Fugue, the company putting engineers in command of cloud security and compliance, announces new capabilities for bringing public cloud container resources into compliance and ensuring the continuous security of container runtime configurations. The new capabilities deliver security and compliance visibility and reporting for managed container services offered by Amazon Web Services and Microsoft Azure and turnkey support for the CIS Docker Benchmark. The new Fugue features provide continuous co...
In light of the current global events, most of the human workforce is confined to their homes and business owners are actively seeking new ways to guard their personal and commercial assets 24x7. Enterprises of all sizes need smart and scalable security solutions to protect their physical capital and properties automated drones to guard assets Using automated drones to guard assets round the clock has become a necessity, and businesses are reaping great value by adopting autonomous drones for...
Like most industries, the fields of security, access, and safety have been transformed by technology, with AI-driven automation presenting a clear opportunity for players seeking growth and leadership when it comes to innovation. In this respect, these markets know exactly what they want. They require solutions that accurately (without false or negative positives) classify and track people and/or vehicles as well as the precise location and interactions between those objects. They want to have...
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announces enhanced integrations and business offerings in its OneView management dashboard to streamline security business operations for Managed Service Provider (MSP) partners. The latest expansion brings management of server products into the cloud console and also integrates directly with ConnectWise Manage business management solution, making it easier for MSPs to streamline billing, service ticketing, and...
Heald, an innovator in the field of perimeter security technology and the largest manufacturer of quality security equipment in the UK, has announced a partnership with Singapore-based ESCO Pte Ltd as it continues its international growth. The partnership will strengthen its position as a leading supplier of hostile vehicle mitigation solutions across Asia following installations including the Keppel Marina East Desalination Plant in Singapore. The distributor agreement will grant exclusive au...
Interface Security Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, announced the completion of a $60 million equity financing transaction led by its current sponsors SunTx Capital Partners and Prudential Capital Partners. The additional equity capital will help facilitate the company’s growth strategy and strengthen its capabilities, featuring highly differentiated managed services.&n...
HiveWatch, a security fusion startup company that uses multi sensor fusion to help companies respond better and effectively to physical security threats, has emerged from stealth and announced a seed funding round led by CrossCut Ventures, with participation from Freestyle and SaaS Ventures. Centralizing event data HiveWatch’s platform pulls data from a company’s disparate monitoring systems and security sensors to provide operators a single-pane-of-glass to evaluate and respond to alerts. By centralizing event data, HiveWatch reduces the security program noise that plagues operations By centralizing event data, HiveWatch reduces the security program noise that plagues operations, using multi-sensor analysis and machine learning to only elevate events that require a human response. With years of experience building comprehensive security programs for both unicorn startups and renowned Fortune 500 enterprises, HiveWatch’s Chief Executive Officer (CEO) and Founder, Ryan Schonfeld is addressing the biggest common challenge in building an advanced and state-of-the-art global security operations center. Security operations platform “We’re building a platform to make security leaders more aware, more connected, more proactive, and more informed,” said Hive Watch Chief Executive Officer and Founder, Ryan Schonfeld. He adds, “Noise from the wide range of legacy sensors that exist within most companies’ security infrastructure is only addressed by hiring more people to process the data, resulting in a reactionary security program yielding minimal return on investment. The overarching vision of HiveWatch is to help the security leaders we talk to every day gain the intelligence needed to make their teams more effective.” Multi-sensor analysis to reduce noise HiveWatch reduces 90% of the noise that plagues operations centers on a daily basis and allows operators to evaluate the remaining threats as fast as possible. Instead of operators switching between each sensors’ proprietary software to manually gather situational data, HiveWatch empowers operators by presenting all significant event feeds in one window as an alert comes in. Vast experience in technology startup execution HiveWatch is made up of top technical talent from Apple, Bird, Cisco, Disney, and NORAD HiveWatch is made up of top technical talent from Apple, Bird, Cisco, Disney, and NORAD, who have a broad combined security expertise in advanced military operations knowledge with high-growth technology startup execution. HiveWatch’s Head of Product, Jordan Hill has previously led multiple teams at Bird to develop machine learning solutions to contextualize hardware and software data for internal safety operations, sidewalk detection, and asset recovery that returned millions of dollars in capital investments and revenue globally. Enhanced interoperability and visibility “We were attracted to the background of this founding team, and their history and experience in scaling corporate security systems for high-growth companies like Bird,” said Brian Garrett, Co-Founder and Managing Director at Crosscut Ventures. Brian adds, “Ryan and Jordan have figured out how to bring interoperability and visibility into an antiquated software and hardware ecosystem. Their approach will make corporate security programs more accessible for both high-growth startups and Fortune 500 enterprises as we enter a post-Covid, data-driven paradigm.” Building scalable and efficient security programs HiveWatch is directing their funding to expand their team with new and diverse security leaders and system engineers to accelerate feature releases and onboarding customers from their wait list. “Interoperability has been a problem in physical security since I started my career more than 30 years ago,” said Ron Rothman, former President of Honeywell Security and a HiveWatch Advisor, adding “The nature of products available today has made scaling security cumbersome. With HiveWatch, you can build scalable and efficient programs by sense making and reducing noise across disparate security sensors.” HiveWatch is the multi-sensor security fusion platform that brings the right people, information, and tools together to achieve higher levels of security and safety. HiveWatch provides teams with access to the data they need, when they need it by delivering fused intelligence to empower proactive security.
