Global cybersecurity firm, GRA Quantum announces the launch of its Security Operations Center and Managed Security Services offering. Over the last 24 months, GRA Quantum has successfully partnered with clients in special requests to support managed security services functions. Offering these stand-alone services through an onsite Security Operations Center is new to the organization. 24/7 Cybersecurity Monitoring Earlier this year we built a state-of-the-art Security Operations Center" Accord...
Ping Identity, the provider of Identity Defined Security, announced the public preview of PingOne for Customers. The cloud-based Identity as a Service (IDaaS) offering is built for the developer community and provides API-based identity services for customer-facing applications. It can help large enterprises launch apps faster, replace custom identity services that are difficult to maintain, and facilitate the transition from on-premises deployments to cloud-hosted services. By making it easy t...
Security-Net, Inc., a global provider of security system services, is celebrating its 25th Anniversary this year, a testament to the strength of the organization that today brings together the best independent security systems integrators to collaborate on enterprise-level projects, technology acumen and business practices. Security Systems Integrators Group Since its founding in 1993, Security-Net has been recognized as the top group of security systems integrators within the industry Since i...
KnowBe4, provider of the world’s largest security awareness training and simulated phishing platform, announced the results of an independent survey, which found that an overwhelming majority of corporations – 96% – say security awareness training improved their corporate security culture. Further, an 86% majority of respondents say the training lowers the overall risk posed by cyber security scams. These are the findings of the KnowBe4 2018 Security Awareness Training Deploym...
GlobalPlatform, the standard for secure digital services and devices, has released version 2.3.1 of its Card/Secure Element (SE) Specification. The release supports the latest extensions of GlobalPlatform technology following widespread deployments in consumer and machine-to-machine (M2M) devices. 100% of the 1 billion SEs embedded in smartphones in the last three years are GlobalPlatform-certified and more than 5.5 billion GlobalPlatform-certified SEs were produced in 2017. Amendment I –...
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research program to provide valuable feedback to the GSA Schedule 84 program and on t...
SentryNet, a wholesale central station monitoring service founded in 1987, is pleased to announce they will be expanding their monitoring footprint by adding a monitoring center in Lacey, Washington. Currently, SentryNet has two UL/FM/NISPOM listed hot redundant monitoring centers in Memphis, Tennessee and Pensacola, Florida, and provides monitoring for more than 650 independent alarm dealers, primarily based in the Southeast. Over the years, SentryNet has continued to expand their dealer footprint in the west and will be opening a monitoring facility in Lacey, Washington, to ensure they are able to provide the best service to dealers coast-to-coast. As part of the expansion, SentryNet will consolidate the Pensacola, Florida, monitoring center to Memphis, Tennessee. A Pensacola, Florida, office will remain and act as the primary sales and dealer relations location. Monitoring Software Platform “2018 has been a transformational year for SentryNet. We have made significant investments in upgrading our monitoring platform and now opening a new monitoring facility,” said Vice President of Dealer Sales Julie Beach. “In the coming months, we will also be launching a complete dealer program that will round out our vision of truly being a full business life cycle partner to security dealers across the nation.” In January 2018, SentryNet upgraded their monitoring software platform to MASterMind, a fully integrated, enterprise solution for monitored security service providers and proprietary central stations, to provide its dealers with best-in-class monitoring services and expanded integration opportunities. The Lacey, Washington, facility is expected to begin monitoring SentryNet dealers in late November 2018.
