Connected Technologies LLC, maker of the award-winning Connect ONE cloud-hosted security management platform, has added Mobile Badge to its wide range of value-add features and capabilities included in the turnkey system interface. Designed for schools, campuses, construction sites, clubhouses or other locations with a changing, fluid population, Mobile Badge puts credentialing identification management on the user’s phone, similar to a traditional physical badge. Mobile Badge can be used...
Cybersecurity has become a major element – and a major source of discussion – in the physical security marketplace as a result of the rise in networked systems. And we may still not be talking enough about cybersecurity. Here is part one of our Cybersecurity series. “Cybersecurity requires everyone in the security industry to be playing offense and defense at the same time, every single day,” says Bill Bozeman, President and CEO of PSA Security Network. “It needs...
Johnson Controls announces that the Tyco Visual Intelligence from Software House, a unique metric-based reporting tool for C•CURE 9000, receives the award for Best New Product in the Convergence and Integrated Software and Solutions category. The award was presented at the 2019 SIA New Product Showcase, during ISC West in Las Vegas. Sponsored by the Security Industry Association, the annual awards program is one of the most prestigious recognitions in the security industry. The program rec...
The Security Industry Association (SIA) announced its 2019 executive committee and welcomed five new members to the SIA Board of Directors at The Advance, SIA’s annual membership meeting, during ISC West 2019 in Las Vegas, Nevada. New Voting Members At The Advance – held Tuesday, April 9, at the Sands Expo Center – the SIA Board of Directors ratified the selection of five new voting members of the Board of Directors to serve two-year terms from 2019 to 2021: Greg Hill, dir...
Keyfactor, a provider of secure digital identity management solutions, announces the launch of Keyfactor Control 6. This newest release of the company’s flagship, end-to-end secure identity platform addresses scalability in connected device security. Keyfactor Control secures, authenticates and future-proofs IoT identity at every step of the device lifecycle, providing a scalable IoT security solution. “The threat landscape is changing – trends like IoMT are creating new secur...
Johnson Controls announces that PowerG technology with all the benefits of wired security, but without the wires, achieves the top levels of Underwriters Laboratories of Canada (ULC) certification, making it one of the most reliable security solutions in Canada. PowerG wireless devices are the first to be certified with ULC levels 1, 2 and 3 Commercial Burglary Approval (ULC-S304-16) when installed with PowerSeries Neo or PowerSeries Pro security systems. Simple Installations From their long...
IdenTrust, (part of HID Global), the provider of digital certificates, and Device Authority, a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT), announces a strategic alliance with a vision to provide trusted identity lifecycle management for enterprises on their digital transformation journey. Device certificates have traditionally been used to secure routers, firewalls, servers, and other devices capable of securely handling private keys and implementing PKI technologies. However, in the new IoT world, device certificates can be used to secure a wide range of networked assets, such as ATM machines, medical devices, surveillance cameras, industrial machines, refrigerators, vehicles and much more. Swift Integration IdenTrust’s comprehensive identity-based digital certificate solutions deliver assured individual and device identity for financial institutions, healthcare providers, government agencies and enterprises around the world. With over 5 million certificates in active production, IdenTrust supports over 18 billion validations per year and is the world’s pioneer digital Certification Authority. Device Authority’s KeyScaler automation engine provides secure IoT device registration and provisioning through an innovative policy-driven credential delivery and management system that ensures certificates can be easily rotated, renewed and managed without human intervention. The platform is designed for swift integration and interoperability in support of today’s rapidly expanding IoT application market. The combination simplifies the process of enhancing device security and its administration for our customers" Combining Device Authority’s KeyScaler platform capabilities with IdenTrust’s trusted digital certificate solutions provides customers with a complete IoT security solution that automates compliance, minimizes costly manual intervention and manages risks in a diverse industrial regulatory marketplace. Enhancing Device Security “The relationship between IdenTrust and Device Authority links our trusted certificate authority with a seamless and scalable means to efficiently manage the lifecycle of issued digital certificates in the rapidly expanding IoT device market,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. “The combination simplifies the process of enhancing device security and its administration for our customers.” “We’re delighted to be working with the IdenTrust team to provide device and data trust for their customers embarking on their IoT journey. With a mixed environment of devices emerging in healthcare, industrial, and government sectors, the combined value delivered from both companies has a strong positioning for physical, enterprise and IoT IAM customer solutions,” said Darron Antill, CEO of Device Authority.
