Executives from Johnson Controls, Microsoft Corp. and the Middle East’s sustainability pioneer, Bee’ah, have announced an agreement to enhance Bee’ah’s new headquarters located in Sharjah, United Arab Emirates, with a sweeping array of artificial intelligence (AI) and smart building solutions powered by Microsoft. Digital Vault Johnson Controls will work with Microsoft to outfit the new building with intelligent edge systems Using its Digital Vault offering and extende...
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
Arcules, the innovator of integrated video and access control cloud services, announces that it continues to add to its achievements by being selected as a winner in a variety of prestigious industry award programs. Its integrated cloud-based video service has been recognized for bringing significant value and intelligence to integrators, facility managers and end users across a number of applications. Arcules was selected as the 2019 Security Industry Association (SIA) New Product Showcase win...
Johnson Controls announces that the Tyco Visual Intelligence from Software House, a unique metric-based reporting tool for C•CURE 9000, receives the award for Best New Product in the Convergence and Integrated Software and Solutions category. The award was presented at the 2019 SIA New Product Showcase, during ISC West in Las Vegas. Sponsored by the Security Industry Association, the annual awards program is one of the most prestigious recognitions in the security industry. The program rec...
Security and Safety Things (SAST) - A Bosch IoT startup, hosts the first-ever live hackathon at ISC West on the 10th and 11th of April in the Sands Expo Center, Las Vegas. The two-day event featured three teams racing against the clock to create the most deployable application for an American football stadium using the new Security and Safety things system, SAST OS (Operating system). Teams were provided with Google pixel phones, reference cameras and appropriate APIs and development kits, incl...
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill...
Pulse Secure, the provider of software-defined Secure Access solutions, announces that it has teamed up with Dynamic Worldwide Training Consultants (DWWTC) and Westcon Americas, A Division of SYNNEX, to deliver the new Pulse Secure Authorized Training program to its reseller partners and customers. As Pulse Secure Authorized Education Partners, DWWTC and Westcon Americas, A Division of SYNNEX, will deliver Pulse Secure’s new program of Authorized Education Training Courses, designed to prepare users to pass the Pulse Secure Certified Technical Expert Certification exams. The instructor-led training program is open to Pulse Secure customers and reseller partners and is available globally in both virtual and classroom environments. Secure Access Offerings Joe Pittillo, vice president of services, SYNNEX Corporation, said, “By providing customers access to Pulse Secure products, services, and now education, our team can further enable their success in the channel around Secure Access offerings. Our goal here, as well as with all of our education and training programs, is to help increase partner profitability and the value they bring to their customers – all from a single, trusted source.” The certification program will uniquely benefit both Pulse Secure reseller partners and customers Dave Warren, CEO, DWWTC, commented, “We’re delighted to come on board as a Pulse Secure Authorized Education Partner to help companies gain that extra level of knowledge to help them stand out from their competitors and grow their businesses.” Authorized Education Partners The certification program will uniquely benefit both Pulse Secure reseller partners and customers, allowing each to maximize their Pulse Secure deployments and businesses. Customers will gain the expertise to implement and manage the Pulse Secure product suite more effectively while partners will be enabled to promote and deliver Pulse Secure solutions with confidence and to further differentiate their service offerings. Sudhakar Ramakrishna, CEO of Pulse Secure, said, “Pulse Secure recognises that an empowered and enabled partner and sales community is better able to deliver customer and business success. To this end, training and certification, and our partnership with our Authorized Education Partners, is a key business imperative for Pulse Secure. Attendees of the training delivered by our Authorized Education Partners will leave with the skills and the confidence needed to successfully implement and maintain Pulse Secure products and solutions.”