GlobalPlatform, the standard for secure digital services and devices, publishes a configuration that simplifies the implementation of Secure Element (SE) specifications for the protection of internet of things (IoT) devices. “At the moment some of the IoT sector are not taking security seriously enough,” explains Gil Bernabeu, Technical Director, GlobalPlatform. “Recent attacks demonstrate that any device can be attacked or infected with malware. Devices can then be used for DDoS attacks or to mine end user data, or even exploited to share their source code and other intellectual property. All of this can have significant reputational and financial impact on brands. This is why security needs to be foundational, considered at the start of the design phase.” Secure Digital Services The GlobalPlatform Compact IoT Configuration v1.0 answers IoT-specific market requirements by giving service providers and device manufacturers the means to interact seamlessly when deploying secure digital services across constrained IoT devices. The use of standardized secure components makes the mass marketing of secure digital services possible, while bringing time and cost efficiencies to stakeholders within the ecosystem and enabling new business models. SEs can form the keystone for constrained IoT devices - balancing the flexibility of GlobalPlatform specifications, that cover a range of connectivity options including LoRaWAN and HTTPS, with the restrictions of low-end IoT devices using m-class processors. The configuration supports root of trust (RoT) device identity, the protection of critical assets, state-of-the-art AES cryptography for device management This entry-level configuration enables manufacturers to identify the best solution for devices with limited operating environments by providing the subset of specifications that they need to develop and deploy IoT devices and services. The configuration supports root of trust (RoT) device identity, the protection of critical assets, state-of-the-art AES cryptography for device management and authentication, allowing automatic enrolment to online cloud services. Publish New Interfaces 100% of SEs embedded in mobile devices are GlobalPlatform compliant. This shows that the SE configuration is perfectly fit-for-purpose for the mobile world, and GlobalPlatform expects the Compact IoT Configuration to achieve similar market penetration. “The next step for GlobalPlatform is to publish new interfaces that connect the SE to the rest of the platform and support the latest industry protocols” Gil continues. “This, along with a new standard for connecting embedded SEs to the device bus, will further enhance the integration of SEs into IoT devices and bring greater protection for services and IP.”
UTC Climate, Controls & Security has agreed to acquire S2 Security, a developer of unified security and video management solutions. UTC Climate, Controls & Security is a provider of fire safety, security, building automation, heating, ventilating, air conditioning (HVAC) and refrigeration systems, and is a unit of United Technologies Corp. Enhanced Service Capabilities "This move is well aligned with our strategic focus to grow our core business and increase innovation," said Alex Housten, VP & General Manager, Fire & Security Products, a part of UTC Climate, Controls & Security. "We look forward to providing enhanced service capabilities and offerings for our customers, and accelerating our access control and video-centric solutions for intelligent buildings across the globe." John Moss, Founder and Chief Executive Officer, S2 Security said, "Considering the complementary customer bases and product portfolios of our two companies, this is a natural step that will benefit our customers, employees, and channel partners." The acquisition is subject to customary closing conditions and regulatory approvals.
In a proactive response to the increasing convergence of the physical security and professional A/V industries, XtraSales, Inc., a manufacturer’s representative serving the professional / commercial security sector, and On the Road Marketing, a professional A/V manufacturer’s representative firm serving manufacturers in the commercial Audio & Video industry, have announced a strategic alliance. Sophisticated Security Systems Demand for integrated and sophisticated security systems and professional A/V solutions are redefining how manufacturers go to markets and paving the way for stronger partnerships between security and professional A/V manufacturers to better serve the needs of clients. “Serving the needs of our security manufacturers has allowed us the honor of representing some of the most well-respected manufacturers in the security industry for over 20 years,” says Peggy Caruso, president of XtraSales, Inc. “We’re looking forward to extending that same commitment to the Pro A/V Industry.” Integrated Security Solutions The trend toward integrated security and professional A/V systems is a significant one, notes Mark Medling, Principal, On the Road Marketing. “We are proud to partner with XtraSales. Integrated solutions between our various manufacturers is a win-win for all, and further highlights how manufacturer’s reps continue to bring value and innovation to the industries they serve.”
Allied Universal is proud to recognize security officers during the fourth annual National Security Officer Appreciation Week, September 16 – 22, 2018. “National Security Officer Appreciation Week honours the incredible efforts of our nation’s security officers to create safer and more secure environments,” says Steve Jones, CEO, Allied Universal. “The appreciation week is also an opportunity to profile the many roles security officers fill; debunk misconceptions and stereotypes; and raise awareness of the career opportunities that exist within the security services industry.” Security professionals are hard-working, highly trained men and women who are our protectors, guardians and first responders. These individuals deter crime, lead evacuations, provide information, work closely with local law enforcement and are constantly vigilant in their efforts to keep us safe. This annual event is featured in Chase’s Calendar of Events. Join in the celebration on social media using #ThankYouSecurity in your posts.