The 3rd edition of Intersec Saudi Arabia got underway with 111 exhibitors from 20 countries zooming in on the Middle East’s largest commercial security and fire safety market. Running for three days at the Jeddah Centre for Forum and Events, Saudi’s foremost security, safety, and fire protection trade show targets the Kingdom’s vast market which is estimated to grow at an annual compound growth rate of 7.7 percent over the next seven years. It was opened yesterday in a pre-show ceremony by Lt. Gen. Sulaiman Al-Amr, the director-general of Saudi Arabia’s General Directorate of Civil Defense. Economic Diversification Plans According to 6WResearch, homeland security and policing currently holds the lion’s share of Saudi’s market spend A report released on the side-lines of the show by consultancy firm 6WResearch said the total spend on Saudi’s commercial security, information security, homeland security and policing, physical and perimeter protection, and fire safety markets was worth US$8.5 billion in 2018, a five percent increase over the previous year. By 2025, the market will be worth US$14.4 billion, driven by a combination of increased investments in infrastructure in line with the Saudi Vision 2030, the stabilisation of oil prices, and the government’s ongoing economic diversification plans. According to 6WResearch, homeland security and policing currently holds the lion’s share of Saudi’s market spend, at US$4.6 billion in 2018. This is followed by information security (US$2.6 billion), commercial security (US$838 million), fire protection (US$273 million), and physical and perimeter protection (US$198 million). Integrated Platform The impressive opportunities are underlined by a long list of manufacturers and suppliers this week in the Red Sea port city, spearheaded by the show’s launch partners eager to boost business opportunities. Hikvision, the world’s largest video surveillance provider, is among these, and is putting the spotlight on its latest suite of technologies, much of which is powered by Artificial Intelligence and machine learning. Others include Al Alameya, Axis Communications, Bristol, Drager, Genetec, NAFFCO, Nedap, and ZMR. With 69 per cent international participation, more than 500 brands, and an enlightening three-day conference program, Intersec Saudi Arabia caters to growing demand for an integrated platform providing crucial access to one of the world’s most promising markets. Intersec Saudi Arabia is licenced by Messe Frankfurt Middle East, the organiser of Intersec in Dubai, the world’s largest trade fair for security, safety, and fire protection. Safety And Security Industries Intersec Saudi Arabia is a vital platform bringing together key stakeholders in the Kingdom’s security, safety, and fire protection industries" “Safety and Security is high on the agenda of Vision 2030 of the Kingdom of Saudi Arabia and there is a perennial requirement of safety and security products, fire protection and the accompanying innovations that are displayed at this event,” commented Zahoor Siddique, Vice President of Intersec Saudi Arabia’s organiser ACE Exhibitions. “Intersec Saudi Arabia, apart from targeting the five million population of the Western Region inclusive of the annual pilgrimage, round-the-year Umrah pilgrims, oil and gas installations, airports and seaports, the multitude of events taking place Kingdom wide, is the ideal meeting and networking showcase for safety and security industries.” Andreas Rex, Show Director of Intersec, added: “Intersec Saudi Arabia is a vital platform bringing together key stakeholders in the Kingdom’s security, safety, and fire protection industries. In its 3rd edition in 2019, it will once again be at the forefront of the latest technologies and solutions dedicated to meet the demand of the Middle East’s largest market.” Smart Patrol Solutions GET Group Holdings was among those launching new products in the Saudi market, including its latest Smart Patrol solution that assists law enforcement agencies by providing full 360 degrees surveillance, body-worn cameras, speed detection and violation as well as identification of wanted people and vehicles. GET also launched its AI-Powered process automation solutions to manage and optimize enterprise and government operations. Mrs. Maysoon Jamal, CEO of GET Group Holdings, said: “The Saudi security market is crucial to our business and our products especially for government and law enforcement agencies. We’re looking for great growth in three main categories: Secure card printing especially through our Heidi and GET/Toppan ID Card Printers, Smart Patrol Solutions, and Robotic Process Automation.” Promising Markets Intersec Saudi Arabia is held under the patronage of the Saudi Ministry of Interior, and supported by the Saudi Civil Defense Other exhibitors this week include Optex Europe Limited and Fiber Sensys, both of which recently joined forces to better serve Saudi Arabia and the regional market in deploying perimeter protection and intrusion detection systems. Intersec Saudi Arabia is held under the patronage of the Saudi Ministry of Interior, and supported by the Saudi Civil Defense. It features a three-day security and fire safety conference program operating under the wider theme of ‘Safety, Civil Security and Technology: Future Integrated Solutions’. Intersec Saudi Arabia 2019 covers the key product groups of Commercial Security, Information Security, Perimeter & Physical Security, Homeland Security & Policing, Fire & Rescue, and Safety & Health. The dedicated showcase caters to growing demand for an integrated platform providing crucial access to one of the world’s most promising markets.