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR For Security Heads of security at hospitals, stadiums, corporate campuses, airports, and other enterprises must maintain high awareness over large areas via a growing number of security cameras. To know whether a familiar person, employee, VIP, perceived threat, concern, or stranger is onsite, security professionals must rely on their ability to focus on key details and then make accurate assessments. SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility" “It’s been a challenge to maintain awareness of who is present at Shelby American, whether those are specific individuals of concern or aggregate demographics of museum visitors,” said Richard Sparkman, Director of Technology, Fleet & Facilities at Shelby American car museum in Las Vegas. “SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility and helps us understand who is moving through our museum by age, gender, and time of day – allowing us to better tailor our museum experience." 24/7 Video Monitoring Available as a standalone solution or integrated with market-leading video management systems, SAFR for Security provides vigilant 24/7 monitoring to detect and match millions of faces in real time, delivering a 99.86 percent accuracy rate. In the April 2019 National Institute of Standards and Technology (NIST) test results, the SAFR algorithm tested as both the fastest and most compact amongst algorithms for wild images with less than 0.025 FNMR. When SAFR for Security is paired with a VMS, the integrated experience includes video overlays within the VMS to identify strangers, threats, concerns, unrecognized persons, VIPs, employees, or other tagged individuals in live video. Security teams can customize real-time alerts to automatically notify them when persons of interest appear on a video camera feed or make use of automated bookmarking to conduct forensic analysis. SAFR for Security attaches rich metadata to video footage so security professionals can search by time range, location, category, person type, and registered individual instead of sifting through hours of video to find a specific person. All data passed through SAFR is protected with AES 256 encryption in transit and at rest “Security professionals are inundated with hours of raw footage, much of which must be evaluated in real time by a limited number of human eyes,” said Dan Grimm, Vice President and General Manager of Computer Vision at RealNetworks. “SAFR for Security helps these professionals maintain higher awareness by combining our highly accurate AI-based facial recognition service with the software they currently use.” Facial Recognition Systems The underlying SAFR platform has been optimized to detect and recognize faces in live video based on its industry-leading excellence in accuracy and performance. The SAFR platform can be deployed on a single PC to monitor a handful of IP cameras or scaled to thousands of cameras in a distributed architecture hosted on-premises, in the cloud, or hybrid. All data passed through SAFR is protected with AES 256 encryption in transit and at rest. The platform also provides actionable data for live analytics of traffic volumes, demographic composition, dwell times, and data exports for further reporting. “We’re delighted to partner with RealNetworks to extend our intelligent IP video system with SAFR for Security’s highly accurate facial recognition,” said Thomas Lausten, CEO, MOBOTIX AG. “The combination of SAFR and our innovative camera technologies opens up a new set of applications and use cases for MOBOTIX customers around the world, especially in retail, healthcare and education.”
Quantum Corp. has announced the release of the new VS-Series, an efficient, flexible storage cloud platform that has been specially designed for surveillance and industrial IoT applications. The VS-Series is available in a broad range of server choices, suitable for deployments with fewer than ten cameras, up to the largest environments with thousands of cameras. Using the VS-Series security platform, security professionals can efficiently record and store video surveillance footage and run an entire security infrastructure on a single platform. Multiple Systems Integration Surveillance and security operations continue to get more complex, with more cameras, higher-resolution imagery, and increasing data retention requirements. As buildings become smarter, everything from access control systems to lighting and HVAC systems are now connected – part of the “Internet of Things.” There is an opportunity to simplify operations by consolidating and converging many applications onto a single platform. The Quantum CSP was designed specifically for video and other forms of high-resolution content Quantum’s VS-Series architecture is based on the Quantum Cloud Storage Platform (CSP), a new software-defined storage platform specifically designed for storing machine and sensor-generated data. Like storage technologies used in the cloud, the Quantum CSP is software-defined, can be deployed on bare metal, as a virtual machine, or as part of a hyperconverged infrastructure. Unlike other software-defined storage technologies, the Quantum CSP was designed specifically for video and other forms of high-resolution content – engineered for extremely low latency, maximizing the streaming performance of large files to storage. Quantum VS-Series Cloud Storage Platform The Quantum Cloud Storage Platform enables high-speed video recording with optimal camera density and can host and run certified VMS management applications, recording servers, and other building control servers on a single platform. The VS-Series product line is being offered in a variety of deployment options; including software-only, mini-tower, 1U, 2U, and 4U hyperconverged servers. Key VS-Series Attributes Include: Efficiency: Quantum’s VS-Series supports high camera density and software architecture that enables users to run their entire security infrastructure on a single hyperconverged platform. Flexibility: The VS-Series is a software-defined