PerpetuityARC Training, part of Linx International Group, is proud to announce that associate trainer Paul Barker has been made a life member of ASIS International and life CPP. The accolade acknowledges Paul’s significant contribution to the international success of its Certified Protection Professional (CPP) qualification. In 1993 Paul became the third security professional in the UK to be awarded the CPP qualification, and two years later he was instrumental in expanding the course in the UK by enabling the exam to be taken outside the US for the first time. As an ASIS training officer, Paul delivered two courses a year, and in just three years CPP numbers in the UK rose to 94, resulting in Paul being presented with the inaugural Mervyn David Award by the UK Chapter of ASIS International. Comprehensive Learning Material Paul’s contribution to the training continues to be exemplary and we are proud to have him as an important part of the PerpetuityARC Training team" Today, ASIS International is the world’s largest association of security management professionals, and PerpetuityARC Training is proud to be a long-standing ASIS education partner. The company recently revealed that 98% of security professionals choosing its courses to train for their ASIS Physical Security Professional (PSP) and CPP qualifications in 2018 passed their exam at the first attempt. Paul Barker explains the reasons for PerpetuityARC Training’s success: “The courses are very well developed and are expertly delivered in a manner that enables learners to retain the volumes of data and apply it to the exam. The material is extremely comprehensive and ties in perfectly with the recommended reading for the exam.” Ciaran Barry, Director of Group Operations at Linx International Group, states: “Paul’s contribution to the training continues to be exemplary and we are proud to have him as an important part of the PerpetuityARC Training team. He continues a long tradition of teaching security professionals to the highest standards, helping them attain meaningful qualifications that advance their careers.” SME In Security Management For Oil And Gas Sector In addition to the ASIS training programmes, Paul also delivers the IQ Level 4 course ‘Managing Security Risks in the Oil and Gas Sector’ In addition to the ASIS training programs, Paul also delivers the IQ Level 4 course ‘Managing Security Risks in the Oil and Gas Sector’. This program is designed for professionals in the extraction, energy, exploration and production industries. Paul’s background in strategic security management at one of the world’s largest oil companies stands him in good stead as Linx International Group’s subject matter expert in this field. PerpetuityARC Training will be at booth 1484 at the Global Security Exchange (GSX) to showcase its pathways to the sought-after PSP and CPP qualifications that include intensive five and ten-day boot camps, online training programmes, and blended courses that combine distance learning with classroom sessions. Formerly known as the ASIS Annual Seminar and Exhibits, GSX takes place at the Las Vegas Convention Center from 23 - 27 September.
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalization and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity In Physical Security Industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing Social Mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organization for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realize their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New Companies Introduce New Technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer Service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customized products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job Satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring Safety Of People, Property And Assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies around the country and displayed in every US Post Office to speed up apprehension. Facial Recognition Advancements in artificial intelligence and biometric technology have led to the widespread use of computerised facial recognitionToday, technology such as social media, television and other more specialized communication networks play a more influential role in the recognition process. Advancements in artificial intelligence and biometric technology, including the development of Machine Learning capabilities, have led to increased accuracy, accessibility and the widespread use of computerized facial recognition. The significance of this means that facial recognition can occur on an even larger scale and in more challenging environments. This article will explore key milestones and technological advances that have resulted in the modern incarnation of facial recognition, before discussing the capabilities of cutting-edge “one-to-many” technology which is increasingly being used by counter-terror defense, police and security forces around the world. Technology Inception And Developments The technology was able to match 40 faces an hour, which was considered very impressive at the time The 1960s marked the start of computerized facial recognition, when Woodrow Wilson (Woody) Bledsoe developed a way to classify faces using gridlines. Bledsoe’s facial recognition still required a large amount of human involvement because a person had to extract the co-ordinates of the face’s features from a photograph and enter this information into a computer. The technology was able to match 40 faces an hour (each face took approximately 90 