AlgoSec, the network security management solution vendor, has introduced enhanced application visibility and auto-discovery features, and extended its integrations with SDN and SD-WAN solutions, in the new version of its core Network Security Management Suite. AlgoSec A32 version AlgoSec’s new A32 version gives IT and security experts the most comprehensive visibility and control over security across their entire hybrid environment. It enables organizations to align and manage their network security from a business perspective, giving them new automation capabilities for seamless, zero-touch security management across SDN, cloud and on-premise networks from a single platform. The key benefits that AlgoSec A32 delivers to IT, network and security experts include: Enable secure deployment of micro-segmentation in complex hybrid networks Built-in AutoDiscovery capability A32 automates identifying and mapping of the attributes, flows and rules that support business-critical applications across hybrid networks with the built-in AutoDiscovery capability. This accelerates organizations’ ability to make changes to their applications across the enterprise’s heterogeneous on-premise and cloud platforms, and to troubleshoot network or change management issues, thereby ensuring continuous security and compliance. Align and manage all network security processes from a single platform Risk detection and mitigation for cloud misconfigurations AlgoSec A32 version gives organizations instant visibility, risk detection, and mitigation for network or cloud misconfigurations, and simplifies security policies with central management and clean-up capabilities. This makes it easy to plan and implement micro-segmentation strategies to enhance security network-wide. Seamlessly integrate with SDN and SD-WAN solutions for enhanced visibility and compliance Seamless integration with SDN and SD-WAN solutions A32 seamlessly integrates with SDN and SD-WAN solutions, including Cisco ACI and Cisco Meraki A32 seamlessly integrates with SDN and SD-WAN solutions, including Cisco ACI, Cisco Meraki and VMWARE NSX-T to enhance visibility and ensure ongoing compliance with extended support for financial regulations such as SWIFT and HKMA. “The events of 2020 have highlighted how critical it is for network security experts to be able to make changes to their organizations’ core business applications quickly, but without impacting security or compliance across complex, hybrid networks,” said Eran Shiff, Vice President, Product, of AlgoSec. Maximising business agility and strengthening security Eran adds, “AlgoSec A32 gives IT and security teams the holistic visibility and granular control they need over their entire network to do this, enabling them to plan, check and automatically implement changes from a single console to maximize business agility and strengthen security and compliance.” AlgoSec A32 is the first version to run on the CentOS 7 operating system and is generally available currently in the market.
Johnson Controls, a provider of smart, healthy and sustainable buildings, announces results of independent surveys of 800+ building decision makers showing a clear shift to increased investment in healthy building trends and technologies. “At the center of a vision for a healthy world must be healthy buildings, and that means delivering on the most critical elements to serve People, Places and Planet,” said George Oliver, CEO of Johnson Controls. Game-Changing solutions “Our OpenBlue technologies reinvent the building landscape, creating dynamic smart facilities that help businesses meet their sustainability commitments, while delivering healthy places, enriched experiences and cost savings. Johnson Controls leads the industry in translating new building technology capabilities into game-changing solutions that deliver on our focus of People, Places and Planet.” As a pioneer in the category with 135 years of experience, Johnson Controls is ideally positioned with technologies and solutions that accelerate the reinvention of healthy buildings. The surveys confirmed the need is greater than ever, with 90 percent of responding firms having dedicated resources to healthy buildings initiatives. Reducing energy use Johnson Controls OpenBlue technologies deliver a unique, game-changing capability to solve for healthy places" “Building owners are struggling to balance urgent and conflicting priorities between employee health and wellness with critically needed cost savings, increased revenue and sustainability targets,” said Michael Ellis, executive vice president and chief customer & digital officer at Johnson Controls. “Johnson Controls is best positioned to help businesses meet those sustainability commitments while delivering on our customers’ return on investment,” Ellis said. The 2020 pandemic showed that few customers were able to reduce building operating costs despite lower occupancy, highlighting the need for technologies to deliver flexibility. “Energy use should be dramatically lower when occupancy is low, but surprisingly less than one in ten building operators were able to reduce energy use more than 20 percent,” Ellis said. “At a time when companies are aggressively pursuing energy and cost savings, customers need and want solutions that help them do better, while increasing the health profile of those buildings. Johnson Controls OpenBlue technologies deliver a unique, game-changing capability to solve for healthy places, while simultaneously serving sustainability goals.” Specific investment priorities The survey of facilities operators showed a range of specific investment priorities to meet goals for Healthy People, Healthy Places and a Healthy Planet: Healthy People - Businesses are increasingly committed to employee health and wellness as a driver of high performing teams. The studies show an increase in investments by organizations toward wellness, clean air and peace of mind. 80 percent of respondents stated that protecting the health and safety of building occupants during the COVID pandemic and afterward is very or extremely important. New factors are being included in this mix such as temperature control, disinfection, ventilation and air filtration which all require well maintained systems and equipment, enhanced through intelligent sensors and control software. The realities of the COVID pandemic have increased the potential benefit of these technologies and for contactless access and contact tracing. These capabilities can help increase overall building security through enhanced tracking of building guest and occupant access, flow and location, while maintaining trust. Johnson Controls delivers solutions for all of these needs and in support of broader wellness for people in shared spaces. Flexible facility monitoring Finding cost savings and making fast and informed decisions is a critical part of facility operations Healthy Places - Finding cost savings and making fast and informed decisions, supported by data, is a critical part of facility operations. In the Johnson Controls independent studies, 80 percent of facility executives stated that increasing flexibility to quickly respond to emergencies is a top driver for investment in technologies such as flexible facility monitoring and healthy air strategies. The spaces in which people work, shop, entertain and live become more inviting, more efficient and less expensive to operate over time. Space optimization, capital planning and increasing the uptime and lifetime of assets all support operational performance and lead to cost savings & increased revenue opportunities for building operators. Johnson Controls OpenBlue, a complete suite of connected solutions and services, leverages digital integration to optimize the performance of buildings and assets. Smart building technology Healthy Planet - Improvements in energy efficiency, renewable energy and smart building technology are becoming more critical each year. In the studies, 76 percent of facility executives stated that energy cost savings are a top driver for investment. These investments also influence corporate sustainability rankings, an important metric for attracting and retaining investors, employees and customers. Buildings are responsible for about 40 percent of the planet’s total energy consumption Buildings are responsible for about 40 percent of the planet’s total energy consumption and 36 percent of greenhouse gas emissions from energy use. But only 1 percent of buildings undergo energy efficient renovation every year. Effective action is crucial in aligning to increased regulation, decreasing energy consumption and increasing sustainability. For the health of the planet, the studies revealed that 57 percent of organizations plan to achieve net zero carbon or positive energy status in at least one facility in the next ten years. Energy-Savings performance Through ongoing efforts to create more healthy buildings, Johnson Controls has implemented more than 3,000 energy-savings performance contracting projects in North America alone. The result has been reductions of more than 29 million metric tons of carbon emissions from customer facilities and savings of $6B in energy and operating costs driven by a comprehensive suite of product and technology solutions. In fiscal year 2019 almost half of Johnson Controls revenue came from products and services that reduce energy use and improve sustainability. Johnson Controls helps building owners and occupants make efficient, productive decisions in support of healthy people, healthy places and a healthy planet.