platform which offers the broadest range of deployment options. Many appliances can scale out for more cameras or scale up for increased retention. Easy to Deploy, Operate and Maintain: The VS-Series comes pre-installed with certified VMS applications, and can be installed and configured in minutes. It is backed by the world-class service and support of Quantum and our integrator partners Resilience: The VS-Series software offers a fault-tolerant design to minimize hardware and software issues, designed to virtually eliminate downtime Quantum Products At ISC West 2019 The first products in the VS-Series to launch are the VST10x mini-tower appliances, and the VS2112 and VS2124 2U servers Quantum will highlight the new VS-Series at ISC West, booth #22137. The first products in the VS-Series to launch are the VST10x mini-tower appliances, and the VS2112 and VS2124 2U servers, available this quarter. Additional offerings will be available later this year. Josh Woodhouse, Principal Analyst, IHS Markit, said “There are huge increases in ubiquitous video surveillance data required to be processed, analyzed and stored. The total market capacity shipped for enterprise storage systems in video surveillance is forecast to grow at a compound annual growth rate of 40 percent from 2017 to 2022. Storage demand is strongest in safe or smart cities installations, and in retail and transportation hubs around the globe, where end-users are looking to both protect against security threats and maximize the efficient use of collected data. Scalable, flexible data storage systems are important in achieving this goal.” High-Resolution Network Cameras Jeremy Scott, Strategic Alliance Partner Manager, Americas, Milestone Systems said, “Security systems today include more high-resolution cameras to capture relevant situational information. Our partnership with Quantum lets us deliver scalable video surveillance solutions with the storage capacity and access suited to the increased data volumes these systems generate.” I’m pleased that we were able to bring this VS-Series to market so quickly" Keith Bishop, Strategic Growth Manager for Data Enabled Business, Johnson Controls stated, ” Buildings and cities have internet connected devices everywhere – cameras, badge readers, lighting, HVAC systems, and more – which creates a need to consolidate and manage this digital data in one place. Being able to converge surveillance recording, VMS systems, and other building control applications onto a single platform means our customers can simplify their infrastructure as we help them create smarter and safer buildings and cities.” Hyperconverged Security Infrastructure Jamie Lerner, President and CEO, Quantum, says “As we worked with partners to design a platform for surveillance, we knew that streaming performance and camera density would be critical, as well as hyperconvergence both for efficiency and to consolidate the security infrastructure. I’m pleased that we were able to bring this VS-Series to market so quickly – it demonstrates both the software-defined nature of the Quantum Cloud Storage Platform and how we can take our years of expertise working in movie and TV production and construct a platform with leading performance for the surveillance industry.”
ShotSpotter, Inc., the provider of gunshot detection solutions that help law enforcement officials identify, locate and deter gun violence, announces a new technology innovation unit – ShotSpotter Labs – to expand the company’s current efforts supporting innovative uses of its technology to help protect wildlife and the environment. ShotSpotter Labs is launching with an initial focus on helping combat rhino poaching in South Africa. Later this year, the unit intends to explore other applications for global wildlife protection such as combatting illegal blast fishing in Malaysia with underwater sensors. Multiple Poacher Apprehensions In 2014, ShotSpotter began a pilot of its gunshot detection technology in the Intensified Protection Zone of Kruger National Park in South Africa, home to 60% of the last remaining rhinos. Given the vast expanse of the park, most poaching incidents went undetected with carcasses found days or weeks after the fact. With the introduction of ShotSpotter to detect, locate and alert park rangers to gunfire incidents in under 60 seconds, there have been multiple poacher apprehensions within the coverage area since its debut. The resulting speed and accuracy of the response not only increases our chances of making contact and effecting an arrest" “ShotSpotter changes the game by giving our rangers the exact location of the shot within seconds,” said Glenn Phillips, Managing Executive of Kruger National Park. “The resulting speed and accuracy of the response not only increases our chances of making contact and effecting an arrest, but over time we hope will send a powerful message to poachers to stay away.” Unmanned Aerial Vehicles In addition to significantly expanding coverage area in the park, ShotSpotter Labs plans to integrate with unmanned aerial vehicles (UAVs) for automated dispatch to the precise latitudinal and longitudinal coordinates of the gunfire. The UAVs will provide a video stream to rangers so that they can track the poachers. ShotSpotter has had to adapt its sensors and software for use in the sprawling expanse of Kruger National Park with no electricity available to power sensors. These types of system innovations required for anti-poaching are already being applied in other applications such as solar-powered sensors in freeway deployments with limited access to electricity. “I’ve seen the devastation to the rhino population firsthand in South Africa and it’s meaningful that ShotSpotter can make a difference to help these amazing animals survive for future generations,” said Ralph A. Clark, president and CEO of ShotSpotter. “This kind of engagement is not only the right thing to do, but it’s also an opportunity for us to develop innovative technology that can ultimately be incorporated back into core products across our business.”
