As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of...
GET Group North America, a provider of end-to-end solutions for secure credentials with over 20 years of experience in identity management, announces the appointment of Matthew Robinson as Director of Customer Service. In his new role, Mr. Robinson will leverage past government contracting experience to support GET Group’s business objectives and develop strategies for optimal customer engagement. Continuing Government Contracts Before joining GET Group North America, Mr. Robinson was th...
Black Sage now offers event-based counter drone protection (service) specifically for sports and other large-scale events. Stadiums and other open-air venues are particularly vulnerable to the growing risk posed by the proliferation of consumer drones and Black Sage is addressing this issue by offering a new service. Commercially available drones have quite literally added a new dimension to security threats not only in war zones, but also at large public gatherings here in the U.S. Operators w...
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent o...
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a...
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require tech...
Seasoned and highly respected executive Janet Fenner will be joining Intelligent Security Systems (ISS), and will be taking up the newly created role of Chief Marketing Officer (CMO). She joins directly from Dahua Technology U.S.A. and will start on July 9th. We are excited and proud to have Janet join the ISS team,” said Aluisio Figueiredo, Chief Executive Officer of ISS. “Janet’s extensive industry experience and proven marketing, branding and alliance-building skills will help to contribute to our continued growth and expansion.” Fenner was recently recognized as one of the security industry’s top female leaders and newly appointed to the Security Industry Association’s (SIA) Board of Directors. Security Marketing Activities In her new role as Chief Marketing Officer at ISS, Fenner will be responsible for all marketing activities globally, and will pioneer the development and execution of new branding and positioning strategies to support new business initiatives and further elevate the company’s perception in the physical security and business intelligence markets. Fenner reports directly to the CEO, Aluisio Figueiredo. She has also been appointed to the ISS Executive Director’s Board, the most senior committee in the company, reporting to the full Board. Prior to Dahua, Fenner served at Hanwha Techwin America (formerly Samsung Techwin) and the Brady Corporation. She is also an active supporter and an Advisory Board Member of Mission 500, a charitable organization focused on the professional security community’s efforts to assist children and families in need across the U.S.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Cybercrime is a threat that no business today can afford to ignore. Verizon’s 2018 Data Breach Investigations Report (DBIR) reported that ransomware attacks have grown significantly since last year’s DBIR. Employees are falling victim to social attacks, such as financial pretexting and phishing which represent 98 percent of social incidents and 93 percent of all breaches analyzed. However, a new service from Verizon - Verizon’s Threat Intelligence Platform Service - now enables companies to better hunt and confront cyber threats head on. Identifying Threats And Course Of Action The subscription-based service combines unparalleled cyber-threat intelligence from Verizon’s 11-year DBIR series with cyber-situational awareness from Verizon's Threat Research Advisory Center, which tracks threats across Verizon’s own global IP backbone. This threat intelligence is delivered via the Anomali Threat Platform to offer current information on cyber-threats. These can then be analyzed by experienced consultants from Verizon’s Professional Services team in-situ at the customer’s site, depending on the level of service desired, so they can identify threats early in the cyber-kill chain and determine the best course of combative action. This new Threat Intelligence Platform Service places the ability to hunt out cyberthreats firmly in our customers’ hands Cyber Intelligence The cyber-threat intelligence service is delivered via the Anomali Threat Platform, which offers a ‘mission control center’ to automate the collection and integration of threat intelligence, and enable security teams to quickly and efficiently analyze and respond to threats. “We’re taking cyber intelligence to the next level by opening up our cybersecurity data to businesses around the world,” stated Bryan Sartin, Verizon’s executive director of security professional services. “Verizon operates one of the largest global IP networks, which gives us a wide view into a large portion of the world’s data traffic. When you cross reference this with intelligence gleaned from over a decade of analysis from our DBIR series, it provides a treasure trove of cyber-intelligence that is hard to beat. This new Threat Intelligence Platform Service places the ability to hunt out cyberthreats firmly in our customers’ hands. Verizon has always worked to give everyone the ability to join the fight against cybercrime - this service is another step on this journey.” Businesses no longer have to be the unknowing victims; with correct tools they can proactively take on cybercriminals and lessen any cyber-attack impacts Combating Cyber Attacks Colby DeRodeff, Anomali co-founder and chief strategy officer, adds, “Anomali is thrilled to be Verizon’s technology partner delivering this solution. The timely automation and analysis of cyber intelligence information is a game changer in beating cybercriminals at their own game. Used correctly, it can make the difference between preventing a serious cyber-attack – or it bringing a business to a standstill.” Amy Larsen DeCarlo, principal analyst from Global Data comments, “Access to credible cyber-intelligence is essential in the fight against cybercrime. Services like Verizon’s Threat Intelligence Platform Service make cyber insights available to the masses, rather than the few. Cybercrime continues to advance putting and brands, intellectual property and sensitive information at risk. But businesses no longer have to be the unknowing victims; armed with the correct tools they can proactively take on the cybercriminals and lessen the impact cyber-attacks may have.” Verizon’s Threat Intelligence Platform Service will be generally available to global customers from Fall 2018. Customers may select specific service levels based on their individual requirements.
Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What role can social media play in security?
The U.S. House of Representatives has voted 351-61 to ban federal agencies from buying Chinese-made surveillance cameras. The measure was passed May 24 as an amendment to House Bill 5515, the Fiscal Year 2019 National Defense Authorization Act (NDAA), which is the funding plan for the military that also maps out a variety of policy priorities. The bill is at least several months away from becoming law, and it must still be considered by the Senate and then by a House-Senate conference committee before final passage. Changes can be made at each stage. It would also have to be signed by President Trump. The amendment targeting video surveillance cameras was offered by Congresswoman Vicky Hartzler, a Missouri Republican. “Video surveillance and security equipment sold by Chinese companies exposes the U.S. government to significant vulnerabilities and my amendment will ensure that China cannot create a video surveillance network within federal agencies,” says Hartzler in a press release. Companies Affected By The Ban The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns. Also mentioned in the amendment are Hytera Communications, a Chinese digital mobile radio manufacturer previously charged with patent infringement; and ZTE Corp., a Chinese telecommunications company accused of violating trade-sanction agreements and posing a threat to U.S. national security. The bill also mentions Huawei Technologies Co. Ltd., a Chinese telecommunications manufacturer previously investigated as a national security threat.The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns Two familiar companies in our industry – Hikvision and Dahua – are mentioned in the bill by their full names, Hangzhou Hikvision Digital Technology Co. and Zhejiang Dahua Technology Co. In addition to their branded video lines, the two companies also are the largest providers of OEM/'white label' cameras and video systems that are sold under other brand names, such as Honeywell, Stanley and UTC. The bill specifically mentions the inclusion of white label technology in the ban. Addressing Concerns In the case of Hikvision, one concern is whether the company is owned by the Chinese government. Hikvision has previously addressed this issue, emphasizing its ownership by “a diverse set of private and public entities” with the largest share belonging to a Chinese state-owned enterprise (SOE). Hikvision declined to comment for this article. However, the company has published a statement (“Special Bulletin”): “We are actively working to assure our North American stakeholders that Hikvision strictly abides by the laws and regulations of each country in which it operates. We also affirm the fact that we hold our products to the industry’s global cybersecurity standards, including North America.” The Hikvision statement continues: “As we continue to monitor and further deploy the necessary resources to address this matter over the coming weeks and months, please know that we will vigorously defend Hikvision from dangerous and unproven accusations about the cybersecurity of our products and solutions.” If SIA decides to take a position based on member feedback, it will occur during the normal legislative process" Commitment To Compliance Dahua answered our requests for a comment with the following official response: “Dahua Technology is a commercial enterprise with a high level of business integrity. The international company [is] committed to compliance with all applicable laws and regulations in the countries in which it does business.” The company’s response continues: “Dahua Technology dedicates 10 percent of its revenue to research and development annually. Dahua has designated cybersecurity as a top priority and takes a comprehensive and systemic approach, with complementary and redundant safeguards built into its technology, services and organizational practices. Dahua Technology is positioning itself as a cybersecurity leader within the video surveillance industry.” The Security Industry Association (SIA) has submitted the House amendment to its government relations committee for review and consideration. “Any recommended position by the government relations committee will be referred to the SIA Executive Committee for their consideration and approval,” says Don Erickson, CEO of SIA. “If SIA decides to take a position based on member feedback, it will occur during the normal legislative process as the bill is considered by the Senate, and then ultimately by a House-Senate conference committee.” Impact On Global Video Camera Supply Congresswoman Hartzler’s amendment is aimed at “ensur[ing] federal agencies do not purchase Chinese-made surveillance cameras,” according to the press release from her office. Obviously, there are more than just the two mentioned companies manufacturing surveillance cameras in China, so the question becomes whether the intent is to ban all Chinese cameras from government use. Such a proposal would create an even larger issue, given that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source.60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source The bill does not address the possible use of Chinese-made components in cameras that are assembled elsewhere in the world (but technically are not 'made in China'). “Those types of issues are commonly explained in implementation guidelines that would be created afterwards if the proposed language becomes law,” says Erickson. The NDAA is unlikely to become law for several months. A version previously passed by the Senate Armed Services committee must be presented to the full Senate, where it can also be amended. Then the House and Senate bills must be reconciled.