Green Hills Software, the pioneer in embedded safety and security, announces the release of µ-visor™, its safe and secure embedded virtualization hypervisor, for the Renesas RH850/U2A microcontroller (MCU). Designed to support the emerging automotive cybersecurity requirements of ISO/SAE 21434 and UNECE WP.29 and to meet ISO 26262 ASIL D functional safety, µ-visor for MCUs expands Green Hills leadership in safe and secure virtualization technology and its product line. µ-visor joins the proven, broadly deployed INTEGRITY Multivisor® virtualization for application processors already used in tens of millions of commercial vehicles worldwide. Multiple virtual machines µ-visor is the basis for safe and secure consolidation of multiple MCU-based systems onto a single multicore RH850/U2A design, enabling savings in cost, size, and power for the resulting consolidated system, while at the same time simplifying the safety design of the system. µ-visor allows multiple virtual machines to run simultaneously, supporting a variety of scheduling By employing the advanced hardware-based assisted virtualization capabilities of Renesas’ RH850/U2A, µ-visor allows multiple virtual machines to run simultaneously, supporting a variety of scheduling and core management strategies to meet various automotive uses cases and to ensure extremely low overhead. The Green Hills MULTI® integrated development environment (IDE) and related ISO 26262 ASIL D-certified tools provide developers with tightly integrated tools that deliver unprecedented visibility into system performance and runtime behavior, enabling rapid integration and optimization of multiple workloads onto a single RH850/U2A MCU. Hardware virtualization function µ-visor can host a variety of operating systems, including AUTOSAR environments from third-party vendors, Green Hills Software’s own µ-velOSity™ operating system, customer in-house operating systems, or micro-executive designs, giving customers a great deal of flexibility on how to design consolidation for their automotive controller use cases, including support for ECU safety islands. The Renesas RH850/U2A is the world’s first MCU with embedded flash that integrates a hardware-based virtualization-assisted function while maintaining the fast, real-time performance that customers expect of the RH850 products. The hardware virtualization function supports ISO 26262 ASIL D functional safety, enabling greater levels of system integration of the safety applications of automotive OEMs and Tier 1s into a single, unified MCU-based electronic control unit (ECU). Multiple software services µ-visor from Green Hills Software fully supports all of these advanced capabilities To support ASIL D, the hardware-based virtualization technology allows customers to implement multiple software services with different functional safety levels on the RH850/U2A MCU that can run concurrently without interference while maintaining the hard real-time deterministic performance required to control modern and future vehicle functions. µ-visor from Green Hills Software fully supports all of these advanced capabilities. “Renesas and Green Hills have been working together for decades to provide the best functional safety solutions for Renesas MCUs for our mutual customers,” said Naoki Yoshida, Vice President of Automotive Digital Products Marketing Division at Renesas. Challenging consolidation requirements “Renesas RH850/U2A’s hardware-based virtualization assisted technology and Green Hills Software’s extensive experience with virtualization and Renesas’ products is a natural combination. We’ve worked together to address our customers’ most challenging consolidation requirements, and µ-visor enables the full utilization of the advanced capabilities of our latest MCUs.” “Green Hills Software’s virtualization technology for application processors is already in production in tens of millions of vehicles today,” said Matthew Slager, Vice President of Asia-Pacific Operations at Green Hills Software. “By extending our virtualization technology expertise and experience into the MCU market with µ-visor and working with Renesas, Green Hills Software can offer best-in-class performance, functional safety and cybersecurity on the RH850/U2A, allowing automotive customers to achieve the challenging goals of developing and deploying highly performant and entirely safe and secure ECU consolidation.”
Allot Communications Ltd. (Allot Ltd.), a global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers and enterprises, has announced that a new mass-market cyber security solution, Allot DNS Secure, will join the Allot Secure family of cyber security solutions for communication service providers (CSPs). Allot DNS Secure The new Allot DNS Secure solution is supported by an agreement with Open-Xchange to license its OX PowerDNS technology, which will be integrated into Allot DNS Secure. DNS Secure is designed for CSPs who want to deploy a security solution primarily for fixed broadband subscribers. The solution provides protection against a broad range of cyber threats including malware and phishing and offers content filtering. It is deployed with a ‘light touch’ on the CSP network either as a standalone solution or together with other solutions in the unified Allot Secure family, such as HomeSecure, NetworkSecure and EndpointSecure. OX PowerDNS technology OX PowerDNS technology complements Allot’s comprehensive threat database and unique proxy capabilities OX PowerDNS technology complements Allot’s comprehensive threat database and unique proxy capabilities, such as carrier grade performance, multi-protocol enforcement and scalability up to many millions of subscribers. As a network-based cyber security solution, DNS Secure enables effortless user onboarding, eliminating the need for subscribers to download, install or update any software. Scalable end-user protection against malware “Building its new network-based cyber security solution on the OX PowerDNS platform will allow Allot to offer quick, comprehensive and scalable end-user protection against malware and phishing, combined with content filtering options, to its communication service provider customers,” said Neil Cook, PowerDNS Head of Product at Open-Xchange. “The agreement with Open-Xchange enhances the Allot cyber security portfolio with an additional high-quality product. It gives Allot the flexibility to address the needs of CSPs that want to provide additional cyber protection measures to their customers,” said Mark Shteiman, Vice President of Product Management at Allot Communications.