Johnson Controls announces that its PowerSeries Pro is the first ever commercial grade security system to harness the long-range communication technology of PowerG and is designed to handle large-scale installations. The system offers the highest level of cyber protection features and encryption technology without the need for a wired communication path. PowerSeries Pro is developed for commercial use and can support up to 248 zones, making it an ideal solution for warehouses, office buildings, factories, and healthcare facilities. Intrusion Security Panel “In the past, we have had systems that support commercial applications, but PowerSeries Pro is our first commercial intrusion security panel that can handle large commercial installations while eliminating the need for wires on sensors or keypads,” said Jennifer Doctor, senior director of Product Management, Tyco Security Solutions. “We are excited to provide this new product to the commercial sector, and hope the increase in zones, coupled with secure encryption, will provide end users with the flexibility and reliability they need.” Tyco security solutions’ PowerSeries Pro includes built-in 128-bit AES encryption technology, supports multiple third-party integrations, including Building Management Software (BMS), as well as video and access control solutions to offer a versatile platform for holistic commercial security. Commercial Installations In addition, Frequency Hopping Spread Spectrum technology repeatedly switches frequencies to minimize interference of radio signals and prevent interception and obstruction during transmission. This is especially useful in commercial integrations, where transmissions take place over longer distances, and in turn require more planning to combat potential interferences security threats. Requiring no drills, wires or repeaters, both residential and commercial installations are hassle-free and provide all the power and security of a wired connection, without the wires.
Johnson Controls expands its PowerG technology portfolio to include the addition of several new detectors and sensors offering installers a greater variety of devices that harness the power of PowerG. Wireless Security Technology Enhancements to the PowerG portfolio include a 360-degree ceiling mount PIR detector, commercial magnetic contact, carbon monoxide detection and vanishing door / window magnetic contact, just to name a few. With the absence of wires, PowerG is able to securely perform many of the functions of a wired system, with new updates being made continuously. From long-range ceiling mount detection to smoke and heat detection, PowerG provides the power of wires without the wires. PowerG is the wireless security technology, designed with homes and businesses in mind. With the addition of new enhancements, PowerG is continuing to make end-users’ lives more secure and convenient while cutting installation time and saving money for installers. Unparalleled Cyber Protection “There once was a time where wired solutions were deemed the most secure and, in turn, were the ones chosen,” said Jennifer Doctor, senior director of Product Management, Tyco Security Solutions. “PowerG gives users the peace of mind that comes with an encrypted, wired solution, but eliminates the hassle of wires. With the added detectors and sensors, PowerG rivals that of traditional intrusion systems.” With ultra-reliable, two-way 128-bit AES encrypted communication and iron-clad protection that blocks interference, PowerG delivers unparalleled cyber protection features – ensuring reliable performance with minimum false alarms.
Pulse Secure, the provider of software-defined Secure Access solutions, announces that it has teamed up with Dynamic Worldwide Training Consultants (DWWTC) and Westcon Americas, A Division of SYNNEX, to deliver the new Pulse Secure Authorized Training program to its reseller partners and customers. As Pulse Secure Authorized Education Partners, DWWTC and Westcon Americas, A Division of SYNNEX, will deliver Pulse Secure’s new program of Authorized Education Training Courses, designed to prepare users to pass the Pulse Secure Certified Technical Expert Certification exams. The instructor-led training program is open to Pulse Secure customers and reseller partners and is available globally in both virtual and classroom environments. Secure Access Offerings Joe Pittillo, vice president of services, SYNNEX Corporation, said, “By providing customers access to Pulse Secure products, services, and now education, our team can further enable their success in the channel around Secure Access offerings. Our goal here, as well as with all of our education and training programs, is to help increase partner profitability and the value they bring to their customers – all from a single, trusted source.” The certification program will uniquely benefit both Pulse Secure reseller partners and customers Dave Warren, CEO, DWWTC, commented, “We’re delighted to come on board as a Pulse Secure Authorized Education Partner to help companies gain that extra level of knowledge to help them stand out from their competitors and grow their businesses.” Authorized Education Partners The certification program will uniquely benefit both Pulse Secure reseller partners and customers, allowing each to maximize their Pulse Secure deployments and businesses. Customers will gain the expertise to implement and manage the Pulse Secure product suite more effectively while partners will be enabled to promote and deliver Pulse Secure solutions with confidence and to further differentiate their service offerings. Sudhakar Ramakrishna, CEO of Pulse Secure, said, “Pulse Secure recognises that an empowered and enabled partner and sales community is better able to deliver customer and business success. To this end, training and certification, and our partnership with our Authorized Education Partners, is a key business imperative for Pulse Secure. Attendees of the training delivered by our Authorized Education Partners will leave with the skills and the confidence needed to successfully implement and maintain Pulse Secure products and solutions.”