It’s not hard to see why more and more locations are requesting security solutions that operate on an open system. Selecting products and platforms that utilize open standards—Session Initiation Protocol (SIP), HTTP, IEEE, RESTful APIs, etc.—provide additional levels of interoperability, scalability and versatility that give organizations the flexibility they want to be proactive with safety and security. Unfortunately, creating the right solution today isn’t quite as simple as reading a product sheet or specification. In the past, end users frequently were forced to pick hardware and software products that were proprietary to each individual manufacturer, meaning pieces of technology often didn’t have the ability to talk and interact with products that didn’t also carry its brand name. In the future, all systems likely will be open in some form and will provide a litany of connectivity options with little-to-no additional development time and resources. But until that day is here, it is important to manage the expectations for stakeholders involved with the project appropriately, knowing that the current security landscape has not yet evolved to the point that all systems are truly open. The current security space can resemble its past almost as much as its future Consumer Technology Expectations To be fair, the end user’s expectations are often set by what they see happening with consumer technology and not by what is currently available in the security marketplace. There, technological advancements can seem to happen overnight. The apps on your smartphone, for instance, perform almost instantaneous updates, even while you are not actively using it. As convenient as that may be with social media or gaming apps, this also can signal a system that regularly requires fixes and patches, a scenario that would not provide stakeholders with the advanced level of reliability that is demanded for adequate safety with commercial security products, in large part because it will expose locations to numerous liability issues. As a result, the current security space can resemble its past almost as much as its future. Decreased Potential For Compatibility Make no mistake, there are certainly many products available today that can easily integrate into open platforms, only in a more limited capacity. An IP desk phone, for example, could easily connect to another IP PBX system that can then place basic calls. But as the customer’s demand for additional sophisticated options increases—diagnostics, event triggers, location identification, etc.—the potential for compatibility decreases. When it comes to security, this is due to the fact that two products or systems rarely expose similar functionality using the same technology or language. Take this example, for instance: Manufacturer A sells a product that contains Features X and Y; Manufacturer B offers one with Y and Z. The customer therefore assumes - or may even be sold - a solution where X, Y and Z can all be configured. Pairing the two may give you interoperability with Feature Y fairly easily (if they are implemented the same way), but X and Z will not happen without an additional investment that may be difficult to procure. It benefits all parties to have a common understanding of the project from the very beginning Many manufacturers offer a list of ‘integration partners’ they are compatible with, but may not match the end user’s expectations Meeting End User Expectations The devil, however, is in the details, a message that isn’t always effectively communicated to end users. Excusing it all off with the old idiom ‘It’s all Greek to me’ only sets up the project for potentially expensive revisions later on – costs that the integrator often has to eat. Therefore, it benefits all parties to have a common understanding of the project from the very beginning. Given the current state of the consumer marketplace, it is vital for integrators to understand the reality of the products they are considering before seeking out potential solutions. Many manufacturers offer a list of ‘integration partners’ they are compatible with, but these scenarios will carry a predefined scope that may not match the end user’s expectations. Assessing Compatibility To understand the full options available, a copy of a manufacturer’s Software Development Kit (SDK) needs to be requested, which should include detailed information about the possibilities for integrations with their products. A third-party development firm or contractor is fully capable of providing the same level of work as the manufacturer From there, you can compare the devices being considered to see how compatible they are with one another. Finally, it is important to consider the practical implications of financing. If the end user is seeking features that are not currently possible, then additional development will need to be contracted in order to make it happen. Some manufacturers offer design services with developers who are acclimated to their platforms that can help expedite the learning curve. However, with the right SDK and a background in the platforms being used, a third-party development firm or contractor is fully capable of providing the same level of work as the manufacturer. To understand the full options available, a copy of a manufacturer’s Software Development Kit (SDK) needs to be requested Considerations For Security System Integration To reiterate, any integration, no matter the scope, requires you to consider the following three questions: What does the end user want? What can the products do today? How can you bridge the gap? It is imperative that both integrators and end users take the time to do the homework required with those three key questions to ensure they are selecting a solution that will not only work tomorrow, but also provides an appropriate layer of protection for people and assets today. Each party involved in an integration project needs to understand what exactly is available from a hardware and software standpoint This also should help mitigate any confusion or frustration that may be experienced by the customer. As much as we all would like to believe that each and every feature available is a viable option that simply isn’t feasible given the realities we face today. There will come a day when the technological advancements enjoyed by consumers around the world provide the type of experience that can be applied to security. Until that time arrives, though, each party involved in the project needs to understand what exactly is currently available from a hardware and software standpoint. The safety of everyone at that location depends on it.