seconds to be matched) which was considered very impressive at the time. By the end of the 1960s, facial recognition had seen further development at the Stanford Research Institute where the technology proved to outperform humans in terms of accuracy of recognition (humans are notoriously bad at recognizing people they don’t know). By the end of the century, the leading player in the field was a solution that came out of the University of Bochum in Germany – and the accuracy of this technology was such that it was even sold on to bank and airport customers. From this stage on, the facial recognition market began to blossom, with error rates of automatic facial recognition systems decreasing by a factor of 272 from 1993 to 2010 according to US Government-sponsored evaluations. The aim for facial technology is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware Modern Usage Of Facial Recognition Fast-forward to the modern day and facial recognition has become a familiar technology when using applications such as the iPhone X’s Face ID capability or MasterCard Identity Check, passport e-gates at airports and other security and access control points. These solutions implement a consensual form of identity verification, as the user has a vested interest in being identified. This is a “one-to-one” facial recognition event, one person in front of the camera being compared to one identity either on a passport or the app. In these scenarios, the hardware is specifically developed for the application at hand, therefore technically much easier to accomplish. Facial recognition can now be used in a variety of governmental and commercial environments The safety and security world brings a much more complex problem to solve – how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve. It’s even more challenging when the aim is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware. And unlike in the 1960’s where identifying a face every 90 seconds was acceptable; the safety and security market requires near instant feedback on who a person matched against a watchlist is. Security And Safety Applications The idea behind all facial recognition technologies is broadly the same: you start with an image of a person’s face (ideally a high quality one, although machine learning means that to a point we can now even use video without reducing accuracy). A fully front facing image is best, think a passport photo, but machine learning and new software has made this more flexible. An algorithm converts this image into a numeric template, which cannot be converted back to an image and so represents a secure one way system. Every numeric template is different, even if it started out as an image of the same person, although templates from the same person are more similar than templates from different people. The accuracy of facial recognition continues to increase alongside deployments in more challenging and complex environments What happens next sounds simple although the technology is extremely complex: templates of people’s faces are taken in real time and compared to those in the database. The technology identifies individuals by matching the numeric template of their face with all the templates saved in a database in a matter of seconds or milliseconds. To put this into perspective, imagine you are at the turnstiles of a busy train station looking for a person on the run. Today’s facial recognition technology would be able to identify that person should they pass in view of a CCTV camera, as well as notify the police of any additional persons of interest, whether they are a known terrorist or missing vulnerable person on an entirely separate watch list. Because of technical progression, facial recognition can now be used in a variety of governmental and commercial environments, from identifying barred hooligans attempting entry at a football stadium or helping self-excluded gamblers at casino to overcome addiction. Real-Time Assessments The latest evolution of facial recognition pits the technology against an even more challenging application – directly matching individuals from body worn cameras for real time recognition for police officers on the beat. This capability equips first responders with the ability to detect a person from a photo and verify their identity with assurance. The broader implication for this means that every interaction, such as stop and search or arrest, can be supported by real-time facial recognition which will see cases of mistaken identity driven down on the streets. First responders can now for the first time be deployed and furnished with the ability to identify wider groups of people of interest with a degree of accuracy that previously relied only on the fallible human memory. As the accuracy of the technology continues to increase alongside deployments in more challenging and complex environments, its ability to support government initiatives and law enforcement means the debate about the lawful and appropriate use of facial recognition must be addressed. Facial recognition should not be everywhere looking for everyone, but when used properly it has the potential to improve public safety and we should make the most of its potential.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now. Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier Customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High Gross Profit Margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier To Provide Managed Services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running.Cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively Fix Problems Before They Occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased Valuation Of Business Companies that utilize cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
