Tavcom Training, the world’s renowned provider of accredited security systems training courses and part of the Linx International Group, has announced that the organization is supporting the Naomi House & Jacksplace hospices by making a donation for every classroom and online course booked. Naomi House & Jacksplace Naomi House & Jacksplace provide expert hospice care to more than 525 life-limited and life-threatened children, young adults and their extended families from the...
As International Security Week (ISWeek), 30 November – 3 December 2020, draws closer, experienced names in the industry are preparing to join together to dissect recent incidents of terrorism and how to combat extremism while protecting national assets. International Security Week The International Security Week marks five years since the shocking series of coordinated terrorist attacks across Paris, France which tragically killed 130 people. Recent incidents in Nice, France and Vienna,...
Utility, Inc., (Utility Associates, Inc.) announced the United States Patent and Trademark Office issuance of patent 10,812,755 for additional BodyWorn camera technology. Patent for BodyWorn cameras The patent covers mounting a BodyWorn camera in a holster that is embedded inside a body armor vest, duty shirt, winter coat or other garment with the camera lens fastened and aligned to provide a clear field of view through an opening in the garment. Embedding the camera within an article of clot...
Acronis, a globally renowned company in cyber protection and data security solutions, has announced an update of its Acronis True Image 2021 that incorporates a professional-grade vulnerability assessment tool into the personal cyber protection solution. Scanning operating systems and applications Individuals and home office users can now scan their operating systems and applications for exploitable vulnerabilities and get recommendations on effectively closing those security gaps. Users can...
IDIS, a global security company that designs, develops, manufactures, and delivers surveillance solutions for a wide range of commercial and public sector markets, is proud to be sponsoring and participating in Canadian Security Association’s Security Canada Virtual Trade Show, slated to be held on December 2nd and 3rd, 2020. Security Canada 2020 Visitors to the Security Canada virtual trade show can learn how IDIS’s flagship plug-and-play DirectIP solution offering can significant...
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment and an ACRE brand, announced that ACRE has acquired Razberi Technologies and the product line will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Intelligent video appliances The Razberi product line of intelligent video appliances, automated security software,...
Boon Edam Inc., a globally renowned provider in security entrances and architectural revolving doors, has announced a new BoonTV event, ‘The Key to Closing the Biggest Gap in Physical Security: Unauthorised Entry’. BoonTV event - webinar In this event, JC Powell, Vice President of Sales at Boon Edam, reveals the assumptions and misconceptions around entrance security in physical security planning and how to effectively bring reliable entrance control to a facility to avoid costly risks and liabilities. Three inputs for controlling access to a facility The BoonTV episode begins by addressing the audience with two fundamental questions: Do homeowners know who is in their building at any given time? How many unauthorized people are acceptable in a facility? Importance of controlling access in premises These two questions set the stage for reinforcing the importance of controlling access These two questions set the stage for reinforcing the importance of controlling access and introducing three inputs for effectively monitoring who is in a building at all times: People, Process and Technology. JC Powell will then provide examples of how organizations must balance all three inputs, and explain how technology (the combination of access control systems, security entrances, biometrics, cameras, etc.) directly alleviates the pressure on both people and process. Scalable Security: three levels of entrance capabilities Next, the episode introduces the concept of ‘Scalable Security’, which helps the security professional select the right entrance type for each area of their building, based on the entrance's true capabilities related to tailgating mitigation - Deter, Detect, or Prevent. The true capability of an entrance will have a direct impact to the inputs of physical security, the People, Process and adjacent Technologies. Real-life case studies are shared that reveal the mistakes organizations have made before landing on the best entrance solution for their true needs. The future of the entry post COVID-19 The webinar concludes with a short discussion around the impacts of the current pandemic. JC Powell will share how he sees the future of the entry based on his discussions with industry consultants, integrators and end users, including discussions around touchless entry, thermal cameras and antimicrobial finishes and films.
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enhances the ability for these organizations to protect lives and property in remote locations and in the city centers - equally. This includes critical infrastructure from dams and power plants to oil refineries and transportation systems. Advanced video analytics The full solution leveraging BriefCam provides advanced video analytics, including near real-time and forensic video analysis, and trends in data through dashboard visualization, enabling rapid acceleration of video investigations. “Leveraging its renowned network, Verizon is creating a best-in-class solution to enable the protection of all facilities in a community whether in the city center or on the edge of town,” said Gili Rom, Vice President of Strategic Initiatives, BriefCam. Gili adds, “Bringing together Verizon’s wireless infrastructure with our advanced video analytics and other industry leading technologies allows security professionals to remotely optimize situational awareness while reducing time and resource investments.” Leveraging robust analytics software The solution was built to provide advanced analytics and benefits for an improved experience Verizon Intelligent Video leveraging BriefCam’s robust analytics software offers a comprehensive, bundled video management solution for cloud or wireless access that includes software licensing, installation, administration, training, and support. The solution was built to provide advanced analytics and benefits for an improved experience. BriefCam delivers the ability to monitor and analyze multiple sites remotely from a single interface and the insights needed to fully prevent or investigate and resolve issues. Automated video analysis Verizon Intelligent Video automates video analysis with an easy-to-use interface so that users can quickly drill down, and filter objects based on a wide range of object classifications, attributes, and behaviors. This accelerates investigations and helps users attain situational awareness sooner, to derive operational intelligence from video. The powerful solution makes it possible to do more with fewer monitoring, intelligence, and investigative resources.