ASSA ABLOY Security Doors, a UK division of ASSA ABLOY, the global provider of door opening solutions, has secured a series of high-profile contracts with Transport for London and Crossrail Limited. These contracts have included supplying and installing security doors for major London Underground redevelopments including London Bridge, Bond Street and King’s Cross, as well as station upgrades such as Victoria. ASSA ABLOY Security Doors has then gone on to secure multiple contracts within the Crossrail construction program. The new Transport for London-run Elizabeth line, built by Crossrail Limited, will open from December 2018 serving 10 newly-built accessible stations. Comprehensive Doorset Solutions Full doorset solutions have been delivered and installed to the new Elizabeth line stations at Canary Wharf, Paddington, Bond Street, Tottenham Court Road, Farringdon, Woolwich and Custom House. They have also been installed at other sites along the route including Pudding Mill, Eleanor Street and Mile End, as well as at the Elizabeth line depot at Old Oak Common. Each project presented its own demands and challenges in relation to product performance requirements. Doorsets had to be fully compliant to achieve the latest standards and meet the specialist needs of each environment: Factors to consider included fire, acoustics, air tightness, high-security and pressure resistance. Decorative finishes such as vitreous enamel, stainless-steel and bronze cladding helped complement the aesthetics of the surroundings on doors that required a finishing touch, and many of the doorsets required installation in challenging conditions, being underground, with tight access and restricted working hours. Our experience working with London Underground provided us with the ideal foundation for supporting our working partners on the Crossrail project" Powershield & Prima Door Ranges Brian Sofley, Managing Director at ASSA ABLOY Security Doors, said: “Our experience working with London Underground provided us with the ideal foundation for supporting our working partners on the Crossrail project for new Elizabeth line stations.” “Each contract brought its own individual challenges, but from the very beginning we worked closely with the architects and contractors involved to understand their requirements. This meant we could provide specialist and tailored solutions that met their exact needs. Solutions were carefully chosen from both our Powershield and Prima steel door ranges including cross corridor doors for high traffic fire escape routes, and pivoted fire rated platform doors to conceal station equipment rooms.” “We take great pride in our wide portfolio of well-respected transport contracts. It says a great deal that customers choose to work with us time and time again, and we put this down to our full-service offering, financial stability, and expert advice at every stage of the project, from specification to installation and inspection.”