March Networks, a global video security and video-based business intelligence pioneer, is pleased to introduce March Networks Insight. The new, hosted service provides March Networks customers with unmatched video network visibility, asset control, system health, and service level agreement (SLA) performance management. It offers a visual overview of an organization’s entire video network, and valuable reporting capabilities accessible via a secure, cloud-based platform. Leveraging the proven expertise of March Networks’ dedicated Network Operations Center (NOC) team, which already provides daily managed services to more than 35,000 sites across North America, Insight leaves customers free to focus on their business while ensuring optimum video system performance. Recurring Revenue Stream For March Networks certified solution partners (CSPs), Insight delivers the tools needed to serve customers more efficiently For March Networks certified solution partners (CSPs), Insight delivers the tools needed to serve customers more efficiently. It reduces costly truck rolls, and enables partners to easily document and track product warranty status, software versions and other information. The service is also an opportunity for CSPs to build a new recurring revenue stream, working together with March Networks’ professional services team. With Insight, customers enjoy complete, end-to-end support – from system monitoring, performance optimization and issue diagnosis, to remote resolution where possible. When onsite service is required, the NOC team generates a service ticket for customers or their certified partner along with valuable information on the likely issue, for faster, more efficient resolution. Cloud-Based Management Platform That complete support is just one of the benefits enabled by this industry-first service. Insight offers unique features and reporting capabilities that save customers time and costs, including: Easy, self-service access to the cloud-based management platform via a web browser, enabling customers and/or their certified partner to securely access critical video network information, create customized reports, and generate and track their own service tickets. Comprehensive health reporting, for at-a-glance views of a customer’s video network health, problematic areas and more. Closed-loop field service workflows so customers know that escalated issues have been resolved successfully. SLA reporting on items including outstanding service tickets and time to resolution, validating that SLA commitments are being met. Scheduled software upgrades, ensuring timely updates that help protect the video network from possible security vulnerabilities and enable feature enhancements. Inventory and product warranty reporting, providing an invaluable audit of a customer’s entire video network, including device configuration, model number, firmware version and warranty status. Optional, third-party device health monitoring employing Simple Network Management Protocol (SNMP) scanning tools, leaving customers worry-free even when it comes to non-March Networks IP devices in the video network. Optional Field of View (FOV) reports, so customers and/or their certified partner can move quickly to fix any camera FOV that’s been changed or obstructed. Geographical and network topology views, for a more intuitive overview of a customer’s video deployment, as well as the ability to quickly spot trends by region or area. Physical Access Controls To ensure customer data is well protected, March Networks enforces strict security and management controls To ensure customer data is well protected, March Networks enforces strict security and management controls. The NOC runs on a dedicated network, has its own firewall, and uses sophisticated visibility rules to segregate customer data at multiple levels. It also incorporates state-of-the art physical access controls and restrictions, including a retinal scanner and 24/7 video monitoring. March Networks conducts cybersecurity audits and penetration tests regularly, and mandates regular employee training so NOC staff are always current on cybersecurity best practices. In addition, the company backs up NOC data frequently and systematically, and has an established disaster recovery process and redundant power sources in place to mitigate power and system downtime. March Networks Insight is currently available in the U.S. and Canada, with flexible one, three or five-year service terms, and monthly, quarterly or annual invoicing options. The company is demonstrating the new, hosted service in Booth 26041 at the International Security Conference & Exposition (ISC West), April 10-12, 2019 in Las Vegas, NV.