Invixium, a globally renowned manufacturer of innovative touchless biometric solutions, is opening its new Middle East headquarters in Dubai, United Arab Emirates that will serve the Middle East, Turkey, North Africa and Pakistan regions. The new MENA headquarters has been established to best respond to the growing interest in Invixium's health-focused, temperature-based workforce management and access control biometric solutions that are in high demand as businesses reopen during COVID-19 pandemic spread. MENA headquarters Invixium's new office is centrally located in Dubai Internet City, which is regarded as the innovation and technology hub of the region and where Microsoft, HP, IBM, Vodafone, 3M and other tech-centric companies maintain a presence. To launch this expansion, Invixium also announces the hiring of Wisam Yaghmour as the Senior Director of Sales, MENA. Yaghmour joins Invixium after five years at HID Global, where he oversaw operations at the MEA corporate office and served as the lead for all sales activities in the region. He brings a solid track record in developing new markets, partnering with key strategic customers and expanding product distribution bases. New appointment to help meet security challenges "As Invixium continues to develop solutions that resolve continually emerging security challenges, we're focused on ensuring we have the best position to support our growing customer base," said Shiraz Kapadia, Chief Executive Officer (CEO) and President of Invixium. Shiraz adds, "Our new MENA headquarters in the technology epicenter of the region and the addition of a highly experienced sales expert who understands the nuances of this market allow us to continue our trajectory of innovation." Biometrics and access control solutions expert I was drawn to join Invixium because of their impressive advancements in biometrics" "I was drawn to join Invixium because of their impressive advancements in biometrics that deliver the perfect blend of access control, visitor screening and workforce management," said Wisam Yaghmour. Wisam adds, "I am excited to expand Invixium's presence in MENA, where new and existing customers can greatly benefit from the high level of confidence and security that these innovative solutions provide." IXM TITAN with Enhancement Kit Expansion into MENA supports Invixium's recent product launches and updates. IXM TITAN with Enhancement Kit continues to be well-received worldwide as businesses strategize healthy reopening plans. The solution now pairs with the licensed software feature, IXM Health, to report on staff and visitor health through temperature screening measured at the medial canthus (tear duct). Further, IXM TITAN now allows for mask detection and face recognition while wearing a mask to enable businesses to safely reopen and follow government mandates for masks or face coverings to be worn in public spaces.
Smarter Security, uniquely differentiated and recognized as a global provider of intelligent entry and access control solutions, proudly welcomes a new member to its continuously expanding team. Kevin Kolego was recently announced Director of Federal Solutions Sales to drive sales initiatives within the Federal Government space. Kevin brings a tremendous amount of leadership and sales expertise, as well as vast knowledge and understanding of the US Government’s procurement process including contracting, acquisitions, program management, procurement, and test and evaluation. Appointment to drive sales and awareness As Director of Federal Solutions Sales, Kevin Kolego will work with customers to continue driving awareness, conviction, conversion, and new business. He will also advance sales through integrators partnered with Smarter’s business partners and end users, gaining knowledge and understanding of product needs within the Federal Government vertical. “Kevin is a tremendous addition to the Smarter Security team. He is extremely well-qualified to help our Federal customers elevate their security posture with the Smarter Security Platform. It is the only COTS solution that can proactively combat Insider Threats, which to date has been a significant challenge,” states Jeff Brown, Chief Executive Officer (CEO) of Smarter Security. Deep experience with mission critical technologies Threats are complex and dynamic, yet other solutions are static and unable to comprehend contextual data" Jeff adds, “Threats are complex and dynamic, yet other solutions are static and unable to comprehend contextual data. Kevin’s deep experience with mission critical technologies in the Government will impact both our national security and our company’s success.” Kevin joins Smarter Security from Stanley Black & Decker and has previous experience in the security industry with Dormakaba, formerly a part of Stanley Security. Prior to Dormakaba, Kevin graduated from and received his commission from the United States Naval Academy in Annapolis, MD. Security services and US Navy veteran He served as a Lieutenant Commander in the United States Navy (USN), and received his Master’s degree in Business from Old Dominion University in 2004. Kevin went on to serve various roles for the Navy, including 2 overseas tours and 4 deployments around the globe supporting Navy’s Special Forces/SEAL teams as an Officer-in Charge and Liaison Officer. Following his 20 years of service in the United States Navy, Kevin served as a Government Civilian for the U.S. Army Test and Evaluation Command and was a member of the U.S. Army Acquisition Corps, serving as the Director of C4ISR.
Smarter Security, a globally renowned provider of intelligent entry and access control solutions, is proud to announce a new addition to the sales team. Hardware and software expert Dan Gardner joins as the company’s Southeast Regional Manager to enhance the growth and development of opportunities within the region. Gardner brings with him exceptional sales experience within both the hardware and software aspects of the security industry. “Dan is a welcome addition to our elite team of Regional Sales Managers. As a trusted advisor to integrators, consultants and end-users, his efforts selling Fastlane, Door Detective and our Building Solutions will make a big impact on our company’s success in the Southeastern U.S.,” states Jeff Brown, Chief Executive Officer of Smarter Security. Telecommunications and internet solutions veteran Before joining Smarter Security, Dan gained valuable experience working for AT&T, where he sold telecommunications and internet solutions. From there, he managed customer accounts as Account Executive for datacomm distributor, Accu-Tech, where he advanced into team lead for their Security vertical’s inside team. Dan’s extensive experience as Southeast Territory Manager for Alvarado Manufacturing focused on turnstile opportunities, where he rapidly expanded business development within the region. Dan graduated from the University of Pittsburgh, earning a Bachelor of Science in Psychology.
PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of ProActive Data Storage and Monitoring Inc. to its Managed Security Service Provider Program (MSSP). ProActive offers both local and cloud video storage through its patented file reduction solution for surveillance video storage, along with system health monitoring. Affordable video solutions “ProActive is a renowned video monitoring and storage manufacturer,” said Tim Brooks, Vice President of Sales and Vendor Management for PSA, adding “The ProActive team has developed robust and affordable video solutions, providing back-up for critical surveillance data. We are very pleased to add ProActive to our lineup of products.” ProActive is committed to creating affordable video solutions for the entire marketplace, by turning video files into small compressed data files. This compression reduces the amount of hard drives, cloud storage space and upload bandwidth needed to store the videos, resulting in lower video storage costs for customers. System health monitoring Health monitoring feature provided by ProActive pushes notifications to alert the user if their video system is down The health monitoring feature provided by ProActive pushes notifications to alert the user if their video system is down, reducing the chance of losing saved video files. “We are extremely excited about our new partnership with PSA,” said Thomas Maggio, the Chief Executive Officer (CEO) of ProActive, adding “This partnership will help bring our patented technology offering to some of the premier systems integrators in our industry, allowing them to offer a solution for their clients to back-up their important surveillance data.” Cost-efficient cloud storage and data back up By offering affordable cloud storage and health monitoring as a managed solution, integrators possess the ability to create greater customer retention and provide diverse products and services to their end users. PSA’s MSSP program hinges on uniting industry-renowned partners in cyber security and cloud-based security solutions, offering training and certification opportunities and financing options with assistance from PSA.
We are slowly returning to normal after the COVID-19 pandemic that has swept the world. The journey to normality is going to see a large number of changes, and the physical security arena is set to be front and center in both implementing changes to keep the rest of the organization safe and within their own policies and procedures. Our return to work journey can be broken down into a number of areas for consideration. This is by no means an exhaustive list but will highlight the areas in which a security team can offer valuable insight and direction, and also some areas that end users may wish to consider as security leaders. Processes and procedures Employees returning to a site is going to be a major step for any organization, and this is where security leaders are going to be called upon to help. In these times of enforced social distancing, lockdown procedures, deep cleaning and personnel interaction protocols, each COVID protection program has a process to follow and this is the first place a security operations team may lend their experience. Physical security is built upon and relies on procedures and processes that must be strictly followed to be successful. These processes may be translated into the wider organization to help minimize confusion as the site becomes more populated. It is also a good time to review your own policies and procedures to ensure that they are adapted to meet the needs of the organization as people return to work. It is likely that you will have to increase the number of patrols or guards at access points, and you may have a new investigative process to consider for track-and-trace requirements, should there be a positive COVID-19 result. Monitoring The Security Operation Center (SOC) is likely to become an even more important part of the day-to-day operations on site. It acts as the centralized point for monitoring and incident management and may be subject to greater strain, incidents and demands than before. Ensuring that your SOC is suitable and equipped to handle these operations is key. While you may not have enough security staff to actively monitor your entire camera estate, video analytics provide a key ally. Many VMS manufacturers have simple video analytics built into their software, but there are specific tools available to help detect infractions around social distancing: people counting in a specific area to avoid over-crowding and a de facto fail on the social distancing measures; mask or PPE wear detection to ensure that people are appropriately dressed for their own protection; and people movement monitoring makes sure your employees aren’t bypassing the one-way system that you’ve implemented. An alert can be set up to identify when employees get within 6 feet of each other A particularly useful technique here is object distancing, where an alert can be set up to identify when employees get within 6 feet of each other for an extended period of time, aiding you in social distancing requirements. A second is built on wrong direction monitoring and will ensure that the one-way systems you create are being followed by staff and public alike as the analytic is capable of determining direction of travel for a pedestrian. A more advanced analytic may be the detection of PPE and ensuring that staff are wearing the appropriate masks and protective gear, although this is relatively dependent on strong camera positions and ensuring that the field of view is appropriately configured. There are a number of options to integrate with your access control systems, both physical and technology based. Thermal cameras and temperature probes may be used at entry points to ensure that anyone with a fever isn’t admitted to a location (although be careful when selecting a thermal camera and do thorough research on the temperature variation that it is able to detect). Human-to-human interaction Your physical security team is often the first human point of contact for your employees and often the most important. It may be necessary to increase your patrol and guard workforce temporarily to ensure that all entrances are covered and that entry procedures are tightened up or enhanced. I am confident that employees won’t mind an extra minute or two at the entrance for the improvement in their own health and wellbeing. If you do have an incident, perhaps where an employee is felt to be breaking the rules by not distancing appropriately, or ignoring mandated procedures, then your guard and patrol teams become vital peacekeepers in defusing and de-escalating the incident. Those same team members should also be trained in incident control and investigation, and with a well configured security environment (surveillance, electronic access control, personnel checks, etc.), they should form the basis of the track and tracing process of all staff that were on site and in contact with an infected employee should the worst happen and you have a positive COVID test returned. Protecting your security personnel Physical security operations team should be fully equipped with appropriate PPE This leads to my final point: your physical security operations team should be fully equipped with appropriate PPE, both while on patrol and in the SOC. Installing plexiglass panels between monitoring stations and spacing the monitoring stations appropriately should be the minimum first step. If your team is large enough, implementing a split A and B team is another possibility, with no interaction or risk of cross contamination between the teams, and a deep cleaning of the SOC and each guard station at the end of every shift. This ensures that you’ve covered at least 50% of your personnel in case of a COVID-positive event to keep operations moving, but also helps to create a contained working environment for this critical security function. If you have the space and the equipment, creating a secondary SOC, or engaging a remote GSOC (Global SOC) provider will improve your monitoring capabilities (GSOC companies are usually equipped with the latest video monitoring technologies) and reduce the risk of cross contamination. As you’ve read, there are many ways in which your physical security operations team can aid you in a successful return to work, playing a vital function in monitoring, managing and interceding in your organization. One final note: thank you to those front-line personnel for their tireless efforts in keeping us safe and healthy.