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR For Security Heads of security at hospitals, stadiums, corporate campuses, airports, and other enterprises must maintain high awareness over large areas via a growing number of security cameras. To know whether a familiar person, employee, VIP, perceived threat, concern, or stranger is onsite, security professionals must rely on their ability to focus on key details and then make accurate assessments. SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility" “It’s been a challenge to maintain awareness of who is present at Shelby American, whether those are specific individuals of concern or aggregate demographics of museum visitors,” said Richard Sparkman, Director of Technology, Fleet & Facilities at Shelby American car museum in Las Vegas. “SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility and helps us understand who is moving through our museum by age, gender, and time of day – allowing us to better tailor our museum experience." 24/7 Video Monitoring Available as a standalone solution or integrated with market-leading video management systems, SAFR for Security provides vigilant 24/7 monitoring to detect and match millions of faces in real time, delivering a 99.86 percent accuracy rate. In the April 2019 National Institute of Standards and Technology (NIST) test results, the SAFR algorithm tested as both the fastest and most compact amongst algorithms for wild images with less than 0.025 FNMR. When SAFR for Security is paired with a VMS, the integrated experience includes video overlays within the VMS to identify strangers, threats, concerns, unrecognized persons, VIPs, employees, or other tagged individuals in live video. Security teams can customize real-time alerts to automatically notify them when persons of interest appear on a video camera feed or make use of automated bookmarking to conduct forensic analysis. SAFR for Security attaches rich metadata to video footage so security professionals can search by time range, location, category, person type, and registered individual instead of sifting through hours of video to find a specific person. All data passed through SAFR is protected with AES 256 encryption in transit and at rest “Security professionals are inundated with hours of raw footage, much of which must be evaluated in real time by a limited number of human eyes,” said Dan Grimm, Vice President and General Manager of Computer Vision at RealNetworks. “SAFR for Security helps these professionals maintain higher awareness by combining our highly accurate AI-based facial recognition service with the software they currently use.” Facial Recognition Systems The underlying SAFR platform has been optimized to detect and recognize faces in live video based on its industry-leading excellence in accuracy and performance. The SAFR platform can be deployed on a single PC to monitor a handful of IP cameras or scaled to thousands of cameras in a distributed architecture hosted on-premises, in the cloud, or hybrid. All data passed through SAFR is protected with AES 256 encryption in transit and at rest. The platform also provides actionable data for live analytics of traffic volumes, demographic composition, dwell times, and data exports for further reporting. “We’re delighted to partner with RealNetworks to extend our intelligent IP video system with SAFR for Security’s highly accurate facial recognition,” said Thomas Lausten, CEO, MOBOTIX AG. “The combination of SAFR and our innovative camera technologies opens up a new set of applications and use cases for MOBOTIX customers around the world, especially in retail, healthcare and education.”