Avigilon Corporation (‘Avigilon’), a Motorola Solutions company, announces that it unveils its new, upcoming H5A camera line at ISC West 2019. As part of Avigilon’s end-to-end platform, the versatile H5A camera line lays the foundation for Avigilon’s next-generation of intelligent video solutions. The H5A camera line will offer expanded object classification analytics as well as detailed object detection and tracking in crowded scenes, empowering Avigilon Control Center (ACC) operators to detect, verify and act faster by bringing potentially critical events to the forefront of their attention. Advanced Video Analytics Avigilon’s H5A camera line brings the next generation of neural network-based video analytic technologies and image processor features to market. Manufactured in North America, the H5A camera line will offer Avigilon’s most advanced video analytics to date, leveraging ACC software features and AI technology to focus attention on what matters most, provide actionable information to users, and dramatically increase the effectiveness of security systems. Our H5A camera line marks the beginning of a new chapter of Avigilon’s evolution" “Our H5A camera line marks the beginning of a new chapter of Avigilon’s evolution,” said James Henderson, Avigilon’s president. “Built with state-of-the art deep learning algorithms, it is designed to recognize and classify different objects such as weapons and backpacks with incredible accuracy, helping bring a more proactive approach to security.” H5A Camera Line The full H5A camera line is expected to launch in the latter half of 2019. For more information on product availability, please contact sales or come see the product demonstration at: ISC West 2019, Sands Expo and Convention Center booth 22031, in Las Vegas, USA, from April 10 to 12, 2019. The Security Event, NEC Hall 10 stand SE142, in Birmingham, United Kingdom, from April 9 to 11, 2019.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorize him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SecurityInformed.com. Q: What Do You Believe Are The Main Physical Threats To Data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organization, which are: Every organization is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organization is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What Do You Think Influences Employees To Steal Data From Their Own Organization? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many Of Us Think Of Security Threats Coming From An Outsider, Do Companies Still Face These Type Of Threats? Yes. Unfortunately, organizations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether It Be An Insider Threat Or An Outsider Threat, What Are Ways These Individuals Can Steal Sensitive Data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What Is The Difference Between COTS And Disguised Devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With These Types Of Discrete Items, Can Security Personnel Still Catch Individuals In The Act? For Example, Through Security Screenings? Poor or nonexistent screening is the most substantial security threat to any organization when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s Surprising That So Many Organizations Would Neglect Physical Security When Protecting Their Data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So How Can An Organization Protect Against These Risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organization, with little overlap or communication. organizations now are realizing that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How Can Companies And Government Agencies Combine Both Physical Data Security And Cybersecurity Initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organizations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. organizations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What Type Of Technology Can You Use To Protect Physical Data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How Does FMDS Work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What Are The Key Takeaways For Organizations Looking To Enhance Data Security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognizing the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organization’s data. Organizations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organizations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
MIPS (Milestone Integration Platform Symposium) Copenhagen 2019 saw Milestone Systems double down on the ‘creating an intelligent world’ theme from 2018 and expand it to ‘exploring an intelligent world.’ “The intelligent world theme was bigger than we could cover in one year!” said Malou Toft, VP of EMEA at Milestone Systems. Isolate Important Events With 865+ registered attendees and more than 47 exhibiting partners in Denmark, this is the largest Community Days event Milestone have hosted, even larger than the very well-attended Nashville event in February. The company took the opportunity to present Marketplace, their new Amazon-style online company directory, where end-users can identify Milestone Verified and Certified companies to supply a security solution. There was also a demo of Milestone’s XProtect software updates, able to adjust a video feed in real time to show number plates, to de-blur video and to filter out irrelevant clips to isolate important events, identified by artificial intelligence (AI). Self-Learning Mechanism We’re seeing advances on a small scale and are now going to see it becoming an inherent part of XProtect moving forward"“We’re seeing advances on a small scale and are now going to see it becoming an inherent part of XProtect moving forward,” said Malou Toft. “[One example is] the way we can ask a camera with the right type of integration to dynamically adjust to the environment.” And Malou says the best is yet to come. Of today’s technology on show at MIPS, and indeed at 2019’s trade shows, she said: “Is it super intelligent? No, not now. But it’s mostly solving the simple tasks now, that are replicable. But it is optimising the process, and to become a self-learning mechanism, we are going to see much more of that moving forward.” Exploring The Intelligent World The talks of the symposium reflected these thoughts as well. Altimeter’s Brian Solis commented about AI: “We can automate the daily things we do today, or we could use the technology to automate our innovations.” This is clear in Milestone’s theme of ‘exploring the intelligent world’ – the industry has created the foundations of the intelligent, and now companies such as Milestone and their 110 (and growing) new Marketplace partners are exploring them. MIPS EMEA 2020’s location is yet to be determined, but MIPS Bali 2019 will be Tuesday April 2 – Thursday April 4. Milestone will be back in Copenhagen for their Developer Conference October 1 and October 2.