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling increased energy demand. But like nearly every other market today, the oil and gas market is on the brink of a sea change. According to Deloitte’s 2018 outlook on oil and gas, “the digital revolution is here.” The sheer volume of information and data generated by digital devices, such as those associated with the Internet of Things, will allow producers to leverage rich data and combine it to deliver smart, efficient solutions. The rise of digital technologies is unleashing new ideas across the oil and gas industry and even though we are in the beginning stage of being able to harness the power of these types of technologies, innovative ideas are emerging — all designed to support the core business, reduce internal investments, deliver products faster, boost efficiencies, and enhance safety. Maximized Operations And Increased ROI This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand This is welcome news because there are a number of challenges facing the oil and gas industry, from improving reserve replacement and ensuring workplace safety to reducing operating costs and limiting downtime. All of these objectives must be achieved while maximizing operations and increasing overall return on investment. Never has it been more crucial for critical infrastructure organizations to demonstrate a focus on safety, security, and collaboration. Here's why: Growth and demand According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success. Compliance Continuous demand is only one challenge; compliance with industry and government regulations is another significant hurdle that must be maintained or there is risk of production shutdowns. For example, the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS) impose comprehensive federal regulations for high-risk chemical facilities, requiring organizations to conduct vulnerability assessments. This is just one of many regulatory procedures sites must follow to conform to environmental protections, safety precautions, and safe handling of hazardous materials. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success Threat Protection, Mitigation, And Collaboration In addition to meeting the requirements of regulatory procedures, mitigating risk in this industry propels leaders to develop stringent strategies to ensure robust protection of people, property, and assets, effective and efficient response to incidents when they occur, and procedures and protocols to ensure business continuity in emergency situations. Energy providers require comprehensive safety planning and technology systems that can augment the capabilities of on-site and remote personnel. In recent years, video solutions have become the standard for monitoring facilities, assets, and employees, and now these organizations require enterprise-class solutions that can help gather intelligent data that allows for enhanced security and safety efforts but also focus on processes that enhance operational efficiencies. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market IT security is also a concern. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market. An IT breach can cause operational havoc, risk to the public, and damage to an organization’s brand. Adopting a continuous improvement approach to a security strategy safeguards and helps protect valuable company information and reduces the likelihood of an incident. Also, collaboration between IT and physical security leaders and the correlation of both departments' data makes it much easier to identify a potential breach before havoc ensues. The Digital Age With the rise of the digital revolution and the demand for data to improve insight, oil and gas producers and businesses need to find new ways to capture data, correlate it as needed, and then leverage it to make the most informed decisions. Software platforms are being used in a wide variety of applications to provide a single pane-of-glass view that allows operators to gain critical insight into operations. By collecting intelligence from digital sensors, such as video surveillance cameras, open-source Web intelligence, building systems, crowdsourcing, weather sensors, mobile devices, and more, operators can detect potential risks and manage and respond to situations more efficiently. Furthermore, information can be shared easily with multiple agencies, employees, citizens, and first responders — especially valuable in the event of a safety incident where rapid response is paramount. By creating a single enterprise-wide view across disparate systems and technologies, organizations experience improved response times, lowered operational costs, and increased employee safety. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically Traditional Command Centers Intelligent solutions, such as those derived from the idea of artificial intelligence, help organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies within the oil and gas industry, fusing critical data input from emergency calls and responder activity to enhance situational awareness. With traditional command centers relying mostly on call and radio updates, visibility can be limited, but new digital platforms enable operators to oversee a situation and engage with and direct the response force. Overall, these types of automated functions deliver a simplified and modernized operating environment. The Future Is The Intelligent SOC Oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets All of these digital solutions are designed to take center stage within the Intelligent Security Operations Center (ISOC). To combat advanced, multi-stage threats, oil and gas facilities are transforming the traditional SOC into the next-generation unified ISOC with an integrated platform for detection, investigation, communication, and response. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically. Energy providers operate in challenging, fast-moving environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. As the idea of the digital age continues to transform this market, new technologies will be more widely used to improve business operations from exploration and extraction to transportation and distribution. With the right technology, strategic partnerships, and enhanced situational awareness, oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets, while continuing to focus on achieving business goals that will sustain supply and demand for years to come.
Historically, concerns about inclusion and diversity have not been widely discussed in the security market. In the last couple of years, however, the Security Industry Association (SIA) and other groups have worked to raise awareness around issues of diversity and inclusion. Specifically, SIA’s Women in Security Forum has focused on the growing role of women in all aspects of security, and SIA’s RISE community has focused on “rising stars” in an industry previously dominated by Baby Boomers. The next generation of security leaders There is a business case to be made for diversity and inclusion, says a report by McKinsey & Company. According to the management consulting company, gender-diverse companies are 24% more likely to outperform less diverse companies, and ethnically diverse companies are 33% more likely to outperform their less diverse counterparts. Furthermore, the “next generation of security leaders” – employees under 30 – are particularly focused on diversity and inclusion. Diversity refers to the traits and characteristics that make people unique A panel discussion at ISC West’s Virtual Event highlighted aspects of inclusion and diversity, starting with a definition of each. Diversity refers to the traits and characteristics that make people unique. On the other hand, inclusion refers to the behavior and social norms that ensure people feel welcome. “We are all on a journey, and our journey takes different paths,” said Willem Ryan of AlertEnterprise, one of the SIA panelists. “There are opportunities to improve over time. We can all change and increase our ability to have a positive impact.” Industry responsibility The industry has a responsibility to the next generation of industry leaders to address issues of inclusion and diversity. Forbes magazine says that millennials are more engaged at work when they believe their company fosters an inclusive culture. So the question becomes: How do we unify and create opportunities to work with and champion tomorrow’s leaders? SIA is driving change in our industry to achieve that goal. More women are active in SIA than ever before. The SIA Women in Security Forum now has 520 members, said Maureen Carlo of BCD International, the SIA Women in Security Forum Chair and another panelist. Also, more women than ever are chairing SIA committees and serving on the SIA Board of Directors. More women than ever are chairing SIA committees Overcoming unconscious bias Former SIA Chairman Scott Shafer of SMS Advisors, another of the panelists, noted that SIA awarded the Chairman’s Award to the Women in Security Forum in 2019, and to the RISE community steering committee in 2020. “There are lots of ways we are seeing the elevation of women and ethnic groups in the security industry,” said Shafer. One topic of interest is the problem of “unconscious bias,” which can be overcome by looking at something through some else’s lens. Ryan suggested use of the acronym SELF – Slow Down, Empathize, Learn, and Find commonalities. Ryan recalled the value of being mentored and having someone shepherd him around the industry. “Now I want to give back,” he said. “We need to look at the things we can change in ourselves, in our company, in our communities, and in our industry. Change comes from the bottom and the top.” Increasing representation “It takes all of us to increase representation everywhere,” said Kasia Hanson of Intel Corp., another panelist. “We have in common that we are all human beings. Let’s make sure the next generation all have opportunities.” Diverse companies can attract better talent Moving forward, the panelists urged the industry to get involved and create opportunities because inclusion drives diversity. Diverse companies can attract better talent and attain a competitive advantage. Awareness of unconscious bias, and working to eliminate it, is an important element of change. Despite the progress the security industry is making, change continues to be incremental. As Ruth Bader Ginsburg has said, “Real change, enduring change, happens one step at a time.”