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling increased energy demand. But like nearly every other market today, the oil and gas market is on the brink of a sea change. According to Deloitte’s 2018 outlook on oil and gas, “the digital revolution is here.” The sheer volume of information and data generated by digital devices, such as those associated with the Internet of Things, will allow producers to leverage rich data and combine it to deliver smart, efficient solutions. The rise of digital technologies is unleashing new ideas across the oil and gas industry and even though we are in the beginning stage of being able to harness the power of these types of technologies, innovative ideas are emerging — all designed to support the core business, reduce internal investments, deliver products faster, boost efficiencies, and enhance safety. Maximized Operations And Increased ROI This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand This is welcome news because there are a number of challenges facing the oil and gas industry, from improving reserve replacement and ensuring workplace safety to reducing operating costs and limiting downtime. All of these objectives must be achieved while maximizing operations and increasing overall return on investment. Never has it been more crucial for critical infrastructure organizations to demonstrate a focus on safety, security, and collaboration. Here's why: Growth and demand According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success. Compliance Continuous demand is only one challenge; compliance with industry and government regulations is another significant hurdle that must be maintained or there is risk of production shutdowns. For example, the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS) impose comprehensive federal regulations for high-risk chemical facilities, requiring organizations to conduct vulnerability assessments. This is just one of many regulatory procedures sites must follow to conform to environmental protections, safety precautions, and safe handling of hazardous materials. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success Threat Protection, Mitigation, And Collaboration In addition to meeting the requirements of regulatory procedures, mitigating risk in this industry propels leaders to develop stringent strategies to ensure robust protection of people, property, and assets, effective and efficient response to incidents when they occur, and procedures and protocols to ensure business continuity in emergency situations. Energy providers require comprehensive safety planning and technology systems that can augment the capabilities of on-site and remote personnel. In recent years, video solutions have become the standard for monitoring facilities, assets, and employees, and now these organizations require enterprise-class solutions that can help gather intelligent data that allows for enhanced security and safety efforts but also focus on processes that enhance operational efficiencies. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market IT security is also a concern. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market. An IT breach can cause operational havoc, risk to the public, and damage to an organization’s brand. Adopting a continuous improvement approach to a security strategy safeguards and helps protect valuable company information and reduces the likelihood of an incident. Also, collaboration between IT and physical security leaders and the correlation of both departments' data makes it much easier to identify a potential breach before havoc ensues. The Digital Age With the rise of the digital revolution and the demand for data to improve insight, oil and gas producers and businesses need to find new ways to capture data, correlate it as needed, and then leverage it to make the most informed decisions. Software platforms are being used in a wide variety of applications to provide a single pane-of-glass view that allows operators to gain critical insight into operations. By collecting intelligence from digital sensors, such as video surveillance cameras, open-source Web intelligence, building systems, crowdsourcing, weather sensors, mobile devices, and more, operators can detect potential risks and manage and respond to situations more efficiently. Furthermore, information can be shared easily with multiple agencies, employees, citizens, and first responders — especially valuable in the event of a safety incident where rapid response is paramount. By creating a single enterprise-wide view across disparate systems and technologies, organizations experience improved response times, lowered operational costs, and increased employee safety. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically Traditional Command Centers Intelligent solutions, such as those derived from the idea of artificial intelligence, help organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies within the oil and gas industry, fusing critical data input from emergency calls and responder activity to enhance situational awareness. With traditional command centers relying mostly on call and radio updates, visibility can be limited, but new digital platforms enable operators to oversee a situation and engage with and direct the response force. Overall, these types of automated functions deliver a simplified and modernized operating environment. The Future Is The Intelligent SOC Oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets All of these digital solutions are designed to take center stage within the Intelligent Security Operations Center (ISOC). To combat advanced, multi-stage threats, oil and gas facilities are transforming the traditional SOC into the next-generation unified ISOC with an integrated platform for detection, investigation, communication, and response. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically. Energy providers operate in challenging, fast-moving environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. As the idea of the digital age continues to transform this market, new technologies will be more widely used to improve business operations from exploration and extraction to transportation and distribution. With the right technology, strategic partnerships, and enhanced situational awareness, oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets, while continuing to focus on achieving business goals that will sustain supply and demand for years to come.
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a lot of different verticals together with IT and network security, physical security and robots and drones. It’s one-stop shopping and the number one security show in North America.” Identifying Buying Influencers The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show. The ISC West Executive’s Club is a ‘top buyer program’ created to welcome high-level buying influencers who have current projects in the pipeline. The program works throughout the year, networking, researching and identifying buying influencers among end users, integrators, dealers/installers and consultants who are working on current projects. Approximately 1,300 attendees are participating in the program this year. An Executive’s Club member might be an integrator working with several large projects or represent a school system that is building a new campus or retrofitting their systems. During the trade show, these guests get the VIP treatment with a variety of benefits, including a lounge, cocktail receptions, and continental breakfasts. Personalized Matchmaking Programs ISC West also provides personalized matchmaking programs to bring together these buyers with companies that can meet their needs. The Executive Club members are also led on guided exhibit hall tours, based on product interest, that highlight new and innovative solutions. The program also contributes to ISC West’s goal to grow its end user audience. In this case, it is a group of eager buyers with immediate needs. Another growing aspect of ISC West is its role shaping exhibiting companies’ technology roadmaps, in particular the timing of new product releases. Many new products and technologies are announced at ISC West, and attendees are conditioned to attend the show to see what’s new in the marketplace. “Vendors try and work to get whatever solutions they are promoting together in time for ISC West,” says Shaughnessy. “Vendors know that attendees have fresh budgets and new initiatives early in the year.” Network Security Products ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11 ISC West showcases the latest products, services, and technology including access control, video surveillance, disaster recovery, IT security products, network security products, wireless security products, and thousands more helping ensure safety by giving attendees the right tools and defenses to protect against security risks. In addition to the exhibition, ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11. SIA Education@ISC will kick off the day before the start of the exhibition. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape.