The Spearfish West Africa base is located in Nigeria and will serve both new and existing clients across the fast-growing regional security market. Spearfish West Africa opened in Abuja, Nigeria earlier this year as a wholly-owned subsidiary of UK parent Spearfish Security. The new facility will provide localised consultancy and support to clients, managing risks and threats to personnel and facilities. The company specialises in supporting those facing security challenges in countries such as: Benin, Burkina Faso, Cape Verde, Gambia, Ghana, Guinea, Ivory Coast, Liberia, Mali, Mauritania, Niger, Nigeria, Saint Helena, Senegal, Sierra Leone, São Tomé and Príncipe and Togo. Spearfish's corporate client base includes companies in the finance, hospitality and manufacturing sectors Delivering Security And Risk Managers Dan Hooton, managing director of Spearfish Security, said: "We are excited to open this office having worked extensively in the region for the past six years, delivering full time Security & Risk Managers to organizations operating in Nigeria. Having a permanent presence in West Africa reinforces our commitment to clients in this part of the world. It also ensures we can meet the needs of smaller organizations who may require support on an ‘as need’ basis, as well as larger clients looking to benefit from shared services.” Spearfish works closely with organizations in the Corporate and International Development sectors. Its corporate client base includes companies in the finance, hospitality and manufacturing sectors, while its experience in the development sector covers health, energy, agriculture, climate change and women’s empowerment. With Nigeria in the midst of an economic downturn, tied to the fall in crude oil prices, the country's security situation has deteriorated in recent years" Designing Security Strategies Spearfish's vast security and commercial experience enables it to deliver practical strategy and execution to organizations on a retained or per-project basis. Clients often engage the company to provide hands-on guidance for accommodation or trip management for employees; or to craft security strategies for offices or transportation programs. “With Nigeria in the midst of an economic downturn, tied to the fall in crude oil prices, the country's security situation has deteriorated in recent years,” continued Hooton. “As the Nigerian military and its international partners continue to disrupt Boko Haram in the country's northeast, other jihadist groups, such as al-Qaeda and Islamic State, are active across the Sahel, particularly in Mali, taking advantage of poor governance. This threat has also spread to nearby Niger and Burkina Faso, spurring the G5 counterterrorism partnership into action in 2018.” Growth In Foreign Aid Across West Africa The risk of kidnap remains high throughout West Africa, largely from militant groups, but also from criminals seeking ransom, as in Nigeria's Delta region. At the same time, West Africa has also seen a rapid influx of foreign aid with growing numbers of charities, companies, NGOs and government agencies deploying in the region. Spearfish West Africa will be well-placed to serve this changing marketplace and offer clients peace-of-mind, enabling them to focus fully on their own operations.
Milestone Systems, a provider of video management software (VMS), is the chosen solution for protecting the Port of Antwerp, the second largest seaport area in Europe, covering more than 12,000 hectares, the equivalent of 20,000 football fields. Large areas like ports are very difficult to secure in a traditional way. Reporting incidents using only radio communications can lack information at an optimal level of detail and accuracy. It takes time for responders to reach incidents. Analog video solutions have issues with very long distances, meaning video amplifiers must be used which lead to fragile and inflexible infrastructure. Milestone XProtect Corporate and XProtect Smart Client have enabled the port authorities to establish a central control center with a consolidated view of the harbour. This enables rapid and relevant response to incidents, reducing the impact of incidents on assets and persons. Milestone steps in to ensure that this business-critical system in the port receives a high level of supportOpen Platform Technology The open platform technology pioneered by Milestone combined with the solution power of the Milestone Partner Community enabled the Port of Antwerp to choose the perfect infrastructure components and cameras for their challenges. Lenovo, Dell and multiple camera partners are elements of the solution. Thanks to the usability of network video, the port can utilize Milestone open platform for solutions that augment the already rich functionality of XProtect VMS. In addition to the infrastructure, the Port of Antwerp is taking advantage of Milestone Care Premium. Milestone Care is a complete suite of operational maintenance and support services grouped into four different packages, enabling Milestone customers to choose the support coverage that fits their exact need, now and in the future. With the chosen level of support, Milestone steps in to ensure that this business-critical system in the port receives a high level of support. Advanced Security Installation Furthermore, Milestone Professional Services has also been in play for this advanced installation, to guide and counsel the port on the best capabilities of the open platform VMS. This consultancy service ensures the port can adapt and expand this system as needed for an ever-expanding, always relevant surveillance solution. “We are extremely pleased to have been chosen by Port of Antwerp for their video safety system,” says Michaël Fontaine, Country Manager Benelux, Milestone Systems. “This is a clear testimonial to the solution power of XProtect and our open platform partner community. This has already been proven in a number of other ports worldwide, and now in the modern Port of Antwerp.”