GSX 2018 is both a new event for the security industry and the continuation of a 63-year tradition. Global Security Exchange (GSX) is the new branding for ASIS International’s annual seminar and exhibits, which have been held since 1955. In recent years, the ASIS event has joined forces with other organizations to expand its scope and to appeal to a broader audience. Partners include ISSA (Information Systems Security Association) and Infragard, a public-private partnership between U.S. businesses and the Federal Bureau of Investigation (FBI). The expansion is continuing this year with the addition of 30 supporting organizations representing industry verticals and reflecting ASIS’s intent to unite the full spectrum of security. Improving The State Of Cyber Security The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most Held September 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors. Other elements will further expand the 2018 event’s scope. The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most. Top government, industry and academic thought leaders will engage in a dialog to improve the state of cyber security. The 2018 Security Cares Program will address school violence prevention and response in a free education program. Topics will include pre-violence indicators, target hardening, and best practices to involve the entire community of school administrators, law enforcement, security professionals and mental health providers. Experts To Deliver Keynote Speeches Keynote speakers including CNN host Fareed Zakaria will bestow celebrity appeal. Air Force Major General Bradley D. Spacy will share details about the new AFWERX innovation and tech hub in Las Vegas and how the U.S. Air Force is collaborating with the private sector to bring new security product ideas to market. Spacy’s keynote on Sept. 26 will kick off Military and Law Enforcement Appreciation Day. Also, K.T. McFarland, former Trump Administration Deputy National Security Advisor, will share an insider’s perspective on critical foreign policy and defense industries. Attendees to ASIS International’s annual gathering typically list networking and education as big benefits of the event. Historically, the trade show aspect has existed separately from the educational program, and foot traffic to the exhibits has sometimes suffered from the competition. Beginning last year, and continuing in 2018, ASIS International has pursued innovative approaches to integrate the trade show more closely into the overall attendee experience. “The integration of programming and exhibits is truly seamless,” says one observer of the new approach. Held Sept. 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors X Learning Theatres GSX has sought to transform the exhibit hall into a ‘learning lab environment’ that features thousands of security products, technologies and service solutions (provided by the exhibitors), in addition to ‘immersive learning opportunities to connect the current and emerging threat landscape with solutions available in the marketplace’. There are several ‘X Learning Theatres’, including one (‘X-Stage’) focused on leading-edge technologies such as blockchain, cryptocurrencies, AI, drones, and robotics. There is also an ‘Xcelerated Exchange Stage’ to facilitate discussions among security practitioners and solution providers. The ‘Xperience Stage’ showcases case studies and best practices. Also attracting more attendees to the Exhibit Hall will be ‘Career HQ’, a free career fair and enhanced career center. ‘D3 Xperience’ (Drones, Droids Defense) will focus on unmanned systems with education and demos. The ‘Innovative Product Awards (IPAs) Showcase’ will highlight winners of an awards program. Focusing On Security Practices GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets ASIS International (now GSX 2018) is often compared to ISC West, the U.S. industry’s largest show held in Las Vegas in the spring. GSX 2018 this year may face even more scrutiny based on the changes, rebranding, and location (also in Las Vegas). However, GSX is a completely different show than ISC West, which focuses on the business of security. In contrast, GSX is much more about the practice of security than business. The international network of ASIS International members attend the yearly conference to make new connections, to learn and to benefit from the experiences of other security professionals around the world. The successful trade show exhibitors are the ones that approach the show with that understanding. GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets. ASIS International deserves credit for their efforts to integrate the trade show element into the larger goal of the event. Hopefully their new approach will enhance the overall experience for both attendees and exhibitors – and help to make the world a safer place as a consequence.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