MIPS (Milestone Integration Platform Symposium) Copenhagen 2019 saw Milestone Systems double down on the ‘creating an intelligent world’ theme from 2018 and expand it to ‘exploring an intelligent world.’ “The intelligent world theme was bigger than we could cover in one year!” said Malou Toft, VP of EMEA at Milestone Systems. Isolate Important Events With 865+ registered attendees and more than 47 exhibiting partners in Denmark, this is the largest Community Days event Milestone have hosted, even larger than the very well-attended Nashville event in February. The company took the opportunity to present Marketplace, their new Amazon-style online company directory, where end-users can identify Milestone Verified and Certified companies to supply a security solution. There was also a demo of Milestone’s XProtect software updates, able to adjust a video feed in real time to show number plates, to de-blur video and to filter out irrelevant clips to isolate important events, identified by artificial intelligence (AI). Self-Learning Mechanism We’re seeing advances on a small scale and are now going to see it becoming an inherent part of XProtect moving forward"“We’re seeing advances on a small scale and are now going to see it becoming an inherent part of XProtect moving forward,” said Malou Toft. “[One example is] the way we can ask a camera with the right type of integration to dynamically adjust to the environment.” And Malou says the best is yet to come. Of today’s technology on show at MIPS, and indeed at 2019’s trade shows, she said: “Is it super intelligent? No, not now. But it’s mostly solving the simple tasks now, that are replicable. But it is optimising the process, and to become a self-learning mechanism, we are going to see much more of that moving forward.” Exploring The Intelligent World The talks of the symposium reflected these thoughts as well. Altimeter’s Brian Solis commented about AI: “We can automate the daily things we do today, or we could use the technology to automate our innovations.” This is clear in Milestone’s theme of ‘exploring the intelligent world’ – the industry has created the foundations of the intelligent, and now companies such as Milestone and their 110 (and growing) new Marketplace partners are exploring them. MIPS EMEA 2020’s location is yet to be determined, but MIPS Bali 2019 will be Tuesday April 2 – Thursday April 4. Milestone will be back in Copenhagen for their Developer Conference October 1 and October 2.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems And Video Surveillance As A Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video And Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimize operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realize other operational and performance efficiencies. Topic: Robotics And Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place In Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics In Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realize a more secure future. Topic: Voice Control In The Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces that its SmartCode 888 Deadbolt Lock was chosen to become part of the new Home is Connected smart home system from D.R. Horton, Inc. The inclusion of Kwikset’s SmartCode 888 in the system was based on its value (great functionality at an entry-level price), reliability, and high degree of security. Incorporating the latest Z-Wave 500 chipset, the SmartCode 888 offers keyless entry through a convenient, easy-to-use touchpad. Kwikset’s patented Home Connect technology enables the lock to wirelessly communicate with other devices in the home through a third-party smart home controller, as well as to remotely check the door lock status, lock or unlock the door and receive notifications. Innovative Program D.R. Horton’s Home Is Connected system is included in the base price of each new home from the company’s family of brands D.R. Horton’s 'Home Is Connected' system is included in the base price of each new home from the company’s family of brands. The system includes a robust central hub by Qolsys that controls the smart home features, including a home alarm and automation platform by Alarm.com, Honeywell Home thermostat from Resideo, smart switches by Eaton Corporation, video doorbell by SkyBell and hands-free, voice-first experiences with Amazon Alexa. “We are pleased to be part of such an innovative program created by the nation’s largest volume homebuilder,” said Dave Seeman, Director of National Builder Accounts, Kwikset and Baldwin, Spectrum Brands, Inc. – Hardware & Home Improvement Division. Convenience Of Keyless Entry “We are confident that buyers of D.R. Horton homes will not only appreciate the security and convenience of keyless entry that our SmartCode 888 provides, but also the endless benefits of whole home automation. To be a part of a system that includes such well-known, reputable brands indicates to us the high level of trust D.R. Horton puts in our products.” Brad Conlon, Vice President of National Accounts for D.R. Horton, said, “We are pleased to work with Kwikset to provide this essential component to D.R. Horton’s new Home is Connected smart home system. We know our customers will appreciate the peace of mind that comes from Kwikset’s SmartCode 888 lock and the Home is Connected system overall.”
