East 2020, our smaller scale, more regional-focused event slated for November 18th to November 19th, 2020 in New York City, we will be assessing event viability over the next 8-10 weeks with guidance from the Javits Center, New York State and New York City authorities.” Mary further stated, “We will continue to consult with SIA, with the ASIS NYC Chapter, and other Northeast regional association supporters, along with our loyal community of attendees, speakers and exhibitors. Our security community is committed and resilient and we look forward to continuing to rally and adapt with everyone to chart the course forward.”
The U.S. Chemical Safety and Hazard Investigation Board (CSB) has announced issuing a video safety message and a safety alert entitled ‘2020 Hurricane Season: Guidance for Chemical Plants During Extreme Weather Events’. Video and safety alert The video and safety alert highlight recent actions by the Center for Chemical Process Safety (CCPS) to produce industry guidance meant to help hazardous chemical facilities better prepare for extreme weather events. CSB Chairman Katherine Lemos said, “As the nation faces this year’s hurricane season, it is critical that the chemical industry understand and prepare for the potential safety hazards posed by extreme weather events.” Enhancing safety in 2020 Hurricane season On August 31, 2017, fires erupted at the Arkema Chemical Plant in Crosby, Texas, as a result of heavy rain from Hurricane Harvey. Plant equipment flooded and failed causing chemicals stored at the facility to decompose and burn, releasing fumes and smoke into the air. Twenty-one people sought medical attention from reported exposures to the fumes. More than 200 residents living nearby the facility were evacuated and could not return home for a week. ‘Assessment of and Planning for Natural Hazards’ guidance Recently, CCPS released that guidance, called ‘Assessment of and Planning for Natural Hazards’ The CSB’s investigation found a significant lack of industry guidance on planning for flooding or other severe weather events, and called on CCPS to produce such guidance so that incidents like the one at the Arkema plant can be prevented. Recently, CCPS released that guidance, called ‘Assessment of and Planning for Natural Hazards’, which provides an updated approach for assessing natural hazards, means to address the hazards, and emergency planning. CSB safety recommendations implemented Chairman Lemos said “I applaud CCPS for successfully fulfilling the CSB’s safety recommendation. The severe weather event at Arkema may not be an anomaly. In recent years, flooding has intensified across the country and experts predict this trend will continue. The CCPS guidance will help companies prepare for weather events.” The CSB’s Safety Alert outlines specific procedures to assure safe restarts following a severe weather event. For example, facilities are urged to follow established startup procedures and checklists, and to recognize that ‘human performance may be compromised due to crisis conditions’. Adherence to safety protocols Additional safety protocols include checking bulk storage tanks for evidence of floating displacement or damage, and examining insulation systems, sewers, drains, furnace systems, electric motors and other equipment, including warning systems, to make sure they are fully functional.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling increased energy demand. But like nearly every other market today, the oil and gas market is on the brink of a sea change. According to Deloitte’s 2018 outlook on oil and gas, “the digital revolution is here.” The sheer volume of information and data generated by digital devices, such as those associated with the Internet of Things, will allow producers to leverage rich data and combine it to deliver smart, efficient solutions. The rise of digital technologies is unleashing new ideas across the oil and gas industry and even though we are in the beginning stage of being able to harness the power of these types of technologies, innovative ideas are emerging — all designed to support the core business, reduce internal investments, deliver products faster, boost efficiencies, and enhance safety. Maximized Operations And Increased ROI This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand This is welcome news because there are a number of challenges facing the oil and gas industry, from improving reserve replacement and ensuring workplace safety to reducing operating costs and limiting downtime. All of these objectives must be achieved while maximizing operations and increasing overall return on investment. Never has it been more crucial for critical infrastructure organizations to demonstrate a focus on safety, security, and collaboration. Here's why: Growth and demand According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success. Compliance Continuous demand is only one challenge; compliance with industry and government regulations is another significant hurdle that must be maintained or there is risk of production shutdowns. For example, the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS) impose comprehensive federal regulations for high-risk chemical facilities, requiring organizations to conduct vulnerability assessments. This is just one of many regulatory procedures sites must follow to conform to environmental protections, safety precautions, and safe handling of hazardous materials. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success Threat Protection, Mitigation, And Collaboration In addition to meeting the requirements of regulatory procedures, mitigating risk in this industry propels leaders to develop stringent strategies to ensure robust protection of people, property, and assets, effective and efficient response to incidents when they occur, and procedures and protocols to ensure business continuity in emergency situations. Energy providers require comprehensive safety planning and technology systems that can augment the capabilities of on-site and remote personnel. In recent years, video solutions have become the standard for monitoring facilities, assets, and employees, and now these organizations require enterprise-class solutions that can help gather intelligent data that allows for enhanced security and safety efforts but also focus on processes that enhance operational efficiencies. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market IT security is also a concern. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market. An IT breach can cause operational havoc, risk to the public, and damage to an organization’s brand. Adopting a continuous improvement approach to a security strategy safeguards and helps protect valuable company information and reduces the likelihood of an incident. Also, collaboration between IT and physical security leaders and the correlation of both departments' data makes it much easier to identify a potential breach before havoc ensues. The Digital Age With the rise of the digital revolution and the demand for data to improve insight, oil and gas producers and businesses need to find new ways to capture data, correlate it as needed, and then leverage it to make the most informed decisions. Software platforms are being used in a wide variety of applications to provide a single pane-of-glass view that allows operators to gain critical insight into operations. By collecting intelligence from digital sensors, such as video surveillance cameras, open-source Web intelligence, building systems, crowdsourcing, weather sensors, mobile devices, and more, operators can detect potential risks and manage and respond to situations more efficiently. Furthermore, information can be shared easily with multiple agencies, employees, citizens, and first responders — especially valuable in the event of a safety incident where rapid response is paramount. By creating a single enterprise-wide view across disparate systems and technologies, organizations experience improved response times, lowered operational costs, and increased employee safety. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically Traditional Command Centers Intelligent solutions, such as those derived from the idea of artificial intelligence, help organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies within the oil and gas industry, fusing critical data input from emergency calls and responder activity to enhance situational awareness. With traditional command centers relying mostly on call and radio updates, visibility can be limited, but new digital platforms enable operators to oversee a situation and engage with and direct the response force. Overall, these types of automated functions deliver a simplified and modernized operating environment. The Future Is The Intelligent SOC Oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets All of these digital solutions are designed to take center stage within the Intelligent Security Operations Center (ISOC). To combat advanced, multi-stage threats, oil and gas facilities are transforming the traditional SOC into the next-generation unified ISOC with an integrated platform for detection, investigation, communication, and response. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically. Energy providers operate in challenging, fast-moving environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. As the idea of the digital age continues to transform this market, new technologies will be more widely used to improve business operations from exploration and extraction to transportation and distribution. With the right technology, strategic partnerships, and enhanced situational awareness, oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets, while continuing to focus on achieving business goals that will sustain supply and demand for years to come.
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot Detection Solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-Shot Detection Advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimize the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organized manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behavior we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behavior that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behavior is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyze the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behavior provide guidance on professional behavior but are not mandatory. The draft code of conduct builds on the Standards of Behavior. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behavior that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyze the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behavior. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behavior analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioral Analysis. Q: What are the elements of behavior analysis? Torres: They include things like changes in appearance and behavior, including social media behavior, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training should hold people responsible and set standards for acceptable behavior. Training is critical regarding emergency situations in schoolsThere should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioral change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioral indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviors or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organization’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Hikvision and Dahua have been added to a U.S. government list of entities “reasonably believed to be involved, or to pose significant risk of being or becoming involved, in activities contrary to the national security or foreign policy interests of the United States.” In effect, inclusion on the list restricts the export of equipment to the two companies because of their alleged involvement in “human rights violations and abuses” related to a Chinese government campaign of