Ethics are an important – but some might argue, undervalued – aspect of the security marketplace. To kindle the industry’s interest in ethics, the Security Industry Association (SIA) in early 2019 created a working group on Ethics in Security Technology. The working group developed a list of ethical principles, which were approved by the organization’s Executive Committee and Board of Directors and became the SIA Membership Code of Ethics. SIA member companies must adhere to the Code of Ethics, and there are consequences of noncompliance, up to and including possible expulsion from the organization. In addition to adopting the Code of Ethics, the Board of Directors have revised the organization’s bylaws to require that members read, understand and adhere to the Code of Ethics as a condition of SIA membership. Navigating issues “SIA wanted to be proactive on this and give members resources to navigate day-to-day issues,” said Ron Hawkins, SIA Director of Industry Relations. He notes that the Code is intentionally written broadly to be applied to a range in cases, and to provide SIA leaders with latitude making decisions. Current members will be required to adhere to the code when they renew their membership Current members will be required to adhere to the code when they renew their membership, which will be sometime during 2020 or in the first half of 2021, depending on when a member joined (for a one-year term). If there is an ethics-related complaint or an issue with a member company, the matter is considered by SIA leadership, which will review the concerns and ask the member company to respond. The resulting judgment might be a written notice/warning, a suspension of membership or expulsion. Enforcement of the Code of Ethics might be triggered by media coverage, government announcements, or written complaints submitted to the SIA Executive Committee. Handling complaints Hawkins emphasises that each complaint will be handled by the Executive Committee and full Board of Directors on a case-by-case basis to address anything not specified in the principles, which focus on requirements rather than consequences. Hawkins says it would be unlikely that any public announcement would be made about enforcement of the Code unless or until a member company were expelled. Since the Code of Ethics took effect on July 1, 2020, SIA has not taken any action on any member company. Any issue with any current member would be addressed on their membership renewal date, Hawkins said. The code applies to all SIA member companies, both manufacturer companies (which make up more than half of the membership) as well as to integrators, service providers, distributors and other member companies. Act with honesty, integrity and transparency Among the principles in the Code of Ethics are requirements to act with honesty, integrity and transparency, and to avoid fraudulent or misleading business practices. Marketing materials must be accurate. Sustainability and environmental impacts of products and services must be considered. The Code also opposes prejudice, harassment and abuse in the workplace The Code also opposes prejudice, harassment and abuse in the workplace. SIA companies should work with law enforcement to enhance public safety while respecting expectations of privacy. Cybersecurity risks should be monitored and mitigated “as much as reasonably possible, according to industry best practices.” Products, services and solutions should not be designed or manufactured in a manner as to “surreptitiously transmit information to third parties.” Finally, the principles require SIA member companies not to “knowingly” design, manufacture, sell or deploy products that have been deemed by any government authority or self-regulatory entity to “support the infliction of human rights abuses, the restrictions of civil liberties, and/or the implementation of other oppressive measures.” Hawkins says that the interpretation of “knowingly” would be made by SIA leaders. Why does the industry need The Code of Ethics? He would not comment on whether the Code of Ethics applies to activities by global companies that do not involve that company’s U.S. subsidiary (which is a SIA member). Such details would be decided on a case-by-case basis by the SIA Board of Directors, he said. The Code of Ethics is needed in part because the security industry impacts important issues for society at large, from privacy to civil liberties to national security. The Code of Ethics is needed in part because the security industry impacts important issues for society “Everywhere you go, you encounter security technologies, such as video cameras in public places,” says Hawkins. “Even if someone is not a purchaser or user of security technology, they will encounter it every day. So security is in a unique position because of its reach beyond the people who buy and use it, and it requires consideration of issues such as civil liberties and privacy.” Hawkins notes that the SIA Board of Directors already has its own “Code of Ethics” which directs how board members perform their duties, such as abstaining from a decision that might involve a competitor.
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behavior we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behavior that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behavior is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyze the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behavior provide guidance on professional behavior but are not mandatory. The draft code of conduct builds on the Standards of Behavior. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behavior that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyze the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
IDEMIA, the globally renowned company in Augmented Identity, moved to its new headquarters in September 2018, in an 11-floor building located in La Défense business district, in Paris, France. The building brings together 1,300 employees out of total worldwide staff strength of close to 15,000 people. Biometric access control Due to the sensitive nature of its activities in this building, and given its position on the biometrics market, IDEMIA decided to deploy biometric access control throughout the entire building, a first in this business district and a fantastic opportunity to showcase IDEMIA’s flagship products in real life. Most employees get to the office via nearby metro and tram stations, and therefore, arrive within the same 30-minute window. This creates the need for a high throughput access control solution, for entrance and exit peak-times. Access to the six elevators serving the eleven floors is given after a first control at speed gates in the lobby area. MorphoWave Compact devices deployed IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates. MorphoWave Compact devices were mounted on a special stylish stainless steel pedestal. Four dFlow lanes were installed, with readers for entry and exit. MorphoWave Compact is IDEMIA’s flagship biometric device for physical access control. It performs a 3D scan and verification of four fingerprints in less than one second, in a quick and easy touchless ‘wave’ gesture within the reader. dFlow speedgates These features make the product particularly well-suited for such high-traffic locations, with the capability to authenticate up to 50 people per minute, thanks to advanced algorithms based on Artificial Intelligence. With dFlow speedgates, Digicon introduces a new vision for access control gates, one with continuous flows and normally open doors. dFlow enables free flow, ushering new levels of comfort and security. Frictionless biometric solution The installation is highly acclaimed by employees who appreciate the frictionless use of MorphoWave Compact and its natural ‘wave’ hand gesture, as well as Digicon’s ‘always open’ dFlow concept, that enables them to get to the elevators in only a few seconds. Of course, IDEMIA was well-placed for this biometric employee access control deployment, being the provider of MorphoWave Compact. The employees were immediately convinced by the frictionless and hygienic experience it offered them. The team in charge of the security of the building found the MorphoWave Compact and dFlow combination more secure and less intrusive than other access control systems. Most importantly, what is true for a company like IDEMIA will also be true for any company in need of a high level of security delivered in a frictionless and convenient way, especially in high-traffic locations like in an HQ lobby.