As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated Video Cloud Service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organizations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-Accelerated Solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM Software Platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial Recognition Software IOmniscient Corp. provides facial recognition software that can recognize multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognize multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorized person and track him or her across non-overlapping cameras. Enhance Situational Awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-Class Security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimized to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic Physical Security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable products UL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive Automated System Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create Significant Value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organization.
In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organizations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Enterprise Software Companies This shift will create a huge disruption in our industry and cause further consolidation Many of these organizations are true AI and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Data capture form to appear here! Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focusing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Analyzing Mobile Endpoints There is also a potential for machine learning to enable cybersecurity companies to predict the nature of future attacks based on past behavior, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a ‘signature-based’ system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyze past incidents in a broader manner and aggregate information from a multitude of sources. A main function of AI is to analyze past incidents in a broader manner and aggregate information from a multitude of sources Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. Android Mobile Endpoints A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Machine learning can help cybersecurity efforts, but it can’t replace many important functions Ultimately, machine learning can help cybersecurity efforts, but it can’t replace many important functions. There will always be sophisticated attacks that no machine learning algorithm will be able to find. Pairing human intellect with machine technology is the best approach. In another application, AI-driven robots can be deployed for security in places where it may not be feasible to have a human patrol, such as the outskirts of a vital electric substation located hundreds of miles from the nearest town. Evolution Of Artificial Intelligence A robot can easily traverse the harsh terrain and notify authorities when something is amiss. Another use is during disaster recovery efforts. Robots don’t get tired, and they don’t have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behavior or alert first responders to those who may need aid. In situations where health and safety concerns preclude the ability of having a human to watch the site, such as at toxic waste dumps, robots can be deployed. Although drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence is also revolutionizing the capabilities of machines to work autonomously. If you missed part two, see it here. Or, to start from part one, click here.
LOCKEN has been selected to modernise access management for half of all substations in Enedis’ national network. Following a test phase it has opted for the latest-generation intelligent key by Iseo, which uses contactless induction technology to guarantee instant access. The EDF subsidiary supplies electricity to consumer meters, through extremely high-voltage lines, located at its many substations. The solution is currently being introduced and full deployment across 1,100 substations will take place throughout 2019. Effective Solution The construction principles for this type of structure require wide open spaces to keep people and equipment safe Substations transform the power from very high-voltage lines (90,000 V or 225,000 V) to high-voltage (20,000 V most often) and through to private homes (230V). Some sites may be located in urban settings. In this case, the substations are installed in underground infrastructure, like in Paris and its inner suburbs. But most are found in rural or semi-urban areas, covering a half or full hectare. The construction principles for this type of structure require wide open spaces to keep people and equipment safe. With perimeter security accessible through an outside gate, substations comprise a technical room and a number of transformers, which may be outside or under shelter. These facilities have many access points which must be secured. Without an effective solution, key management is complex and operational efficiency is reduced. Centralized Management Software Substations are sensitive sites with strictly controlled access. Given the exposure to electrical risk, intrusions present potentially lethal consequences. This is where the LOCKEN solution comes in: a single key with associated rights allows employees to open any area they require (and are authorized to access) as part of their job. A lost key is easily disabled within the centralized management software. The solution is particularly appropriate given the number of maintenance officers required by substations. Users are not all Enedis employees, explains Maxime Leboeuf, Project Manager at Enedis. “Although site workers are mostly Enedis employees, the sites must also be accessible to subcontractors for extension and renewal work and a number of maintenance operations, by employees of RTE, the electricity transmission system operator responsible for the very high-voltage lines which end at substations.” Electronic Access Management “Electronic access management drastically reduces the risk of intrusion associated with mechanical keys. With the Locken system, we can now authorize subcontractor access for a specified period and location. In the Enedis setup, the access rights memorised by the electronic keys must be updated daily by the key's user using the dedicated devices.” Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software" “Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software. This also provides a reliable crisis management tool.” At Enedis, LOCKEN has fitted outdoor access points in often isolated, rural areas. The key supplies the energy to open the cylinder so no wires are needed for doors. Extending Electronic Key The cylinder is approved to resist extreme weather conditions, especially the effects of water. Contactless technology also shields it from dust and oxidation. Enedis is considering the possibility of extending electronic key use to the most sensitive parts of its technical rooms, especially access to control and command rooms, the nerve centres of the substations. Enedis also plans to replace all substation cylinders to minimize the risks associated with joint activity, meaning a number of operations carried out by different engineers can take place simultaneously at the same substation.