A two-year program to transform security at Heriot-Watt University campuses around the world, facilitated by CriticalArc’s SafeZone technology, has been recognized with one of the UK’s top security industry awards. The innovative partnership between Heriot-Watt and CriticalArc has been named as ‘Security Project of the Year’ in the 2018 Security & Fire Excellence Awards run in association with IFSEC International and Firex International. The award, sponsored by the British Security Industry Association, is highly competitive and a major accolade for the winners. Improving Service Response Two years ago, Les Allan, Heriot-Watt’s Director of Safety and Security Services and his team at the university embarked on a strategy to transform all aspects of their operations. They wanted to modernize their service across five campuses, in the UK, Dubai, and Malaysia to provide much greater care for students and staff. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses It was an ambitious undertaking, but it has already delivered impressive results, measurably improving service response times by over fifty percent, upgrading security department capabilities and skills and raising the job status and remuneration for officers involved. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses, making Heriot-Watt the first university department to take this global approach. Real-Time Incident Management SafeZone technology has transformed the way officers interact with students and staff wherever they are - on campus or and when traveling off-site – so they can provide assistance in case of emergencies or other incidents. Les Allan’s team has already responded to serious medical emergencies using the system and now they have the tools to manage a full range of live-incident risks. “SafeZone lets my team communicate quickly with individuals and groups,” explains Les Allan, Heriot-Watt, Director of Safety and Security Services. “Using it they can receive alerts and pinpoint the location of anyone needing assistance. They can deploy officers more quickly and keep track of ongoing situations as they develop. It’s really letting them do things they couldn’t have dreamed of before.” Better Support For Students & Staff The Heriot-Watt team is also using new technology to support staff and students on campus while traveling and during fieldwork. They can ‘geo-fence’ additional areas as required. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus The result has been a significant improvement in engagement between the security department – now restyled as Safeguarding Services – students and staff. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus (the first to adopt SafeZone); 3542 of these incidents (66%) involved assisting or interacting with students (rising from 33% in 2013). Efficient, Responsive And Capable Services The results have been impressive but Les Allan, who is currently also serving as Chair of the Association of University Chief Security Officers (AUCSO) in Scotland, says his ambition is to go much further. “We are delighted at our incredible success at the Security and Fire Excellence Awards as winners of the Security Project of the Year category. This joint award for Heriot-Watt University and our friends at CritcalArc is a testimony to the power of working in partnership for mutual benefit and delivery of excellence with a world-leading solution. We are committed to continuing development and enhancement of our partnership with CriticalArc.” Darren Chalmers-Stevens, CriticalArc, Managing Director, EMEA and APAC, noted: “I’m delighted that the forward-looking partnership between Heriot-Watt University and CriticalArc has been so clearly successful. This major award is further proof of how we work closely with all our customers and are leading the way in providing better protection and enabling more efficient, responsive and capable services.”
The Polizei Bayern successfully opened its first operations centre in mid-September at its Police Headquarters in Central Franconia in Nuremberg. At the heart of the communication system was the Frequentis 3020 LifeX platform including digital radio connections and the newly developed AudioHub. The headquarters in Nuremberg is the second largest operations centre in the German state of Bavaria. It comprises 21 operator working positions that receive and process between 800 and 1,200 police calls per day. In the event of an emergency, an additional 13 operator working positions can be activated. Dispatch Calls Successfully Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours. The system proved its stability and operators were able to dispatch calls successfully without issue. "The professionalism of Frequentis during the preparation, implementation and follow-up commissioning of the system gave us confidence in their abilities. All of the aspects important to us as customers were immediately considered and processed by the Frequentis team. Above all, the usability of the system was well received by the operators.", said Anton Beierweck, Head of State-wide IT Procedures at the Police Headquarters Upper Bavaria South. Provides Highest Protection LifeX was first deployed for Bavarian Police Force in 2015, ahead of the G7 summit. The system was adapted to the needs of the event which required 18,000 emergency services personal to protect government leaders and control demonstrations. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020 "What has been clear from the start of the project is the willingness of the Polizei Bayern to innovate. We are very proud to have met their high requirements in terms of technology and services and appreciate the professional cooperation with the organization who provides the highest protection and security in Bavaria.", Robert Nitsch, Frequentis Vice President Public Safety. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020. Two more operational centres are planned to be brought on line before the end of 2018.