ZeroEyes, the only AI-based platform focused solely on weapons detection, has been selected by the Kenosha Unified School District (KUSD) of Wisconsin to help improve security on its campuses. ZeroEyes proprietary solution ZeroEyes’ proprietary solution will identify visible guns if present and send alerts to school administrators and security personnel within three to five seconds, helping to stop violent threats before they occur. KUSD is the third-largest school district in Wisconsin, with over 21,000 students and 4,200 employees in 23 elementary schools, five middle schools, five high schools and five charter schools. Integration with IP security cameras ZeroEyes currently integrates with KUSD’s IP security cameras to help detect visible weapons and serve as a proactive measure to prevent any violent threats on campus. When ZeroEyes positively detects a weapon, the platform sends a notification to school administrators, school resource officers and local 911 dispatch, ensuring the school can enact security protocols and give first responders real-time information to help prevent active shooting tragedies and save lives. Enhancing staff and students’ security “It’s a grim reality that active shootings happen in schools across the country, and we’ve needed to understand and implement the solutions that can keep our students, staff and visitors safe,” said Kevin Christoun, Maintenance, Environmental and Safety Manager at KUSD. Kevin adds, “At KUSD, we have a multi-layered security approach that includes the most effective and innovative technologies and resources, and ZeroEyes’ platform clearly supports our strategy.” Weapons detection solution ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection Founded by a group of former Navy SEALs and military veterans, ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection, to actively monitor and detect for visible weapons. ZeroEyes also trains and collaborates with customers and local first responders to conduct extensive pilots before its solution is fully implemented. In the future, KUSD plans to roll out additional installations to remaining schools in the district. Effectively countering active shooting incidents “ZeroEyes was founded upon the realization that a proactive solution was needed to help keep people safe, with real-time information to adequately address violent threats and prevent mass shooting tragedies,” said Dustin Brooks, Vice President of Education at ZeroEyes. Dustin adds, “KUSD focuses on providing a safe and productive learning environment to its students and faculty, and we’re honored to provide a 24/7 solution that supports their goals.”
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based solution, but also offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. API Integration In addition to DCLT’s security requirement, OLS also realized ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. Game-changer security solution According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. Cloud-based off-premise solution The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively. Commenting on the project, Oliver (Ollie) Law, Managing Director of Oliver Law Security (OLS) Ltd., stated “We didn’t hesitate to recommend the Vanderbilt ACT365 system. As a Vanderbilt Gold Integration Partner, this is our go-to product, and for Doncaster Culture and Leisure Trust, the flexibility and scalability of the product was best placed to grow with their business.” He adds, “We are fully committed to working and growing with Vanderbilt, and we look forward to other projects of this nature in the future.”
Almabani General Contractors has a long robust history which began when the founders established the company in Jeddah, Saudi Arabia, in October of 1972. They are a family-owned company that remains true to its founders’ spirit, covenants, innovation and perseverance. Almabani General Contractors For four and a half decades, Almabani have been building up their expertise to serve an ever more demanding and challenging construction need in the region. In a prosperous economy fueled by the oil boom, the company was positioned to participate in the execution of some of the most prestigious landmark projects in the Kingdom of Saudi Arabia. They have the highest classification in all civil and electrical works with in-house capabilities to develop design and value engineer solutions to cater to the customers’ needs. They have proudly executed projects from complex infrastructure works to heavy civil engineering structures. Engaged in highly competitive turnkey projects The company is engaged in highly competitive turnkey projects worth several billion dollars The company is engaged in highly competitive turnkey projects worth several billion dollars. To this end, Almabani continues to invest in quality, value engineering, proactive and talented people, endeavoring at all times to satisfy their customer’s expectations and to best serve the welfare of the society. Replacing decentralized access control systems Almabani General Contractors was using traditional decentralized access control & time-attendance systems in which they were facing the issue of excessive manual work and inaccurate data. Because of the poor quality of the existing biometric sensors, user fingerprints weren't recognized in the first attempt and the process was annoying and time-consuming. As the company is dealing with construction work, one of the major challenges for construction workers is accurate attendance marking despite dirty/stained fingers. Moreover, due to existing software limitations, many policies of access control and time-attendance couldn’t be implemented. As the existing system was decentralized, on-field employees faced issues while marking their attendance. Only basic reports could be prepared for attendance and access whereas they needed more customized reports because of various shifts and different contract workers. Moreover, third party integration was not possible in the earlier system. And last, but not the least, they were unsatisfied with support from the past supplier. Matrix access control and time-attendance solution Matrix solutions experts collaborated with the decision heads to understand the exact requirement and provide a cost-effective solution. After a comprehensive discussion, Matrix offered a centralized solution for all the locations. With the Matrix time-attendance and access control solution, the customer has overcome all the challenges. Now, it's possible for them to get control of all the locations from a single central location. Multispectral fingerprint sensor technology To stop inaccurate attendance marking, Matrix offered multispectral fingerprint sensor technology To overcome the problem of inaccurate attendance marking due to dirty/stained fingers, Matrix provided the multispectral fingerprint sensor technology which contains information about both the surface and the subsurface features of the skin. This technology gives a high throughput. They also acquired Palm Vein Reader for contactless authentication verification for the higher authorities. The solution from Matrix is fully customized with multiple shifts and attendance policies that can be applied to individual users. The smart mobile application for attendance marking and leave applications facilitate easy operation for users. Now, the customer is able to get the