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorized access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could be applied to both high and low security areas. The system al so needed to provide a comprehensive audit trail and detailed reporting, to identify access movements by employees and help meet legal requirements around the safe and secure storage of medication and equipment. Gallagher Single Access Card Control System Gallagher’s access control solution for Waikato DHB utilizes a single access-card system that simply and instantly updates access permissions Gallagher’s access control solution for Waikato DHB utilizes a single access-card system that simply and instantly updates access permissions, as well as streamlining car parking services. Where high-level security is needed, Gallagher’s system offers Waikato DHB the ability to lock-down areas of the hospital when required, isolating areas and restricting access. Gallagher’s Command Center Mobile application also delivers duress notifications from buttons located around the hospital directly to a guard's mobile device. Electronic Tag Boards allow contractors to easily sign on and off of the site, ensuring Waikato DHB meets health and safety requirements. In an environment where access profiles change on a daily basis as staff move between different departments, Gallagher’s access control system and Command Center central management platform ensure staff can approach doors with the confidence that they can enter or leave areas as necessary. The access card system has also reduced the risks associated with handling keys, along with providing detailed reports to meet comprehensive auditing requirements, saving time and cost. 'Security Ward Standard' Waikato DHB's experience with Gallagher products ultimately led them to develop a 'Security Ward Standard' detailing the minimum-security equipment required for new buildings, greatly reducing time spent producing specification documents and gathering approvals. As Waikato DHB's security requirements continue to evolve, Gallagher’s systems provide future-proofing with a software maintenance agreement ensuring they operate the very latest software available. Fast Facts About The Project Industry: Healthcare Business type: Hospital Number of employees: 6,500 Site Size: 18 hectares with 176,000 sq.metres of buildings Number of doors: Over 730 access-controlled doors; 40 alarmed and monitored refrigerators/freezers; 15 carpark barrier arms; 1 gate. Gallagher solutions and technology utilized: Command Center Controller 6000 T-Series readers Tag Boards Car park Management
The retail industry is constantly looking to find new ways to be relevant in the ever-increasing shadow of online shopping. Researchers have predicted a 17.5 percent growth in the ecommerce share of global retail sales in 2021, rising from 13.7% in 2019. When designer brand Miniso opened new shops in Poland, they used Hikvision technology to give them the edge. The management team at Miniso had a number of specific questions they needed answers to in order to make the stores successful in the cut-throat high street environment. Best-Selling Products They resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise How do we know if our marketing strategy is working? What is the conversion rate of purchases? What are the ‘hot areas’ of the store, and do these actually represent best-selling products? Originally, with no access to significant information, they relied on experience and conversation with staff. But there was no way to verify these findings. They also needed to be able to get this information remotely – i.e. management in their HQ in Warsaw wanted to be able to see the situation in the other four stores without having to visit them separately. Sometimes, they resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise. Tailor-Made Solution Miniso turned to Hikvision AI products, with a solution built by Polish reseller Volta, including people counting cameras, fisheye cameras and NVRs. These were all coordinated using the HikCentral software platform. A people counting camera in each store counts people passing by, while another counts people entering and leaving. With this tailor-made solution management could calculate how many people were passing by to see a purchasing conversion rate. This also helps them to know whether marketing strategy is working. They can analyze the information further to see whether the rate of people entering the store is dropping, and whether that relates to the number of those passing outside. Miniso’s management can then look into the causes of these numbers, along with sales figures, to form a picture. For example, whether there is an external factor affecting shoppers either to pass by, or to enter. Video Management Platform The professional video management platform allows managers to access the information from different offices and mobile applications anywhere Because Miniso have the same technology set up in all the stores in Poland, they can compare different locations. This also comes in useful when it’s time to negotiate rent with shopping malls. Using ceiling installation of several fisheye cameras, the system can generate heat maps. This helps managers to see where ‘hot areas’ are, helping them to allocate products in the optimal place for promotion. Hot areas can also be compared with sales figures to provide further insights into shopping patterns. All the information provided by the system is coordinated, and business information on both layout and original image can be overlaid in Miniso’s HQ in Warsaw. The professional video management platform allows managers to access the information from different offices and mobile applications anywhere. This makes life a lot easier for the operations team as they need to check the situation in all stores. Fiercely Competitive Environment It also means that everything can be viewed simultaneously, so they can identify trends throughout the network of stores. Byron Zeng, Vice President of Miniso Poland, says: “The high accuracy of conversion rate the solutions provides really solves a number of our management issues. We can now easily see what’s going on in the other stores, including heat mapping, which makes management of the whole networks so much more efficient.” This is a great example of how AI surveillance products can change the landscape of business decision-making. In a fiercely competitive environment, like a shopping mall or high street, shopping trend data can help a retailer to survive. In fact, this worked so well for Miniso, they decided to use the solution in their stores across the whole of Europe – potentially about 200 stores in the next year.