The 9th BRICS Summit was successfully held in Xiamen, China from September 3rd-5th, 2017, where leaders of the five member-countries were in attendance. Building on its success in providing a comprehensive security solution for the G20 Hangzhou Summit in 2016, the 9th BRICS Summit was yet another accomplishment for Dahua. The 2017 BRICS Xiamen Summit demanded high-level protection for national leaders from Brazil, Russia, India, China, and South Africa. As Xiamen’s city center is located on an island, the security system required comprehensive surveillance of all roads leading into the area, also known as the “Four Bridges and One Tunnel” network.Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras Protection Through Dahua Technology In addition to roads leading into the city, routes to and from the airport, hotels, and the Xiamen International Conference & Exhibition Center needed to be protected as well. A solution of this proportion would also require an advanced, automated, and centralized system to ensure efficient, coordinated responses. With its cutting-edge IP camera, video cloud, network storage, and transmission technologies, Dahua was up to the task of securing Xiamen and the BRICS venues. In total, Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras, and many other advanced Dahua products and services used in various areas of the city. The BRICS security command center, administered by the Public Security Department of the Xiamen, was fitted with a Dahua visual emergency dispatch and command system. The center’s large display wall was stitched together with Dahua edgeless HD LED panels, enabling a complete picture of all units under command center control during the meeting, greatly simplifying control and responses. The security system surrounding the Xiamen International Conference & Exhibition Center as well as the visual emergency dispatch and command system in the security command center both adopted a full range of Dahua video surveillance and display solutions. Dahua employed advanced technologies such as intelligent analysis and big data, to increase the efficiency of emergency command and management capabilities Live Video Security On The Road A customized Dahua Mobile Solution with GPS positioning and in-vehicle wireless image transmission system was installed on 228 patrol cars and 72 special cars from the Xiamen Public Security Bureau, which was used to clear the way for Summit leaders. This provided the command center with a continuous live overview of all areas while providing support for the handling of various emergencies. Dahua contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints In order to secure “Four Bridges and One Tunnel” access points, Dahua employed advanced technologies such as intelligent analysis, big data, and video analytics to significantly increase the efficiency of emergency command and information technology management capabilities, providing uninterrupted HD video surveillance and smart road event monitoring on bridges and tunnels. In addition, Dahua also contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints. In surrounding Haicang and Jimei districts, Dahua constructed video surveillance on routes and sites which held key activities in the city, achieving full coverage of places such as guarded routes, main roads, key sites, as well as surrounding areas and regions of elevated risk. Dahua Securing Public Safety Dahua also played a role in safeguarding conference-related affairs such as catering, accommodation, and travel. The hotels in which leaders stayed in and surrounding areas were upgraded to HD systems in a short amount of time, making sure the leaders were secure while they rested during the Summit. The mobile law enforcement surveillance system assisted the Xiamen Market Supervision Commission in guaranteeing the provision of safe food during the Summit. The three day BRICS Summit concluded without a hitch. National leaders and their delegations were able to smoothly move about the city and attend the conference while Dahua products prevented threats through a vast network of smart video technologies. In addition, the large-scale project significantly upgraded Xiamen’s city surveillance system and provided a long-term foundation for not only public security-related operations, but also broader public projects such as the Xiamen Wireless Image Transmission System.
The large crowds that regularly flock to downtown Houston, Texas, known as GreenStreet, call for heightened security measures. However, the 570,000-square-foot mixed-use center needed to balance a high level of security while maintaining an open and inviting environment that accommodates numerous businesses, delivery drivers, service providers and others who need open access to the property. With an eye towards improving both security and efficiency, the property’s owners decided it was time for a system upgrade. Choosing Hanwha Techwin Working with Houston-based Today’s Integration Inc., GreenStreet evaluated offerings from a number of vendors before selecting Hanwha Techwin as its video surveillance solutions provider. The decision was based on the quality, functionality, versatility and expandability of Hanwha Techwin’s products. Through SSM, GreenStreet’s security personnel can also enter log notes to maintain detailed activity records Today’s Integration designed an advanced video surveillance solution built on Samsung Security Manager (SSM) video management software. The system allows GreenStreet’s security staff to monitor live and recorded video, control PTZ cameras and communicate via two-way audio from a central command center. The system employs multiple Samsung 5080R IP dome cameras, SNP-5200H PTZ dome cameras and 6084R fixed cameras. The system’s NVRs are located in a server room and are connected directly to cameras for recording and to SSM for video playback. Video is transmitted across GreenStreet’s network via hybrid fiber, connecting the multi-site buildings to distribution switches, which also provide PoE to the Samsung cameras also implemented by Today’s Integration, Inc. providing a turn-key solution. Implementing New Security Measures When vendors, contractors or service providers arrive at the bay doors, they press the intercom’s call button to contact GreenStreet’s security staff at the control center. Simultaneously, a live video feed pops up on-screen in the security command center, allowing staff to see and communicate with the individual at the door. Through SSM, GreenStreet’s security personnel can also enter log notes to maintain detailed activity records. The system has also proven effective in assisting the Houston Police Department, which requests video from time. Best of all, the video surveillance solution is easily scalable, allowing more cameras and NVRs to be added as GreenStreet continues to grow and expand.