Above the Line Security have improved the safety of their at-risk employees by switching from a manual call-in system to the user-friendly StaySafe lone worker solution. Employees at Above the Line Security are responsible for guarding individuals and high-value equipment on busy film sites. Ensuring Employee Safety StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map Prone to theft and coming into contact with potentially volatile paparazzi and members of the public, the company required a more reliable way of monitoring the safety of their guards. StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map. Monitors are alerted if an employee triggers an alert or fails to check-in on the app during their shift. StaySafe StaySafe also provides the ability for an alert to be raised even during difficult situations. If engaged in a confrontation, a panic can be sent discreetly, or a duress PIN entered if the app is discovered by the aggressor. Missed check-in alerts will also alert a monitor in cases where the lone worker may be unable to send a panic themselves. “Having used an app for the first time to protect our lone workers, we were incredibly impressed by the ease and agility of set up and usability. Our employees have adapted quickly to using the app whenever they work and as they do not always come to the office, it allows them to set up for the day quickly and independently.” Lone Workers’ Safety Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out" Adele O’ Toole at Above the Line, continues; “Previously, we had to rely on night supervisors based in external locations to take check-in and emergency calls manually. This proved expensive and disconnected, particularly if our lone workers were situated in areas of low signal where making contact to ensure their safety was infrequent and unreliable. With StaySafe, we are able to instantly locate our workers on a map once they have checked-in, even in areas of low signal, saving us a lot of time and human resources.” Don Cameron, CEO at StaySafe adds; “Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out. They often protect valuable assets which leads to the potential risk of theft and aggression. StaySafe provides peace of mind for the lone workers and the business by providing an effective and reliable solution for a range of volatile situations. Organizations can see exactly where their staff are in the case of an emergency and can send assistance directly to them – all with the added bonus of being user-friendly and cost-effective, only requiring a mobile phone.”
Cathexis Technologies is exceptionally proud to have played an important security role in Pope Francis' visit to Ireland last weekend. Cathexis worked alongside its Dublin-based, Gold Channel Partner, Mongey Communications, and the Irish Garda, to facilitate the critical role of surveillance management. With an official itinerary that was jam-packed with meetings, visits and official engagements, all within a two-day schedule, His Holiness, had a whirlwind visit through Dublin, which included the World Meeting of Families and Festival of Families at Croke Park on Saturday 25 August. Fully-Integrated CCTV IP Cameras Cathexis worked with Mongey Communications to provide a fully-integrated 24/7 surveillance management solutionCathexis, a global video management software developer, worked in partnership with Mongey Communications, a renowned supplier of security equipment such as CCTV IP cameras, to provide a fully-integrated 24/7 surveillance management solution that would effectively manage the entire visit. The CathexisVision IP video management software suite provided an around the clock CCTV surveillance solution, which supported three linked control rooms to ensure an immediate response to any situation of potential security threats. Video Management Software Solutions Cathexis is a headquartered in Durban, South Africa, with operations spread throughout the UK, Europe, and the Middle East. “We are exceptionally proud to have played a role in the Pope’s World Meeting of Families visit,” says Mark Ross, managing director of Cathexis Europe. “Cathexis is committed to providing the most efficient and effective, tailored video management software solutions, to provide maximum return on surveillance investment,” he added. CathexisVision gained global industry recognition when it took top honours for the Benchmark Innovation Awards 2018 Cameras & Surveillance Management The Cathexis Europe Technical team worked alongside Mongey throughout the design, build up and operations over the weekend to ensure that CathexisVision was providing optimal performance, and to provide additional cameras and surveillance management to the police service of the Republic of Ireland (Gardai). Earlier this month, CathexisVision gained global industry recognition when it took top honours for the Benchmark Innovation Awards 2018, when it was announced the overall winner in the Video Surveillance Software category. “We are delighted that we had the opportunity to play a part in the Pope’s historic visit to Ireland at the weekend, and are exceptionally honored for the ongoing international recognition,” concluded Ross.