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle Checks And Fleet Management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognize the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone Worker Protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Following the recent successful installation of 360 Vision Technology’s new Invictus ruggedized PTZ camera by a north London borough, the same borough has now rolled-out over 100 Invictus cameras across seven Greater London towns. With an early success in prosecuting serious crime following the deployment of Invictus, its highly effective night-time HD quality color video footage proved to be just one of the useful attributes of the UK manufactured camera, when a recent significant impact by a vehicle to a camera column tested its suitability for roadside deployment. The Invictus camera took the high-speed impact in its stride and showcased its ‘Attack Detect’ feature, automatically resetting to the last viewing position prior to being forcibly moved from its previous viewing direction, and with no damage to the camera or its direct drive PTZ mechanism. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer" Importance Of Ruggedized Cameras Commenting on the broader roll-out of Invictus cameras, DSSL Group’s Works Director, Aaron Stephens, who specified the 360 Vision Technology cameras confirmed: “The importance of selecting a product that is ‘fit for purpose’ when being deployed roadside in a town center is often overlooked by some companies, who deploy non-ruggedized cameras purely on the basis of cost. If a PTZ camera were to fall from height following an impact, which is a real risk, there would be a substantial public health and safety incident. “At DSSL, we take a holistic view to consider the surveillance needs at each individual location, to ensure that all aspects of camera deployment are taken in to consideration. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer.” The expanded installation takes the total number of Invictus cameras to over 100; and allied to wireless links forming a major part of the system’s infrastructure, comment has been made regarding the superb quality of the Invictus camera video over wireless infrastructure. Simplified Surveillance Operation Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras"In a market often dominated by imported Far East products, the integration of Genetec Security Center and high-performance Invictus PTZ cameras has proven the effectiveness of two Commonwealth technology providers. Commenting on the camera/control technology collaboration, Genetec Country Manager, Paul Dodds said: “Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras. Genetec Security Center unified platform and Omnicast video surveillance has been used to seamlessly blend full Invictus camera menu control, within a single intuitive interface. 360 Vision cameras are a Genetec certified product on our supported device list. This successful deep integration has simplified the London borough’s surveillance operation and effective management. We value all of our technology partnerships, and especially with manufacturers such as 360 Vision Technology, who offer reliability with their Invictus PTZ cameras, as illustrated here across seven north London towns.” Reducing Carbon Footprint With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption"Adrian Kirk, Strategic Account Director at 360 Vision commented on the green credentials of Invictus, which was a factor in the overall decision by DSSL to specify the camera: “With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption. “On larger projects like this, the savings on energy and reduction in associated pollution offers significant advantages over Far East camera alternatives, helping Local Authority end-user system operators to meet their carbon footprint reduction goals. “With a host of performance and user centric operational benefits, Invictus is well placed to feature extensively in future Local Authority upgrades, as customers look at total cost of ownership and the need to ensure CCTV equipment deployed road side is fit for purpose.”
MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches. NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches. Tracking Objects In Real Time NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements. NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyze and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats. Enhanced Awareness Picture The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control. Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What role can social media play in security?