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorized smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the center console. Seamless Vehicle Sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorized, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorized users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognized, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity Approach TAP utilizes a multilayered industry-recognized security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognized cybersecurity approach.” Vehicle-Function Permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
Amthal has worked closely with Garrard Windows to install smart CCTV systems for its showroom and factory site, to present ultimate protection for staff, customers and premium products in storage. Garrard Windows is one of the largest suppliers in England, presenting PVC-U and aluminum windows, bifold and patio doors, together with conservatories to the trade, with an objective to remain reliable, efficient and customer oriented. Manufacturing around 2,500 products a week, to ensure the security of products and supply on site, Gerrard Windows called upon Amthal to enhance its security and install CCTV systems throughout its factory and show room site. Smart CCTV Facilities Our aim is to supply the window trade with high quality products, always delivered on time and at competitive prices" Adam Webb, Director of Garrard Windows: “Our aim is to supply the window trade with high quality products, always delivered on time and at competitive prices. Many of our existing customers are fabricators themselves, relying on us for extra capacity in busy periods.” “To maintain this commitment and ability to respond quickly to customer requests, we have to ensure maximum security on site at all times. Amthal identified the subtle installation of smart CCTV facilities throughout our premises as added visual protection, to ensure we can view activity on a 24 / 7 / 365 basis, even when we are off site. Our staff are already feeling the benefits and peace of mind security.” Improved Technology David Williamson, Amthal Sales Account Manager: “Garrard Windows has a renowned reputation in the industry, not only as one of the largest suppliers, but also in responding quickly to client requests to a high-quality standard. It’s essential security on site is maintained to a maximum standard to sustain this level of efficiency and reliability.” The added visuality provides total peace of mind the right security is in place to protect against any risk" “Following an on-site inspection, Amthal made the recommendation of smart CCTV solutions to ensure Directors can feel the benefits of having new and improved technology helping to safeguard assets. The added visuality provides total peace of mind the right security is in place to protect against any risk, or possible disruption due to theft, to the smooth-running operation and delivery to our customers.” Satisfying End User Needs Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
HID Global, provider of trusted identity solutions, announces that the European Molecular Biology Laboratory (EMBL) in Grenoble, France has selected HID’s radio frequency identification (RFID) tags and its patented direct bonding technology for automated handling of biological samples at cryogenic temperatures of 196°C (-321° F) in liquid nitrogen. EMBL Grenoble creates high-resolution pictures and 3D atomic models of biological macromolecules using a specialized imaging process called macromolecular crystallography (MX). These images are useful for studying biological materials, developing highly efficient medicine, and fighting cancer more effectively. Limited Storage Density The images require molecular samples to be prepared in a crystalised form and frozen The images require molecular samples to be prepared in a crystalised form and frozen. Handling these samples is a complex task: tiny crystals must be grown, harvested, frozen on a sample holder at the tip of a tiny needle, and stored in liquid nitrogen at cryogenic temperatures and identified for further processing while remaining cool. Most current sample holders used in MX imaging offer limited storage density and poor initial crystal-positioning, which affects processing and limits the benefits of automated crystal harvesting systems. As a result, EMBL set out to design a storage and identification solution robust enough to function at extreme cold temperatures, but small enough to facilitate high precision and storage density. It also needed to support high-speed, automated handling by robots. Direct Bonding Technology “The HID Global technology has proven to be reliable against temperature cycling between room and liquid nitrogen temperatures, and the HID team was very supportive in helping us with our new designs,” said Florent Cipriani, Head of Instrumentation Team, EMBL Grenoble. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules Embeddable RFID tags and direct bonding technology from HID were chosen for identification in EMBL’s new sample holders due to the tags’ tiny footprint, proven track record to work in cryogenic environments, and ability to be custom designed to meet the needs of EMBL. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules, making the units the smallest HF formats available in the market that deliver uncompromised performance. Reliable Sample Tracking “HID Global’s proven RFID technology has been used in various cryogenic environments for years,” said Richard Aufreiter, Director Product Management, Identification Technology with HID Global. “It was a natural partnership between HID and EMBL to design a tracking system resistant to frosting and other aspects of extreme cold. Our team worked directly with EMBL engineers to ensure the best tracking system was deployed in their newly designed sample storage solution.” With HID technology, EMBL developed two new sample holders optimized for high throughput, precision, and reliable sample tracking of more than 200 thousand crystals per year. The new RFID-enabled sample holders increase throughput by allowing the crystal harvesting, cryogenic storage, and MX beamline feeding process to be fully automated using robot grippers and specifically designed RFID readers. Available memory space in the RFID tags can store additional information about the samples.
Six CNI utilities sites across South West England and Wales have been secured from terrorist attacks and ongoing criminal threats in a £3.25 million security project. Gas distributor Wales & West Utilities appointed principal contractor Chubb Systems and Littlewood Fencing to work collaboratively on a fully-integrated perimeter protection upgrade. Littlewood secured the perimeter with a Lochrin Bain ‘Combi’ CPNI Approved palisade fence system enhanced with Gallagher monitored pulse fencing (MPF) to 4m high. They also installed Crime & Fire Defense Systems MAP vault panels, CCTV towers, security and field marshalling kiosks along with associated concrete and civil works. Collaborative Project Management Littlewood Security Division manager David Jackson said: “We’ve worked with Wales & West for many years as the incumbent supply and installation partner for perimeter security systems, but this latest project with Chubb also included the integration of access control, CCTV cameras, reporting systems and networks that enable remote monitoring from a central control station.” A large element of the package involved civil works that had to be completed mainly by hand In total, more than 2500m of fencing were installed along with twelve CPNI BASE vehicle gates and six Crime & Fire MAP vaults. With a number of sites located on the Brecon Beacons, access issues and inclement weather conditions made collaborative project management essential. A large element of the package involved civil works that had to be completed mainly by hand. This was achieved with a strong emphasis on health & safety ahead of program and to a high standard. Strategically Important Sites Gallagher business development manager Jason Hunter said: “A Gallagher MPF delivers safe and controlled, energised pulses. If seeing the fence and warning signs isn’t enough of a deterrent then receiving a short sharp shock should definitely deter. “The system is also connected to our Command Centre, which will alert the security team that there has been a breach so they can react quickly and effectively.” Wales & West Utilities security manager Ian Raclette said: “Gallagher’s MPF meets the CPNI criteria we demanded and helps us to detect criminal or terrorist activity in real time, reducing further any threat on these strategically important sites.” Wales & West Utilities covers a sixth of the UK, serving a population of 7.5 million. It launched on 1 June 2005, having formerly been part of National Grid Transco, and is now valued at £1.2billion.
Genetec Inc., a technology provider of unified security, public safety, operations and business intelligence solutions, announces its solutions have been selected by the Royal Borough of Windsor and Maidenhead (RBWM) for region-wide CCTV monitoring and community safety purposes. The new system will result in better coverage across the borough and enable information to be quickly shared with regional police as and when required. At the heart of the program is a completely refurbished monitoring center, equipped with the Genetec flagship unified security platform Security Center and other complementary Genetec security solutions. KiwiVision Privacy Protector The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change These include the KiwiVision Privacy Protector to simplify GDPR compliance, Genetec Mission Control to guide operators in providing a consistent response to incidents and Genetec Clearance for the easy and secure sharing of evidence with local law enforcement. The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change. It also allows RBWM to protect its past investments by retaining the majority of its existing cameras, alongside the 200 that will be added, upgraded or relocated. “The safety of residents and visitors in the borough is a priority, and we are pleased to be installing a new-state of the art system that delivers this,” said Cllr. Mike Airey, cabinet member for environmental services. Improved Information Sharing “We not only benefit from reduced operating costs and improved information sharing with local police, but we also gain access to cutting edge privacy controls that make it far simpler for us to maintain our compliance with the EU GDPR and other data protection regulations.” The project began when specialist town center video surveillance consultancy firm Global MSC Security (MSC) was called in to assess the Royal Borough’s existing analog video surveillance system, its fitness for purpose and how it could be cost-effectively improved. This resulted in a competitive tendering exercise won by Computerised & Digital Security Systems Ltd. Cost-Effective Response (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system. Some of the key technical benefits delivered by CDS include full HD recording, advance graphical mapping, advanced incident response, customisable and extended video storage retention, and various features to aid data protection regulation compliance such as automated pixelisation of images and end-to-end encryption to enhance privacy controls “Genetec is delighted to see our solutions chosen by the Royal Borough of Windsor & Maidenhead for this well thought out upgrade that will benefit the council, local police and citizens”, added Dan Meyrick, Regional Sales Manager, Genetec Inc. “I would like to thank and congratulate our partner CDS for producing a high quality and cost-effective response that delivered against the customer’s requirements.”
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What role can social media play in security?