repression, mass arbitrary detention, and high-technology surveillance against minority groups. Hikvision and Dahua have contracts to sell equipment that provides video surveillance capabilities in the Xinjiang Uighur Autonomous Region (XUAR) of China. The minority groups targeted are Uighurs, Kazakhs and other Muslim minorities. Hikvision and Dahua have contracts to sell equipment that provides video surveillance capabilities in the Xinjiang Uighur Autonomous Region of China The decision to add Hikvision and Dahua, among 26 other “entities,” to the list was made by the United States End-User Review Committee (ERC), composed of representatives of the Departments of Commerce, State, Defense, Energy and (where appropriate) Treasury. A majority vote of the panel is required to add an entity to the list, and a unanimous vote is required to remove or modify an entity. The 26 other entities include the Chinese government’s bureau in XUAR, 18 subordinate municipal and county public security bureaus and one other subordinate institute. Specific licenses (government approval) are required for any transaction in which items are exported, reexported, or transferred (in country) to any of the entities on the list; or in which the entities act as purchaser, consignee or end user. Loosely speaking, inclusion on the list prevents Hikvision and/or Dahua from buying any component parts from U.S. manufacturers. Indirectly and more broadly speaking, the measure affords a new downside to the Dahua and Hikvision brands in the U.S. market. Anyone concerned about human rights abuses might hesitate to buy from the two companies, although the entity list does nothing to prohibit sales of the company’s products. Dahua and Hikvision statements In a company statement, Dahua has “express[ed] strong protest to such decision, which lacks any factual basis, and call[ed] on the U.S. government to reconsider on it.”’ Indirectly and more broadly speaking, the measure affords a new downside to the Dahua and Hikvision brands in the U.S. marketThe Dahua statement continues: “As a global business entity, Dahua adheres to the business code of conduct, and follows market rules as well as international rules. Dahua is actively working to ensure our investment and business operations around the world comply with all applicable laws and regulations. Regarding the decision of U.S. government, we have actively taken various measures, and we will continue providing outstanding products and services to our customers.” Hikvision has released the following statement: “Hikvision strongly opposes [the] decision by the U.S. Government and it will hamper efforts by global companies to improve human rights around the world. Hikvision, as the security industry’s global leader, respects human rights and takes our responsibility to protect people in the U.S. and the world seriously. Anyone concerned about human rights abuses might hesitate to buy from the two companies "Hikvision has been engaging with Administration officials over the past 12 months to clarify misunderstandings about the company and address their concerns. In January 2019, Hikvision retained human rights expert and former U.S. Ambassador Pierre-Richard Prosper to advise the company on human rights compliance. Punishing Hikvision, despite these engagements, will deter global companies from communicating with the U.S. Government, hurt Hikvision’s U.S. businesses partners and negatively impact the U.S. economy.” “The U.S. Government and Department of Commerce cannot and will not tolerate the brutal suppression of ethnic minorities within China,” said Secretary of Commerce Wilbur Ross in making the announcement. “This action will ensure that our technologies, fostered in an environment of individual liberty and free enterprise, are not used to repress defenseless minority populations.”
Police in Mexico City have upgraded their critical communications devices to Sepura SC20 and STP9200 models, equipping their officers with modern, powerful TETRA radios. From December 2020, many of the city’s 46,000 officers will benefit from Sepura radios’ famed robustness, outstanding audio quality and reliable performance. A further batch of 3,000 Sepura radios will be provided to the city police teams, ensuring that significant numbers of officers will benefit from the new devices. The radios will be used on a variety of operations across the city, including general police work, customs checks, border patrols and city security. The decision to invest in Sepura radios followed an extensive period of operational testing involving both technical and operational staff, meaning the radios were analyzed from an operational, administrative and business point of view. The tests concluded that the Sepura devices had high audio quality to match their robust design and flexibility. Battery life Operational testers also praised the excellent battery life of both the STP9200 and the SC20, adding that the smart user interface made the main functions quick and easy to perform. The final package delivered by Jomtel, Sepura’s partner in Mexico, delivered a package of support and maintenance with options to further expand the solution where required. Mission-critical operations Following the successful deployment of the initial batch of radios, Jorge Morera, Commercial Director of Jomtel commented: "As Sepura Channel Partner, we are delighted to continue to deliver Sepura’s advanced TETRA products to Mexico. This is the first TETRA radio solution deployed by Mexico City Police, proof of the continuing demand for the proven TETRA technology. We have no doubt that the Sepura radios will expand the capabilities of the Police teams in their mission critical operations.” Tim Mills, Sales Director for South America at Sepura said: “There is significant potential in Mexico to continue to develop the TETRA business for municipalities and other police organizations. We look forward to working with Jomtel to assist further forces to implement Sepura TETRA solutions.”