report of each employee with 200 different options. Auto-push technology With the auto-push technology, there is no need to transfer the data into the server. The data is automatically transferred to the server in real-time. The customer also got flexibility in terms of connectivity with 3G and WiFi options. The system from Matrix also provided the flexibility for easy integration with the third-party payroll system. Result: Accuracy in attendance management Centralized time-attendance and access control management High possibility of third-party integration User-friendly and fast process because of good quality sensor OEM support Contactless and advanced technology Flexibility in terms of integration, connectivity and credentials Products Offered: COSEC DOOR PVR – Palm Vein based Door Controller COSEC PATH DCFE – Biometric Fingerprint + RFID based Door Controller COSEC PATH DCCE – RFID based Door Controller COSEC PANEL LITE – Site Controller for Advanced Access Control Features COSEC LE PLATFORM – For 1500 + Users COSEC LE TAM – Time-Attendance Application Module COSEC LE ACM – Access Control Module COSEC LE ESS – Employees Self Service Module (Mobile App) COSEC INTEGRATION - Integration with In-house Payroll Software
Redlands Unified School District, located in San Bernardino Country, California, hosts more than 21,000 students across its 16 elementary schools, four middle schools and four high schools. School security is paramount for the district. It’s taken extra precautions, including a focus on lockdown procedures across its locations and the district office. K-12 school security can be challenging, especially with the uniqueness of Redlands High School. It’s an older facility that was constructed more than 100 years ago. Additionally, students must walk outside to pass from building to building, and there’s a street that cuts through campus. A crosswalk is needed to get from one end to the other. The district needed to take all of this into account when assessing their security plan. Securing every layer The district’s security team took into consideration each physical layer that needed protection The district’s security team took into consideration each physical layer that needed protection at Redlands High School, from the district level to the classroom and many openings in between. Yet, there was a common area that needed addressed. There’s a fence around the campus to protect the property perimeter. And Redlands High School is extending that fence to include the cross walk, which will help funnel guests into a single point of entry, the main office. Schlage AD Series electronic locks This opening, as well as many other perimeter openings that lead into offices, gyms, auditoriums, libraries and hallways in the school feature Schlage AD Series electronic locks that are connected to the district’s access control system. At the classroom layer, each door has mechanical hardware that can be locked from the inside. Redlands School District has started district-wide implementation of a full-feature enterprise access control system through Vanderbilt, which is capable of operating across different schools, campuses and other locations. RedRock Security and Cabling, Inc. (RedRock Technologies) had implemented and continue to support the solution. Electronic access control “When these systems are managed district-wide, schools have the ability to lock down a door at a time, a school at a time or an entire district at a time,” said Jennifer Martin, Director of System Sales at Vanderbilt, adding “It’s all about protecting the students.” With electronic access control on main points of entry and many assembly areas, plus secure mechanical locks on classroom doors, Redlands High School had most of the layers prepared in the event of a lockdown event. However, the school’s cafeteria, Terrier Hall, was a vulnerable space. “Hundreds of students use Terrier Hall,” said James Fotia, Director of Maintenance, Operations and Transportation at Redlands Unified School District, adding “In a lockdown situation, that’s a place where we would secure the kids and keep them safe by clustering them into that area and having it locked down. But it was secured by one AD-400 lock on a pair of double doors. That was incomplete.” Von Duprin RU retrofit option Allegion representatives recommended a new K-12 security solution from Von Duprin To demonstrate how the school could affordably secure big banks of doors without having a reader on each opening, Allegion representatives recommended a new K-12 security solution from Von Duprin. The Von Duprin RU retrofit option is a cost-effective solution for openings with existing exit devices that enables remote locking, or un-dogging, for centralized lock down. This enables staff to initiate an immediate campus-wide lockdown from a secured location instead of putting themselves in harm’s way to manually undog exit-device doors throughout the building. Integrated request to exit (RX), latch bolt (LX) and door position switch (DPS) signals are included to provide real-time remote monitoring and confirmation of the security status of the door. Wireless connectivity to ENGAGE Gateway There’s also a ‘dog on next exit’ feature, which is a scheduled function sent to the device to allow the door to remain unlocked the first time someone depresses the push pad of the exit device to leave that space. The door is secured in the evening, and with ‘dog on next exit’ enabled at a specific time in the morning, staff simply depresses the push pad to unlock the door. This makes unlocking the door simple for scheduled events and daily lock-up easy by reducing the need to distribute keys to staff. Additionally, the RU option connects wirelessly via Bluetooth Low Energy to Allegion’s ENGAGE Gateway which provides real-time, bi-directional communication to the access control software. RU is a modular battery powered kit that can be added on to existing Von Duprin 98/99 and 33A/35A Series devices. Enhanced door security “The Von Duprin RU option fits into special applications that haven’t been addressed in the past,” said Russell Gamble, End User Consultant at Allegion, adding “There are several openings that will benefit from this secure lockdown solution.” At Redlands High School, the Von Duprin solution is installed on five doors that surround the cafeteria area. There are main entry doors where students enter, plug in their lunch numbers and go through the buffet line. From there, they enter the multi-purpose space, where there are four additional doors, which are secured with the RU options. Access control solution with lockdown capabilities There was also interest in implementing the security solution at the district office There was also interest in implementing the security solution at the district office. The school wanted to pilot the solution there to experience the product and its features, especially the lockdown capabilities. And being that the building is so unique, it has a need for enhanced security. “The district office is a converted warehouse, so it was never really meant for meetings and offices,” said Fotia, adding “Having the Von Duprin RU has been a wonderful fit in providing security in a not so ideal building.” Integration with Vanderbilt solution The main building is built U-shaped and the loading dock is in the middle. In the middle there is a courtyard area with four portable