PSSC Labs, a developer of custom high-performance computing and Big Data computing solutions, has announced that it was selected by CyberSecurity Malaysia (CSM) to help facilitate, manage, securely store and access massive amounts of cyber forensic data by building a custom turn-key cluster server. CyberSecurity Malaysia is the national cybersecurity specialist agency under the Ministry of Science, Technology and Innovation (MOSTI). The role of CSM is to provide specialized cybersecurity services that contribute towards a bigger national objective of preventing or minimizing disruptions to critical information infrastructure in order to protect the public, the economy and government services. CSM receives about 10,000 security incident reports each year. Recently, CSM has seen a growing number of cyber-incidents with fraud topping the list followed by intrusion, malicious codes and cyber-harassment. As of October 2017, CSM received 3,240 reported incidents on fraud; 1,781 on intrusion; 694 on malicious codes and 499 on cyber-harassment.The tightly integrated CloudOOP Rax solution provides superior performance and enables a single view of diverse streams of security data Rapid Threat Detection And Response To facilitate, manage, securely store and access massive amounts of cyber-forensic data, CSM required an infrastructure upgrade. CSM security experts embarked on a worldwide hunt for a vendor partner and selected PSSC Labs to custom build a turn-key cluster server that could be delivered to Malaysia. With over 25 years of experience providing the most cutting edge HPC and Big Data computing solutions to customers including the US Army, NASA and other major US research universities such as Harvard, PSSC Labs had the precise expertise that CSM was looking for. PSSC Labs engineers custom-built a CloudOOP Rax Cluster server solution to meet CSM’s requirements of a powerful ready-to-deploy system that would not be an energy drain. The tightly integrated CloudOOP Rax solution provides superior performance with a framework that enables a single view of diverse streams of security data, allowing CSM to rapidly detect and respond to emerging threats.The PSSC Labs system will act as the platform for data processing and analytics as well as visualization Efficient Analytics With Apache Metron The complete system included ten PSSC Labs CloudOOP 12000 Data Nodes and three CloudSeek Name Nodes. All the necessary rack, 10GigE network switch and power connections were preconfigured and included. They also installed Hortonworks HDP Data Platform and Apache Metron which were preconfigured for the CSM team. Apache Metron is a streaming analytics application that makes it faster and easier for security operations personnel to do their job. It is a next generation SOC (security operations center) data analytics and response application that integrates a variety of open source big data technologies into a centralized tool for security monitoring and analysis. Total storage capacity of the system is 150 terabytes. By using PSSC Labs hardware and system, CSM hopes to have high processing performance for central analysis in analysing multiple incident images. CSM will also utilize the hardware to analyze and visualize large amounts of data for malware analytics where the size of data can be as big as 100gb/year and increasing, said CyberSecurity Malaysia’s Chief Technology Officer, Dr. Solahuddin Shamsuddin. “The PSSC Labs system will act as the platform for data processing and analytics as well as visualization. The vizualization will be fed to stakeholders with dashboard access.”Artificial intelligence enables a ‘proactive defense’ AI-Powered Cyberattack Prediction To ensure the installation was flawless, CSM organized a Strategic Training and Working Visit to PSSC Labs in the fall of 2017. The participants were from the Digital Forensic Department in CyberSecurity Malaysia. They were trained on Big Data platform and technology by PSSC Labs engineers. The PSSC Labs platform will also provide sufficient resources for CSM to incorporate AI into its offerings. Artificial intelligence will enable CSM to predict cyberattacks before they happen by detecting changes or anomalies. The country has a shortage of skilled cybersecurity professionals, and AI will act as a ‘force multiplier’ to enable fewer analysts to identify, thwart and counter a far greater number of attacks. It will also provide analysts with ‘situational awareness’ by identifying and classifying any backend limitations a system may have. Artificial intelligence enables a ‘proactive defense’, constantly monitoring for vulnerabilities that could be exploited for malicious purposes.