The Office for Students (OfS) is the independent regulator of higher education in England, responsible for ensuring that all undergraduate and postgraduate students, whatever their backgrounds, have a fulfilling experience of higher education which enriches their lives and careers and delivers value for money. They are headquartered in Bristol, United Kingdom with a workforce of around 450 people. GDPR Data Privacy Management Higher Education Funding Council for England (HEFCE), Office for Students’ predecessor, became a client of SureCloud back in 2017, implementing the GDPR Data Privacy Management Suite to support and enhance their GDPR program. As a new organization and a successor of HEFCE, Office for Students has been looking to mature its approach to risk management. The focus of this for the team was initially to improve risk policies and procedures, to develop internal capability, enhance reporting to show transparency and allow challenge, and to identify and manage risks enterprise-wide systematically. Effective Risk Management approach Office for Students needed a single, seamless, enterprise-wide solution to manage all aspects of risk management These improvements established a highly effective risk management approach, but the organization soon hit the ceiling in terms of their process supporting risk systems, with technology being a limiting factor rather than an enabler. The organization was relying on numerous disparate spreadsheets to assess and monitor different types of risk, these were inconsistent, time-consuming and error-prone. Office for Students needed a single, seamless, enterprise-wide solution to manage and monitor all aspects of risk management. Data privacy Risk Management solution Office for Students has been a SureCloud client for cybersecurity services since March 2017 and began deploying SureCloud’s governance, risk and compliance (GRC) solution in July 2017 to assist with their responsibilities under GDPR. Knowing that SureCloud also offered a comprehensive risk management solution (recognized on Gartner’s IRM Magic Quadrant), which could be tailored to their precise needs, Office for Students opened a conversation with SureCloud about how best to configure their existing SureCloud Data Privacy Risk Management solution to enable enterprise risk management. SureCloud’s Risk Management solution delivers: A central view of risk across the organization via a single intuitive dashboard Risks organized across divisions, legal entities, business functions, and geographies The ability to provide a central repository for enterprise risk, allow the organization to show the entirety of the risk environment and consider overlaps and interdependences A range of risk management methodologies to understand the likelihood, impact and overall risk rating Configurable drillable dashboards and reports to provide a real-time snapshot of risk at any time Centralized, cloud-based platform SureCloud’s centralized, cloud-based platform underpins the Risk Management product SureCloud’s centralized, cloud-based platform underpins the Risk Management product, allowing anyone from across an organization deploying the application to add information at any time, from anywhere. Office for Students worked with SureCloud to configure the Risk Management application to their precise needs and was ready for rollout ahead of schedule. Rapid implementation services “SureCloud got to grips with our requirements incredibly quickly,” said Ben Whitestone, Head of Governance at the Office for Students, adding “As the only independent regulator for higher education in England, we regulate in the interests of hundreds of thousands of students, and we take that responsibility very seriously.” Ben adds, “Managing the risks we face is an important part of our governance. But with our legacy systems, we were focused more on updating spreadsheets than actually managing risk. SureCloud’s platform is enabling us to take a far more agile approach to risk management, focusing on taking action to mitigate threats and exploit opportunities, with substantial time and cost savings as a result.” Streamlined, centralized Risk Management “SureCloud’s Platform has moved us away from using a series of disparate spreadsheets and countless emails for recording risk, with all of the potentials for errors that entails, to a single, centralized source of risk information for every member of staff,” said Whitestone. He further adds, “It’s dynamic and agile, if we want to get a snapshot of risk for a particular department or function, we can.” Intuitive, user-friendly platform We are very pleased with how quickly staff can get to grips with the SureCloud Platform" “Despite us being at the start of our risk management journey, we are very pleased with how quickly staff can get to grips with the SureCloud Platform, this was a key factor for us” commented Whitestone. Whitestone adds, “They can more or less log on and go – it’s extremely intuitive and easy-to-use. In turn, this means that it frees up a huge amount of time spent manually inputting or transferring information, which is a great advantage for us.” Systems and culture working in-sync “We undertook a great deal of work to evolve our culture of risk management, to one that was far more consistent and proactive.” stated Whitestone He adds, “With SureCloud’s Risk Management solution in place, we have the systems to underpin that culture, and enable us to take a far more streamlined, agile and accurate approach to help manage risk across the organization.”