Finbarr Solutions, a foremost global security & risk management consultancy, announced the launch of free face-to-face video consultations with a member of the Register of Chartered Security Professionals. The service is available to any organization that would benefit from expert independent advice, regarding their security requirements and systems, manning levels, and/or security postures. Assess security provision The Register of Chartered Security Professionals was established under a Royal Charter issued to the Worshipful Company of Security Professionals in the UK and was launched in 2011. It is widely recognized as the gold standard of competence in the security industry. Ciaran Barry CSyP is the Managing Director of Finbarr Solutions and joined the Register in 2019. Ciaran comments, “January is often an ideal time to assess security provision for the year ahead, whether it is reviewing the performance and ongoing suitability of existing systems, preparing tenders for new services and solutions or assessing skills and training requirements.” Free consultation Many small organizations don't have easy or affordable access to expertise, thus Finbarr is launching free consultations The 30-minute free consultation can also be guided by a specific issue or topic such as handling sensitive workplace investigations, legal requirements for employees working from home, or dealing with cybercrime. Ciaran cites specific guidance that every organization can benefit from, in terms of preparedness and agility, to face the uncertainty of the year ahead, “Last year many business continuities and crisis management plans were conceived and initiated on the fly.” “It is important to frequently take stock of what is working, what needs to improve, and how to go about making the right decisions. Many smaller organizations struggle as they don’t have easy, or affordable access to expertise. It is for this reason Finbarr Solutions is launching free consultations.” CSyP education & experience In addition to the CSyP post-nominal, Ciaran has a Diploma in Security Management (with Distinction), a BA Hons Degree in Business Studies and holds an ASIS Certified Protection Professional qualification (CPP). During his career, Ciaran has also spent ten years serving in the British Army and eight years at Hertfordshire Constabulary as a detective.
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
This year has brought about changes in virtually every sector. As with other frontline industries, the security sector has been tested more than those able to move entirely to remote working. While the promise of a vaccine means an end is in sight, the post-COVID era will not bring with it a return to the ‘normal’ we knew before the pandemic. Organizations have adapted, becoming more resilient and agile and this will have lasting effects. The coming months will continue to be testing. The tiered system will see the precautions in place fluctuate with the situation. Initial lockdown period At the same time, a gradual return to normal as the vaccine is rolled out will require adaptive measures. The security sector will be at the heart of keeping people safe throughout this process. The initial lockdown period and the first wave of panic buying might seem like a lifetime ago. However, the introduction of the second lockdown in November was accompanied by another wave of stockpiling despite organizations trying to reassure their customers. It is uncertainty that breeds anxiety, and we continue to see this as the restrictions fluctuate across the country. The tier system depends upon a number of factors: case detection rate, how quickly case numbers are rising or falling, positive COVID-19 test numbers in the general population, pressure on the NHS in that region, and local context and exceptional circumstances. Social distancing measures For the sector to meet demand, technology will be needed to work alongside the manned guarding role While travel is allowed in all tiers if necessary for work, government advice still recommends that those able to work from home should do so. This means that throughout the country, many buildings will remain empty or at minimal capacity for some time to come. Security risks vary with the restrictions in each area. Although shops are largely open, tier three still requires the closure of many premises. Vacant premises are more vulnerable to theft and damage, meaning officers and security technology remain in higher demand than usual. As more premises are allowed to open, the need for officers to implement social distancing measures increases, stretching the sector like never before. For the sector to meet demand, technology will be needed to work alongside the manned guarding role. Temperature checking devices It will continue to be important in providing security when officers cannot be present in person through CCTV and sensors. But it will also be integrated into the manned guarding role to streamline processes. We are already seeing the start of this as many officers are using handheld temperature checking devices to reduce the spread of COVID-19. We’ll also see temperature scanners installed into buildings to allow security guards to focus on other priorities. Those businesses that are open will need to continue to adapt to the changing regulations in the coming months. Christmas is a busy period that stretches the retail sector. Unpredictability results in heightened stress levels and makes it more difficult for people to reliably take in and recall information. Security officers are a key first point of contact both to enforce measures and reassure anxious staff and members of the public. Enforcing one-Way systems Security staff will need to keep members of the public safe and prevent disruption Some shops are enforcing one-way systems and limiting the number of customers allowed inside. Over Christmas, many more may choose to do so. Security officers will be responsible for ensuring these precautions are followed. With the heightened pressure of the festive period, it can be hard to predict how members of the public will respond to officers enforcing measures. Security staff will need to keep members of the public safe and prevent disruption. Doing so will require tact and empathy in dealing with customers. Within shops, too, officers will be tasked with ensuring social distancing and other measures are followed effectively. Doing so, they must work closely with clients to understand what protocols are in place and how to handle a breach. They must also be able to enact discretion. For example, clients may not take issue with protocols being broken momentarily or accidentally. Extensive government guidance There is extensive government guidance on the precautions that should be taken on various premises. They include the introduction of one-way systems and limiting building capacity. Measures such as one-way systems may be broken by those that don’t notice or don’t care. Officers must be able to judge what responses are appropriate while maintaining a calm and reassuring presence. The security officer role has long been moving toward a more front of house position as, for many visitors to a building, they are the first point of contact. The pandemic has accelerated this trend. Working on the frontline of the pandemic, officers have had to play a more multifaceted role than ever before. Officers still act as deterrents and manage security issues, but they must also use empathy and strong communication skills to inform and reassure customers and staff onsite. Adapting to new technology They will need to be able to learn quickly on the job and adapt to new technology and practices Being able to demonstrate this flexibility and to read a situation and react appropriately will be some of the skills most in demand in the industry in the future. Officers will need to build close working relationships with clients. In addition, many will have new roles, such as taking temperatures with handheld devices. They will need to be able to learn quickly on the job and adapt to new technology and practices. Technology, too, will be more important. If the global pandemic has driven any point home, it is that we cannot always see or sense threats. Data-Driven insights Temperature checks and occupancy sensors will be the norm in protecting from COVID, while security technology and data-driven insights will continue to grow in popularity. The security sector specializes in adapting to the unexpected and the threatening. It continues to demonstrate incredible value through the pandemic. While the coming months will undoubtedly be trying, the sector is adapting. Lessons have been learned from the pandemic that will affect business globally. Security specialists are taking these on and creating a stronger and more effective industry.