ASSA ABLOY Security Doors, a UK division of ASSA ABLOY, the global provider of door opening solutions, has secured a series of high-profile contracts with Transport for London and Crossrail Limited. These contracts have included supplying and installing security doors for major London Underground redevelopments including London Bridge, Bond Street and King’s Cross, as well as station upgrades such as Victoria. ASSA ABLOY Security Doors has then gone on to secure multiple contracts within the Crossrail construction program. The new Transport for London-run Elizabeth line, built by Crossrail Limited, will open from December 2018 serving 10 newly-built accessible stations. Comprehensive Doorset Solutions Full doorset solutions have been delivered and installed to the new Elizabeth line stations at Canary Wharf, Paddington, Bond Street, Tottenham Court Road, Farringdon, Woolwich and Custom House. They have also been installed at other sites along the route including Pudding Mill, Eleanor Street and Mile End, as well as at the Elizabeth line depot at Old Oak Common. Each project presented its own demands and challenges in relation to product performance requirements. Doorsets had to be fully compliant to achieve the latest standards and meet the specialist needs of each environment: Factors to consider included fire, acoustics, air tightness, high-security and pressure resistance. Decorative finishes such as vitreous enamel, stainless-steel and bronze cladding helped complement the aesthetics of the surroundings on doors that required a finishing touch, and many of the doorsets required installation in challenging conditions, being underground, with tight access and restricted working hours. Our experience working with London Underground provided us with the ideal foundation for supporting our working partners on the Crossrail project" Powershield & Prima Door Ranges Brian Sofley, Managing Director at ASSA ABLOY Security Doors, said: “Our experience working with London Underground provided us with the ideal foundation for supporting our working partners on the Crossrail project for new Elizabeth line stations.” “Each contract brought its own individual challenges, but from the very beginning we worked closely with the architects and contractors involved to understand their requirements. This meant we could provide specialist and tailored solutions that met their exact needs. Solutions were carefully chosen from both our Powershield and Prima steel door ranges including cross corridor doors for high traffic fire escape routes, and pivoted fire rated platform doors to conceal station equipment rooms.” “We take great pride in our wide portfolio of well-respected transport contracts. It says a great deal that customers choose to work with us time and time again, and we put this down to our full-service offering, financial stability, and expert advice at every stage of the project, from specification to installation and inspection.”
The Spearfish West Africa base is located in Nigeria and will serve both new and existing clients across the fast-growing regional security market. Spearfish West Africa opened in Abuja, Nigeria earlier this year as a wholly-owned subsidiary of UK parent Spearfish Security. The new facility will provide localised consultancy and support to clients, managing risks and threats to personnel and facilities. The company specialises in supporting those facing security challenges in countries such as: Benin, Burkina Faso, Cape Verde, Gambia, Ghana, Guinea, Ivory Coast, Liberia, Mali, Mauritania, Niger, Nigeria, Saint Helena, Senegal, Sierra Leone, São Tomé and Príncipe and Togo. Spearfish's corporate client base includes companies in the finance, hospitality and manufacturing sectors Delivering Security And Risk Managers Dan Hooton, managing director of Spearfish Security, said: "We are excited to open this office having worked extensively in the region for the past six years, delivering full time Security & Risk Managers to organizations operating in Nigeria. Having a permanent presence in West Africa reinforces our commitment to clients in this part of the world. It also ensures we can meet the needs of smaller organizations who may require support on an ‘as need’ basis, as well as larger clients looking to benefit from shared services.” Spearfish works closely with organizations in the Corporate and International Development sectors. Its corporate client base includes companies in the finance, hospitality and manufacturing sectors, while its experience in the development sector covers health, energy, agriculture, climate change and women’s empowerment. With Nigeria in the midst of an economic downturn, tied to the fall in crude oil prices, the country's security situation has deteriorated in recent years" Designing Security Strategies Spearfish's vast security and commercial experience enables it to deliver practical strategy and execution to organizations on a retained or per-project basis. Clients often engage the company to provide hands-on guidance for accommodation or trip management for employees; or to craft security strategies for offices or transportation programs. “With Nigeria in the midst of an economic downturn, tied to the fall in crude oil prices, the country's security situation has deteriorated in recent years,” continued Hooton. “As the Nigerian military and its international partners continue to disrupt Boko Haram in the country's northeast, other jihadist groups, such as al-Qaeda and Islamic State, are active across the Sahel, particularly in Mali, taking advantage of poor governance. This threat has also spread to nearby Niger and Burkina Faso, spurring the G5 counterterrorism partnership into action in 2018.” Growth In Foreign Aid Across West Africa The risk of kidnap remains high throughout West Africa, largely from militant groups, but also from criminals seeking ransom, as in Nigeria's Delta region. At the same time, West Africa has also seen a rapid influx of foreign aid with growing numbers of charities, companies, NGOs and government agencies deploying in the region. Spearfish West Africa will be well-placed to serve this changing marketplace and offer clients peace-of-mind, enabling them to focus fully on their own operations.