There are over 55,000 electrical substations in the United States. These substations, along with power plants and transmission lines, provide power for millions of people. It is imperative that these locations remain secure from intrusion and sabotage. If just a handful of these substations were rendered inoperable, the U.S. could face a serious blackout. The 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, which knocked out several transformers and totalled over $15 million in damages, was a catalyst for the Federal Energy Regulation Commission (FERC) establishing new security standards for utilities. One of the most notable policies introduced was the Critical Infrastructure Protection Standard 014 (CIP-014). This statute requires utilities to identify ‘mission critical’ facilities and assets, conduct a security inspection to identify threat, and implement a security system to address those risks. Replacing traditional fencing systems VTI Security has been servicing security needs in the commercial, utility, and oil and gas sectors for over 35 yearsIn response to security incidents such as Metcalf and other FERC activities, a large electrical utility with hundreds of substations across the country looked to expand security beyond its fence line. The end user wanted to enhance and possibly replace traditional fence protection systems – including fiber optics, microwave barriers, and video analytics – as these systems all proved to be costly, as well as time and labor intensive. In the end, the utility company relied on VTI Security, an industry-leading integrator, for a recommendation. Based in Burnsville, Minnesota, VTI Security has been servicing security needs in the commercial, utility, and oil and gas sectors for over 35 years. To determine the best system for its end user, VTI reviewed six different technologies, including some with multiple vendors. VTI also tested systems in field deployments and conducted cost analysis. The integrator concluded that SpotterRF’s product was superior to all others and selected it as its sole radar standard for perimeter solutions. SpotterRF perimeter protection solution “Our findings were that SpotterRF not only provided the most comprehensive detection in a substation environment, but SpotterRF was also by far the most cost-effective total solution based on the ability to mount equipment on existing structures,” said Jerry Klapak, Senior Account Manager for VTI Security. SpotterRF provides perimeter protection through its patented Compact Surveillance Radar (CSR) systems SpotterRF, based in Orem, Utah, provides perimeter protection through its patented Compact Surveillance Radar (CSR) systems, which provide up to 300 acres of radar tracking power in a hand held, four-pound device. The CSRs enable security monitors to never be blind, providing 100 percent coverage, 24 hours a day, in all weather conditions. They are designed to detect threats up to 3300 feet beyond the fence line and provide early warnings to staff before situations escalate. PT-Series thermal camera While radar casts a wide circle to detect the presence of potential intruders, the FLIR thermal camera provides visual verification along specific perimeters. Upon selecting a radar system, VTI needed a video manufacturer to supply cameras to deploy with the radar. In 2015, the integrator approached FLIR Systems for a solution and selected PT-Series thermal camera for the project. “The ability for FLIR's products to perform beyond published performance specifications was a surprise we don’t often see,” said Klapak. “Each product exceeded published performance metrics on our field testing and actual deployments.” Features thermal and visible-light imaging SpotterRF radars, combined with FLIR PT-Series cameras, deliver maximum coverage and perimeter protectionThe PT-Series is a pan/tilt camera that features both thermal and visible-light imaging. The pan/tilt mechanism gives end users precise pointing control, fully programmable scan patterns, and both radar slew-to-cue and slew-to-alarm functions. With the radar and thermal technologies selected, VTI worked to ensure seamless integration and performance between the two systems. “We worked with each company’s support and development teams, as well as the VMS manufacturer, to ensure the technologies not only worked with one another, but also met the client’s needs for bandwidth consumption and VMS interface and display,” said Klapak. Together, SpotterRF C20 and C40 radars, combined with FLIR PT-Series cameras, deliver maximum coverage and perimeter protection. Cost-effective solution for substations "The FLIR PT-Series, when deployed with SpotterRF, can cover a wide area of substation footprint. It is a cost-effective solution for substations needing to monitor the perimeter as well as inside the yard," said Michael Chaffee, Director of Business Development at FLIR Systems. “The speed at which the FLIR PT-Series slews to the cue of the SpotterRF detection is impressive." A number of environmental factors affected performance, including weather" When someone walks into the field of view of SpotterRF’s C20 or C40 radar, the radio waves bounce off the person and back to the radar, which then calculates the precise GPS location of the target, as well as its size. The radars then tell the FLIR PT-Series camera to zoom to that location. The