The explosion of artificial intelligence used to enhance business processes, propel innovative products, and further automation has touched essentially every industry to date. The security sector, notable for its maturity and complexity, is not exempt from the AI tidal wave. In fact, quite the opposite, the security sector and more specifically the domain of video surveillance have seen an emergence of AI-powered solutions both hardware and software. The widespread adoption of IP cameras, cloud computing capacities, and smart sensors have paved the way for new AI products and solutions to function at scale. AI-powered video analytics One application of artificial intelligence for the video surveillance sector is the use of video analytic solutions to analyze video streams in order to extract pre-determined objects, behaviors, or situations. To give some examples, AI video analytics can be used to monitor perimeter crossing for border control, detect fevers or masks in airports or public spaces, arms detection in casinos, or be used to filter out alarms triggered by benign movements versus real intrusions. This application of artificial intelligence leans on its specific branch, machine learning, which uses a complex series of AI models to analyze the content of the video flow, autonomously identifying and classifying the videos according to predefined rules. Adopting technology AI video analytics yields promising benefits, a reduction in operational costs, and an increase in safety, and a decrease in risk When AI video analytics are used effectively, they yield very promising benefits. A jump in video flow analysis from an average of 10% by humans to 100%, a reduction in operational costs, and an increase in safety, and a decrease in risk. The use of AI video analytics for surveillance sounds simple enough, however, there are several perceived factors inhibiting security organizations from adopting the technology. Adopting AI into your video surveillance operation The security industry is capital intensive, complex in its IT structure, and diverse in situational business needs. Therefore, resulting in a perception of high effort, time, and costs required to successfully integrate AI into your video surveillance operation. However, these effort constraints can be debunked due to the flexibility of video analytic solutions. Three areas that deter security organizations from adopting AI Existing capital A surveillance operation contains a network of cameras that film with a range of video qualities. AI video analytics can analyze a range of videos from low to high resolution in thermal, infrared, and visible formats AI video analytics often operate on smart cameras that have the appropriate video image quality for the capacity of content analysis. The costs involved in overhauling legacy camera systems, converting videos into higher quality, or waiting until the current camera network is ready to be replaced in order to integrate AI is expensive, time-consuming, and often unfeasible. However, not all AI video analytic solutions need to be deployed on edge with smart cameras. Instead, video analytics can be deployed both directly on to the camera or have server-based integration maintaining and scaling to your existing camera network. AI video analytics can also analyze a range of videos from low to high resolution in a variety of formats: thermal, infrared, visible. Complex IT structure A single central command center or in-house security network operates in a multi-manufacturer environment. This means cameras, video management systems, and technology partners can be provided by several manufacturers therefore increasing the complexity of successful IT workflows and integrations. Theft or perimeter infringement can take place in a matter of minutes, therefore the transfer of information between solutions is required to function at top speed. To overcome this complexity, the successful integration of solutions in a multi-manufacturer environment is assured through industry enforced standards set by non-profit organizations. This allows for third-party solutions such as AI video analytics to be easily integrated into the bulk of software and hardware technologies. Diversity in security needs To obtain high performance in a diverse security setting is inherently built into AI video analytic machine The objective of a surveillance operation can vary greatly from one organization to another. Retailers prioritize theft detection, while city governments may be concerned about arms detection or people counting. The capacity for AI to function with high performance, meanwhile adapting to several organization’s security needs requires algorithms to be trained accordingly. To obtain high performance in a diverse security setting is inherently built into how AI video analytic machine learning model’s function. AI can be trained to adapt to different environments and uses progressive learning to increase performance overtime. A collaborative effort between security experts, data scientists, and business strategists will ensure high performance and an appropriate application of AI to fit each organization’s specific needs. Surveillance innovation moving forward While for some video surveillance organizations, the costs and time associated with successfully integrating AI into their network may seem daunting, there are ways to adapt new technology into an existing operation with minimal effort. The emerging presence of smart cameras and IoT products will only accelerate the adoption of AI moving forward. If your organization is looking to enhance its operation with emerging technologies, now can be the time.
Consolidation continued in the physical security marketplace in the turbulent year 2020. There were several mega-deals in addition to shuffling among small and medium-sized companies. Here is a sampling of companies that changed hands this year, compiled from our archive of company news. With the changing economic climate, how much more is ahead in 2021? Stay tuned. Wesco merges with Anixter WESCO International, Inc., a provider of business-to-business (B2B) distribution, logistics services and supply chain solutions, announced it completed its merger with Anixter International Inc., creating a premier, global B2B distribution and supply chain solutions company. Anixter becomes a wholly owned subsidiary of WESCO International. ACRE acquires Razberi ACRE acquired Razberi Technologies, Farmers Branch, Texas, and the product line of intelligent video appliances, automated security software and health monitoring software will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Motorola acquires IndigoVision Among the benefits is enhanced geographical reach across a wider customer base Motorola Solutions says the IndigoVision range of products, global presence and customer base are ‘highly complementary’ to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. Motorola acquires Pelco “Pelco’s track record of innovation, internationally recognized brand, global channel and customer installed base enable us to further expand our global footprint with enterprise and public safety customers,” said Greg Brown, Motorola Solutions’ Chairman and CEO, about the iconic brand. Johnson Controls swallows Qolsys Qolsys Inc., residential and commercial security and smart-home manufacturer, enhances Johnson Controls global innovation platform, delivering next generation security and smart building solutions. JCI had already owned a majority stake in the company since 2014. ADT and Google Home partnership The partnership will combine Nest’s award-winning hardware and services, powered by Google’s machine learning technology, with ADT’s installation, service and professional monitoring network to create a more helpful smart home and integrated experience for customers across the United States. Upon the closing of Google’s equity investment in ADT, Google will own 6.6% of ADT’s outstanding aggregate common equity. Securitas acquires STANLEY in Five Countries The acquisition is aligned with Securitas’ ambition to double the size of its security solutions Securitas acquired STANLEY Security’s electronic security businesses in Germany, Portugal, Switzerland, Singapore and India. The acquisition is aligned with Securitas’ ambition to double the size of its security solutions and electronic security business and expands Securitas’ electronic security footprint and capabilities. Allied Universal to Buy G4S Ending the year on a high note, the boards of directors managing Allied Universal and G4S reached an agreement on the terms of a recommended cash offer. The deal brings to a close a six-month bidding war for G4S. The combined business is expected to generate approximately $18 billion in annual revenues with a global workforce of more than 750,000 people in 85 countries. Quantum acquires Western Digital business line Quantum Corporation entered into an agreement with Western Digital Technologies, Inc., a subsidiary of Western Digital Corp., to acquire its ActiveScale object storage business. The acquisition demonstrates Quantum’s commitment to innovation and growth, extending the company’s leadership role in storing and managing video and unstructured data using a software-defined approach. AVA/Vaion/Jazz Networks Ava, a unified security company, announced the completion of the merger between Jazz Networks, renowned cyber security insider threat detection and response firm; and Vaion, an end-to-end video security solutions provider. Ava is now positioned to deliver unified cyber and physical security solutions to organizations worldwide.
As the new Chief Executive Officer of Milestone Systems, Thomas Jensen pledges to continue the company’s focus on protecting people and assets and to help organizations gain insight and optimize their business processes. Seeking to fulfill Milestone’s mission to ‘Make the World See,’ Jensen will maintain Milestone’s approach of being an open video management system (VMS) platform and having an open company culture. End-User communities “I will also be working to expand Milestone’s VMS into new areas and applications —for example, to monitor beach erosion as the climate continues to warm up around the world,” says Jensen. “I believe the future of VMS is about bridging the gap between security and applications that go beyond security.” Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel. His experience as a generalist – extending beyond IT – enables understanding of the business side of things in addition to the skills, strengths and motivations of the people who work at Milestone, its channel, partner networks and the end-user communities. People-First approach “One crucial thing my career taught me is the importance of your team members,” he says. “A former manager once told me that success is the sum of the success of your team. And, luckily, Milestone already has a strong culture and people-first approach. This is one of the things that attracted me to this job.” The new CEO plans to spend his first 90 days building relationships and getting to know the company and the team members. He will be present in conversations with all Milestone people as well as partners and system integrators. “I want to ensure there is continuity and resilience so that my joining Milestone is a seamless transition,” Jensen says. “Furthermore, my focus will be to further build on the strengths of Milestone to create long-term sustainable growth.” Video-Enabled insights Jensen sees security through two lenses: on one hand, protecting people and property, and on the other, providing video-enabled insights for public and private companies to be able to make better decisions. On the protection side, businesses have room to grow as technologies move to provide more affordable, more powerful, and more interoperable solutions. A transformative element in the future evolution of video management is the cloud Regarding video-enabled insights, there is great potential, and Milestone is forging deeper relationships with partners and system integrators of important verticals such as cities, education, transportation, and retail. A transformative element in the future evolution of video management is the cloud, which will advance the deployment of technologies across the board. Best software integrations “I will be spending time working with our organization and partners to evolve Milestone’s cloud strategy and cloud partnerships to address the opportunities that lie ahead,” says Jensen. “I also think that Milestone’s belief in being open and giving integrators and end-users the freedom to choose the best software integrations available in the market is a philosophy that we've held dear from the very beginning — and this will become critical in the future as VMS solutions continue to evolve.” Safer business environment As the COVID-19 pandemic has raged on, Milestone Systems has continued its operation as usual, deploying safety measurements as needed to protect both employees and the partners they work with. COVID-19 has impacted everyone, every business and every government and organization around the world, says Jensen. We’re working with our partners to design a safer business environment with VMS-enabled solutions" “I think it taught us all a lesson in empathy and how we need to respect differences in behavior, regulations and compliance, customs and even each other,” he says. “At Milestone, we’re working with our partners to design a safer business environment with VMS-enabled solutions for social distancing, queue management, and contact tracing.” Creating security solutions “The past 50 years of digital technology and the past 20 years of IP technology have taught us that technologies eventually converge, and in some cases merge,” says Jensen. “Sometimes functions merge and channels converge, other times it’s the networks that come closer together, but none of this is absolute and universal.” “This is why we need to listen and learn from each other and be respectful of differences in the industry and the channel—particularly cultural and regional differences.” Jensen adds: “The technology company of the future — which I believe Milestone is becoming — will not dictate solutions but will instead partner with IT and security stakeholders to create security solutions that meet each customer’s unique challenge and environment.”
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Synectics, a globally renowned company in the design, integration and support of advanced security and surveillance systems, announced that the company has won a new contract with Irish Rail (Iarnród Éireann) to upgrade all InterCity Mark 4 rolling stock on the Dublin to Cork route to an IP-based video surveillance solution, following a competitive bid process. The IP video security system contract will see Synectics develops and installs an innovative safety-critical IP video surveillance system that enables full connectivity from trains to the control room, there by replacing the existing CCTV approach. Safety-critical IP video surveillance system installation Each eight-coach train set, using Synectics’ T2000 platform, will help utilize a suite of IP 360-degree ‘fish-eye’ cameras Each eight-coach train set, using Synectics’ T2000 platform, will help utilize a suite of IP 360-degree ‘fish-eye’ cameras, in the vestibules and saloon areas, to provide high-quality surveillance information. Installation is expected to commence in September 2021, to be followed by an additional support contract to provide a five-year in-territory maintenance program. IP video security technology Iain Stringer, Managing Director of Synectics, commented “We are delighted that Irish Rail has chosen our IP video security technology, alongside our design, program management and installation capabilities, to upgrade surveillance on one of their premier InterCity routes.” Iain adds, “This win with Irish Rail represents a further step into on-vehicle heavy rail solutions for our Synectics Security business, building on our deep experience across light-rail markets.” Smart technology developments He further stated, “Irish Rail is our second public transport win in Ireland over the last few months and reflects our growing reputation for smart technology developments that meet next generation operator requirements. Our approach is opening up new opportunities for all rail operators to transition their video management capability to the cloud and improve operational effectiveness.”
The first phase in a pioneering smart transport project to transform security, passenger service, and operational management across Berlin’s S-Bahn rail network has officially gone live. Teams based at S-Bahn’s ‘4S’ operational headquarters are now, via the latest developments in Synectics’ Synergy hybrid cloud software platform, able to connect, respond, and collaborate with passengers and staff on-board trains, at stations, and with field personnel working anywhere across the network. Synergy hybrid cloud software The new capabilities, including an innovative mobile application, mark a revolutionary step forward in the way operational command, control, and communications are carried out within urban rail environments. The project, which went live as scheduled on 1 January, is the result of an innovative partnership between S-Bahn Berlin GmbH (a subsidiary of Deutsche Bahn) and command and control solutions expert, Synectics. The two companies’ combined ambition has led to the development of a tailored system that delivers a positive customer experience both now and well into the upcoming decade. Integration with S-Bahn’s proprietary systems Leveraging powerful tools to form custom API gateways, Synergy integrates to S-Bahn’s proprietary systems Leveraging powerful tools to form custom API gateways, Synergy integrates to and interoperates with S-Bahn’s proprietary systems, as well as all third-party technologies, devices, and communication solutions vital to passenger service, safety, and security. This is achieved in real time, and continuously informed by sensor data obtained from integrated systems crucial to operating safe and efficient passenger services. The new Synergy mobile application will enable S-Bahn’s workforce to receive automated task assignments based on their role, skills, and location, and to directly update the system on their delivery of those tasks, the sophisticated level of integration and interoperability achieved is unprecedented. Intelligent digitization of workflows Henning Oelze, Project Manager at S-Bahn, commented “Synergy’s powerful integrations, intelligent digitization of workflows, workforce management capabilities, and computer-aided dispatch functionality combine to deliver a hugely exciting outcome. The platform offers complete visibility of network-wide activity and the ability to coordinate and automate the right response, at the right time, to any requirement.” Henning adds, “It was with huge pleasure that we saw our first trains and Security and Service teams utilizing the new Synergy system, especially given how challenging this last year has been. It really is a revolutionary step forward in our mission to deliver outstanding passenger service, while at the same time, making life much easier for our personnel through the advanced automation of operational processes.” Rapid resource communication and deployment From fulfilling a planned maintenance task to sending people with the most appropriate training to deal with an evolving security or safety issue, Synergy will facilitate the rapid communication, deployment, and appropriate action of different teams. This will equip S-Bahn to process and react to events within pre-defined response times, and to manage its workforce as effectively as possible. The project is scheduled to continue during 2021, with the two organizations building further technical capabilities and driving ahead with continuous improvement. Key enhancements will see extensions to the workforce management functionality and more developments to improve operational efficiency within incident and task management assignments. Smart transport systems standards Some of the software developments driven by this project will have long term implications for the sector" Greg Alcorn, Director, Global Sales & Customer Success at Synectics, said “S-Bahn Berlin is viewed as a technological trail-blazer and we’ve thoroughly enjoyed working with such a well-organized team to deliver the first step in their truly inspirational vision for urban transport.” Greg adds, “Some of the software developments driven by this project will have long term implications for the sector. I have no doubt that there are new standards being set here for smart transport systems of the future.” Future of smart transport operations In addition to the ground-breaking technology used, the project also demonstrates the advances that can be achieved through international collaboration. Henning Oelze stated, “Having such direct access to Synectics’ product development team in the UK and knowing that they understood how agile we needed this solution to be, has made a huge difference." He adds, “They shared our vision for the future of smart transport operations in a major European capital and worked in close partnership with the S-Bahn team, successfully navigating their way through the technical, logistical and cultural challenges of a major international project. The close nature of this collaboration is the reason we have reached this crucial go-live milestone, despite all the hurdles that 2020 put in our way.”
Two museums, a single security environment. As a result, access management was eating up significant time and budget for the museums’ Technical and Security Manager. The solution for simpler access management was eCLIQ, an electronic locking system built around easy-to-fit cylinders and programmable, battery-powered keys. The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential — for both internal and external users. They needed a system able to cope easily with changes, site extensions and two-site operation; a solution which would remove the need to change all cylinders when an employee loses a key. Simplified access management Now the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders across the two sites. The eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key-holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Monitoring service providers Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to both employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers — and their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. Fitting eCLIQ locking was simple and wire-free: museum staff performed the installation themselves. One training session with the admin software was sufficient to put them at ease with their new system. Efficient energy management Looking after eCLIQ components is also easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. AES encryption, rapid processing and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. “I am very happy with the eCLIQ solution,” says M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums. “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council to show the effectiveness and simplicity of the eCLIQ solution. Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
nmcn Asset Security has been awarded a contract to provide capital security upgrades prior to planned and reactive security maintenance to the Exeter based Headquarters of the Met Office. The agreement will see nmcn provide a turnkey design and build security upgrade to implement the latest technology and systems across the Met Office Exeter HQ estate which houses the majority of their circa 2000 workforce. Critical weather services Following key upgrade works across the Met Office HQ estate, nmcn will then take responsibility for planned and reactive maintenance of security systems and associated technology. The relationship with the Met Office strengthens nmcn’s regional focus in the South West, who are a tier one partner to South West Water, as well as numerous other regional clients. The Met Office is the national meteorological service for the UK, providing critical weather services and climate science for domestic and overseas use. Since their foundation in 1854, the Met Office has pioneered the science of meteorology and its application. To this day, they continue to push the boundaries of science and technology, to meet the demands of today and the future. Formal business ownership The Met Office is a British institution with a strong heritage for leading public service" Adam Smith, Managing Director of Asset Security at nmcn, said: “The Met Office is a British institution with a strong heritage for leading public service, military and commercial forecasting around the world. The security of their operations is paramount and I’m delighted we’re able to support them through this contract. We look forward to working closely with the Met Office over the coming years to bring value, collaboration and quality.” The ultimate responsibility and accountability for the work of the Met Office is with the Secretary of State for Business, Energy and Industrial Strategy. Day-to-day ministerial oversight and the formal business ownership role are delegated to the Minister of State for Universities, Science, Research and Innovation. Security framework positions Met Office Security Manager, Richard Kevern, said: “As we continue to deliver critical weather forecasting and climate science services, the security of our people and assets is of paramount importance. We look forward to working collaboratively with nmcn on both the capital and maintenance program over the coming years.” nmcn also recently secured a Framework position with the NHS Shared Business Services to provide security solutions to the NHS, across the UK and hold Security Framework positions with the Crown Commercial Services, Defra and multiple Regulated Utility providers.
HID Global, a pioneer in trusted identity solutions, announces that aerospace company Avolon has selected the HID Mobile Access® solution for physical access at its headquarters in Dublin and other locations worldwide. Powered by HID’s award-winning Seos® credential technology, the solution enables Avolon to issue staff Mobile IDs to smartphones for building access and provides an efficient management platform for its global network of offices. Maintaining secure perimeter Avolon is one of the aircraft leasing companies servicing many of the world’s major airlines. HID partnered with Ireland-based systems integrator Summit Security Systems Ltd to deploy the HID Mobile Access solution and HID® readers throughout Avolon’s Dublin campus. Mobile IDs are sent to Avolon staff via an app on a user’s Android or iOS mobile device so they can quickly and easily use their phones to gain access to Avolon facilities. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility" “We needed to maintain a secure perimeter, but we did not want the security to be a barrier. Using a mobile phone is much more convenient than an access card and phones tend not to get left behind,” said Allan Dawson, facilities project manager at Avolon. “We were looking for a system that was highly flexible, highly mobile and highly secure. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility.” Touchless access control The HID Mobile Access solution facilitates around-the-clock office access for staff members and equips administrators to manage access rights from a centralized, cloud-based portal. Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency. “Avolon’s use of HID Mobile Access makes touchless access control possible for a more seamless user experience, which is appealing to many organizations in today’s new normal,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control with HID Global. “The scalability of our solution also lays the groundwork for Avolon to easily extend mobile access across more of its facilities.” Following the successful deployment of mobile access at its Dublin headquarters, Avolon has also launched the HID Mobile Access solution at its New York, Florida and Hong Kong offices, with plans underway for its Singapore campus.
Contracts for two additional COSMO-SKyMed Second Generation (CSG) satellites have been signed with the Italian Space Agency (ASI) and the Italian Ministry of Defense. Satellites 3 and 4 will complete the second generation of the Italian earth observation program, ensuring continuity and high performance of the planet's monitoring services. Continuous technological research Alessandro Profumo, Leonardo CEO commented: “COSMO-SkyMed is one of Italy’s great success stories, a driver of technological research, new applications, industrial competitiveness and employment, as well as fundamental infrastructure for the protection and security of Italy and Europe.” As Leonardo, we are proud of the contribution provided in all phases of the COSMO-SkyMed program" “Thanks to the capabilities demonstrated in the management of emergency situations linked to sudden events, the systems potential in terms of reliability, precision and flexibility are known internationally. In addition, its capabilities are now further enhanced by the second generation, with continuous technological research. As Leonardo, we are proud of the contribution provided in all phases of the COSMO-SkyMed program, a role that gives us credibility and prestige with our customers all over the world.” SAR satellite system COSMO-SkyMed is an Earth observation satellite system of ASI and the Ministry of Defense, a flagship of Italian technology and innovation, built by Leonardo and its joint ventures Thales Alenia Space and Telespazio. It is a dual-use constellation, with SAR ‘eyes’ (Synthetic Aperture Radar) capable of monitoring the phenomena of the Earth in any weather condition. COSMO-SkyMed has changed the way of observing the planet, ensuring fundamental information for the security and the understanding of phenomena that affect everyday life. With the innovative updates built into the second generation COSMO-SkyMed is the first SAR satellite system in the world capable of simultaneously acquiring two images of two areas hundreds of kilometers apart and thus serving two requests that would have been in conflict for any other satellite system. Medium-Sized enterprises COSMO-SkyMed images are used to support populations affected by natural disasters such as earthquakes and fires, but also for the control of cultural and artistic heritage, of critical infrastructures, for monitoring the receding of glaciers, that of oil spills in the seas and for the optimization of agricultural techniques. The constellation will be completed with the additional two satellites just announced which will join the first two The first Second Generation satellite was launched a year ago. The second satellite will be launched on a VEGA-C launcher. The constellation will be completed with the additional two satellites just announced which will join the first two. The COSMO-SkyMed system, of the Italian Space Agency and the Ministry of Defense, is the result and expression of the best skills of the Italian space industry, with Leonardo and its joint ventures Thales Alenia Space and Telespazio, assisted by a significant number of small and medium-sized enterprises. Providing star trackers In particular, Thales Alenia Space, a joint venture between Thales (67%) and Leonardo (33%), is responsible for the entire radar system and satellites, while Telespazio, a joint venture between Leonardo (67%) and Thales (33%), is responsible of the ground segment and hosts the command and control center of the constellation at the Fucino Space Center. Leonardo also contributes to the program by providing the star trackers (A-STR) for the orientation of the satellite, photovoltaic panels (PVA) and electronic units for the management of the electrical power. The first generation has four satellites launched between 2007 and 2010, while the first satellite of the new generation was launched in December 2019. The COSMO-SkyMed constellation is able to acquire up to 1800 images per day that Leonardo, through e-GEOS (Telespazio 80%, ASI 20%) receives, processes and markets all over the world.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Security service: Manufacturers & Suppliers
- Bolide Security service
- Dedicated Micros Security service
- Dahua Technology Security service
- VIVOTEK Security service
- Seagate Security service
- Hanwha Techwin Security service
- ITI Security service
- Vigilant Vision Security service
- Vanderbilt Security service
- OT Systems Security service
- Messoa Security service
- HID Security service
- Panasonic Security service
- Nedap AEOS Security service
- Tamron Security service
- LILIN Security service
- AMAG Security service
- Parabit Security service
- Pelco Security service
- Videotec Security service