offices. The Von Duprin RU is on each portable door. At both locations, the Von Duprin RU options are integrated into the Vanderbilt solution and part of the broader lockdown solution. “The greatest thing about this solution is schools now have a way to electronically add control to doors that used to be manually monitored,” said Jennifer Martin. Remote lockdown and door access control She adds, “With the Von Duprin 99 Series, doors allow for free egress, but they aren’t usually monitored by access-controlled systems. If someone has it dogged so the doors are unlocked or propped open, someone has to manually go around and lock each door.” This solution ensures staff is alerted if a door is propped open and enables the ability to lock down the door remotely, even if it was previously mechanically unlocked. Enhanced lockdown capabilities for peace of mind Redlands Unified School District is pleased with the addition of the Von Duprin RU Redlands Unified School District is pleased with the addition of the Von Duprin RU to its school security plan. Integrating the solution with the Vanderbilt system, along with the Schlage electronic locks on campus has improved lockdown. According to the district’s Coordinator of Operations and Facility Planning, Ken Morse, it’s also improved peace of mind because there are less errors and more control over these areas. In the cafeteria, Terrier Hall, they’re able to secure doors that used to be manually controlled. This eliminates human error and the risk of manually locking doors in an emergency. Fotia said the school also likes the budget-savings aspect since it was able to simply upgrade the hardware it already had in place versus purchasing entirely new equipment. He’s excited to see other areas where the Von Duprin RU might be a fit. “The security measures and the lockdown capabilities are the main reasons we wanted the Von Duprin product,” said Morse, adding “Putting something on a schedule is also a great bonus because of how many common-use facilities we have. We’ve found that scheduling it is relatively easy. The doors are open only when they need to be. We have everything scheduled at the district office so it’s open during our hours, which has been a huge benefit.”
Stuart Codack, Information Security Manager and Steve Roberts, Head of IT at West Midlands Trains (WMT), gave an inside look into working with SureCloud’s cyber security team. As an operator of essential services and part of the critical national infrastructure, West Midlands Trains (WMT) are constantly reviewing the service that they provide and the supporting processes to ensure that they are giving customers the very best service. WMT will routinely carry over 200,000 passengers over any of the 1300 services per day, operating from London to Liverpool and predominately in the West Midlands area. Aligning to business objectives While providing the best service possible, the business is responsible for making upgrades While providing the best service possible, the business is responsible for making upgrades, as part of their commitment to the Department for Transport and agreed set of objectives defined within the organization’s committed obligations. These could range from large projects to developing stations, such as Wolverhampton, upgrading and enhancing the trains’ capacity, or providing more technical solutions to allow customers to purchase tickets and view train services online. Key cyber security challenges Understanding the emerging and constantly evolving threats to the rail is critical to ensure that WMT provide an efficient and responsive technical solution for the services operated. They operate within a number of frameworks, most significantly the Network Information Systems (Directive) provided to Operators of Essential Services (OES), and also feed in elements of both ISO27001 and NIST. The Department for Transport, in conjunction with the National Cyber Security Center, enctheages a mature cyber security posture, and closely monitor and assess assurance levels. This approach challenges WMT constantly and places high demands on the enterprise to deliver and maintain a strong cyber security posture. Understanding where any actual or potential weaknesses are helps in directly applying restheces to protect systems and maintain confidentiality, integrity and availability. Often overlooked, recognizing where WMT have achieved success has also helped to justify continued and future spending to senior management, by assuring them that a proactive cyber security strategy is worth the investment. SureCloud cloud-based platform Chosen for their professionalism during the tender stage, SureCloud comfortably convinced the decision makers of their technical capability, flexibility and willing attitude to join the business on their jtheney, as opposed to other vendors providing the essentials with hidden costs introduced as additional extras. The SureCloud platform provided WMT with clear visibility of testing outcomes Another key benefit that helped SureCloud stand out from the rest was the technology-enabled services approach, which utilizes SureCloud’s platform to underpin the service delivery. The cloud-based platform has provided a forum for WMT, in which work streams can be identified and allocated to third-party vendors. The business allows remediation work to be assigned and worked on concurrently. The SureCloud platform provided WMT with clear visibility of testing outcomes and helped to establish the evidence and patterns of work that supports the various questions across the frameworks that call for continual service improvement, while demonstrating a proactive response to aspects of ISMS has been invaluable. Benefits of the Cyber security-as-a-Service package Support was measured against the requirements of the organization and was provided on-demand and willingly offered up throughout all stages of the agreement, with no signs of wavering support on completion of any of the work packages. The penetration testing has provided a great deal of insight and visibility into areas that needed improvement while assuring other areas where the business had demonstrated some good practices. The results were well presented via the platform with the context that allowed the team to define the risk, and if any action would be needed to mitigate or reduce those risks. The level of expertise was fantastic, with identified areas supported by impacts and potential solutions. Effective cyber security program Overall, West Midlands Trains are very satisfied with their investment in the SureCloud tech-enabled services, and have already recommended SureCloud to a number of partners based on the work conducted. West Midlands Trains are passionate about managing an effective cyber security program and the business will continue to work with SureCloud in the future.
Round table discussion
A standard is a document that establishes uniform engineering or technical criteria, methods, processes, and/or practices. Standards surround every aspect of our business. For example, the physical security marketplace is impacted by industry standards, national and international standards, quality standards, building codes and even environmental standards, to name just a few. We asked this week’s Expert Panel Roundtable: How have standards changed the security market as we know it?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?