camera automatically stays on and tracks the target. Because the radars control the cameras, the cameras only move upon detection, which significantly extends the shelf life of the cameras, allowing them to last for years without replacement. Locates person in a 15 or 100-acre space This FLIR and SpotterRF solution addresses an important pain point for the perimeter security and intrusion detection market. “In the past, utilities tried to use video analytics to find targets. Because these systems were outdoors, a number of environmental factors affected performance, including weather, lighting and moving trees,” said Logan Harris, CEO of SpotterRF. “However, by combining our radar with FLIR’s pan tilt thermal cameras, you’re able to solve this problem.” He added, “Together, SpotterRF’s radar technology and FLIR’s thermal imaging are able to locate a person in a 15 or 100-acre space, see hundreds of yards beyond the fence line, cue the camera, and alert the personnel, all without the help of an operator.” Activates security lighting based on motion One surprising benefit was the ability to use both the thermal cameras and radars for additional security and production uses"In the past, only military organizations could access this level of advanced technology. Now, the FLIR and SpotterRF solution makes this security capability accessible and affordable for critical infrastructure, power distribution and commercial applications. "Our client is very pleased with the ability of the technologies to provide security for their critical sites," said Klapak. "One surprising benefit was the ability to use both the thermal cameras and radars for additional security and production uses. They now use the radars to activate security lighting based on motion within and outside the fences. This provides not only a green approach to security by lowering energy costs but also improves customer relations by reducing light pollution in residential neighborhoods.” The entire team was also impressed by the solution’s minimal installation time. Unlike installing fiber optic cables on fence lines, which requires months for digging trenches, the FLIR PT camera and SpotterRF radar can be mounted easily on control shacks or lattice poles within a week. Four times faster installation of systems “The deployment occurred four times faster than it was anticipated,” said Harris. “VTI installed the systems at 25-30 sites in just three months.” VTI began installation in 2016, with plans to roll out the solution in a phased approach as part of a multi-year plan. Approximately 50-75 sites will deploy the camera and radar solution. On average, each substation has two FLIR PT-Series cameras and four SpotterRF radars. Some of VTI’s other clients are also expected to deploy the same solution at 10-20 sites over the next few years, based on the success VTI has proven in the utility environment.
Crossword Cybersecurity plc, has announced that Stevenage Borough Council, Peterborough City Council and East Hertfordshire District Council (‘the Councils’), will use Rizikon Assurance to manage compliance with the GDPR (General Data Protection Regulation) with their suppliers and for wider information governance. GDPR compliance GDPR makes many requirements of organizations, including taking adequate steps to ensure data is both encrypted and anonymized, so that in the event of a breach, the data cannot be exploited. Infringements under GDPR can lead to fines of €20 million, or 4% of annual global turnover for an organization. Data breaches can be accidental, through the loss of a laptop for example, or as a result of an intentional breach or cyber-attack With a combined residential population of over 430,000, the Councils have a duty to ensure that the personal information of all residents is adequately protected against the risk of data breach, either by the Councils themselves or the third-party suppliers and agencies with which they work. Data breaches can be accidental, through the loss of a laptop for example, or as a result of an intentional breach or cyber-attack. GDPR risk exposure Using Rizikon Assurance, the Councils will improve the process and accuracy of securing third party assurance. This will support compliance with GDPR, and establish a way to manage on-going assurance checks when needed at regular intervals. Additionally, the Councils will be in a position to identify GDPR risk exposure across their supplier portfolio, so that remedial action can be taken to improve the protection of citizen data. Jake Holloway, Director responsible for Rizikon Assurance, commented, “The role of every public service organization is to serve its citizens, often holding personal information about them on many sensitive topics such as health, benefits and education. With that comes the responsibility of ensuring that information is protected, especially when it needs to be shared with partner organizations.” Rizikon Assurance Jake adds, “Rizikon Assurance will help any organization dramatically improve the speed and reliability of its third-party assurance processes, covering areas such as GDPR, health & safety, the Modern Slavery Act and any other requirements that they may have. It moves third party assurance from a siloed and reactive activity, to a connected, proactive continuous process that delivers a complete view of third-party risk.”
Deliveroo, a tech businesses, has chosen AEOS access control by Nedap to protect its staff across the world. Nedap’s UK Expert channel partner, Hunter Group, completed the installation at the first site, in Dubai, and an ambitious rollout will see Hunter install AEOS at around 50 more Deliveroo sites, plus new locations, over the next 12-18 months. Deliveroo was founded in the UK and is proud to export British-born technology around the world. Its ‘Frank’ algorithm is based on powerful predictive technology that evaluates the most efficient way of distributing orders based on the location of restaurants, riders and customers. Future-facing approach With 650% year-on-year growth, Deliveroo’s development has been explosive and the company now has at least 200 offices across 47 countries. Staff security is paramount for Deliveroo and it wanted a global security platform and technology partners capable of keeping up with its expansion. It will be able to manage its global security system from its London headquarters Naturally, Deliveroo is keen to embrace new technologies and innovations too, and wanted to move forward with companies like Nedap and Hunter that have the same future-facing mentality. AEOS will enable Deliveroo to centralize security. It will be able to manage its global security system, and closely monitor staff safety at each location, from its London headquarters. Access control reporting will, for example, show that drivers have arrived safely and CCTV footage will enable offices to be viewed from across the world. Flexibility for each site Some Deliveroo sites are in areas where staff need more robust protection. AEOS gives the flexibility to adapt security settings and solutions according to the site, while still adhering to a central security policy. Deliveroo can, for example, choose which identifiers its staff can use at each site, and can easily change this whenever it chooses to. AEOS also scales easily, both at individual sites and across new locations. So as Deliveroo continues to grow, its security system can too. Over the coming months, AEOS will be installed at Deliveroo sites in London, Paris, Amsterdam and Brussels, with sites in Madrid, Melbourne and Singapore following soon afterwards.
Manufacturer ROCKWOOL International A.S. has chosen Nedap’s Global Client Programme to secure its offices and factories worldwide. AEOS, the physical security platform by Nedap, installed during the program, enables ROCKWOOL to establish a truly global security policy and unified work processes. An advanced project rollout, the Global Client Programme is developed for large multinationals and offers several benefits, including standardization across sites, shorter implementation times and cost efficiencies. Standardizing Company’s Security Measures The Global Client Programme connects all of ROCKWOOL’s factories and office premises, and standardises the company’s security measuresROCKWOOL has 28 factories across the world. The Global Client Programme connects all of these factories and ROCKWOOL’s office premises, and standardizes the company’s security measures throughout the world. Fokko van der Zee, managing director at Nedap Security Management, says: “The implementation of a standardized security solution across the world is a complex process. It involves a large project spanning many years and involving many stakeholders, and demands a high level of project management. In the absence of a structured program with defined guidelines, a global security rollout is likely to be a stressful execution. That’s why we set up our carefully designed Global Client Programme.” ROCKWOOL Digital Service Lead, Matthew Thorne, agrees: “We’ve worked with Nedap over the past few years and recently became a member of their Global Client Programme. Now we’re equipped with the people and tools we needed to standardize our physical security solution. The Global Client Programme also minimizes risk and guarantees compliance. It really meets our needs in every possible way.” Central Security Platform Saves Money The program helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of severalThe Global Client Programme is designed to ensure monitoring and control during every step of the rollout process. Timon Padberg, responsible for business development at Nedap Security Management, explains: “The repetitive nature of local site deployments allows us to work with models and templates, such as standard proposal and calculation documents. We can therefore produce a scalable process that ensures uniformity and a consistently high quality of implementation across each site.” By using the Global Client Programme, ROCKWOOL is aiming for uniformity and alignment across all sites. The program also helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of several. Moreover, there are significant savings on operational and maintenance costs due to shared services and economies of scale.
Round table discussion
A standard is a document that establishes uniform engineering or technical criteria, methods, processes, and/or practices. Standards surround every aspect of our business. For example, the physical security marketplace is impacted by industry standards, national and international standards, quality standards, building codes and even environmental standards, to name just a few. We asked this week’s Expert Panel Roundtable: How have standards changed the security market as we know it?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload