HENSOLDT, the sensor solutions provider, will equip an undisclosed South East Asian Customer with its Xpeller counterdrone solutions (C-UAS). Due to the sensitive nature of the customer’s mission, the details of the Xpeller configuration remain confidential. Features The HENSOLDT system, Xpeller, is made up of numerous sensors. Different configurations are offered according to the customers’ missions. The agility and scalability of Xpeller demonstrates its strength. With this modu...
VXG, a globally renowned cloud video surveillance provider, is excited to integrate with Seagate Technology’s recently launched Lyve Cloud, a frictionless storage-as-a-service cloud service. The collaboration enables a simple, scalable and cost-optimized solution for companies in need of a white-label cloud video surveillance system or VSaaS solution. Cloud video surveillance Cloud video surveillance is a booming industry with an expected market value of US$ 52.98 billion in 2026 up from...
With foreign travel remaining uncertain amidst the COVID-19 pandemic, the UK staycation market is set to boom. In fact, new research has found that 83% of British travelers would prefer to holiday in the UK rather than travel abroad this year, bringing a much-needed boost to the country's hospitality sector. This coupled with Brexit, rising costs of oversea travel and the fact that people are thinking more about their carbon footprint, means that many investors have been taking advantage of the...
U.S. specialist insurance brokerage and risk management firm, Risk Strategies is to roll out CyberCube's Broking Manager, the cyber risks analytics platform for insurance intermediaries. In addition, Risk Strategies will also be using Application Programming Interface (API) components from CyberCube's solutions for analytics. Founded in 1997, Risk Strategies is a globally renowned specialty insurance broker and risk management consultancy. The firm has over 25 specialty practices, more than 2,5...
With resistance to attack and extreme weather, wire-free installation, and battery-powered operation, the new SMARTair i-gate Electronic Padlock is built for use almost anywhere. This new device in the SMARTair wireless access control range enables facility managers to add real-time control to non-electrified gates, cupboards, cabinets, closets, crates, and more, wherever they are and whatever the climate. SMARTair i-gate Electronic Padlock For many organizations, security and access needs to...
Aryaka®, the front-runner in fully managed Cloud-First WAN and SASE solutions, announced that it has acquired Secucloud GmbH, a proven SASE platform provider, delivering network security from the cloud. The deal closed in late April 2021, and Secucloud is now a wholly-owned subsidiary of Aryaka. Based in Hamburg, Germany, Secucloud GmbH offers an innovative platform designed to provide an all-in-one, global, cloud-based firewall-as-a-service, secure web gateway with advanced threat protecti...
Johnson Controls, the pioneer in smart, healthy, and sustainable buildings, and architect of the OpenBlue digital connected platforms, releases the newest version of the Tyco Kantech EntraPass security management software. EntraPass version 8.30 features additional support for Tyco DSC PowerSeries intrusion alarm panels, including a fully functional virtual keypad, enhanced support for EntraPass web macOS functionality, cybersecurity updates, and other optimizations for a more streamlined user experience. Intrusion alarm panels For a more seamless combination of access control and intrusion, additional support for the Tyco DSC PowerSeries alarm panel family includes a fully functional virtual keypad, with the same functions, navigations, and emergency keys as the physical DSC intrusion alarm panels. This enables system operators to perform intrusion functions remotely This enables system operators to perform intrusion functions remotely from an EntraPass workstation, such as the arming/disarming of intrusion panels or acknowledging/canceling alarms without needing to be physically present at the keypad’s location. Printing cardholder badges Users who prefer mobile access to their EntraPass software can now view real-time or recorded video from Tyco Exacq and Tyco American Dynamics VideoEdge NVRs as part of new features in EntraPass web macOS v1.10. Other enhancements include creating, customizing, and exporting reports to PDF, the ability to take users’ pictures and print cardholder badges on site and in real-time. As part of ongoing efforts to improve cybersecurity, the following enhancements were added to EntraPass software: EntraPass workstation reports are now stored in the Windows user’s document folder. Updated operator roles and password requirements. Microsoft certificate validation that the EntraPass application has not been tampered with.
In the AIoT era, the world is getting smarter. Everything is going to have an online “ID” and then connected into a vast net of IoT devices, like a laptop computer, a cellphone phone, a connected thermostat, or a network security camera. Cybersecurity in the AIoT era According to a Markets and Markets report, IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, currently, there are no unified global technical standards for IoT, especially in terms of communications. This results in inefficient data management and reduced interoperability mechanism and ultimately may cause reduced security in the IoT network. The global Internet of Things (IoT) security market size is expected to grow from USD 12.5 billion in 2020 to USD 36.6 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 23.9%. Importance of cybersecurity Various vertical industries store unprecedented amounts of data on devices like IP cameras and NVRs Dahua Technology, a video-centric smart IoT solution and service provider, believes cybersecurity is of vital strategic importance in the age of AIoT. In various vertical industries, such as traffic, banking & finance, hospital, and critical infrastructure, organizations collect, process, and store unprecedented amounts of data on devices like IP cameras and NVRs. A significant portion of that data can be sensitive or private information, which can be prone to cyber-attacks and the situation, is getting worse because there are more devices than people. As a security solution provider, Dahua Technology continuously invests in cybersecurity and actively copes with network security issues. Continuous investment & active coping Committed to becoming a leader in cybersecurity and privacy protection in the global security industry, Dahua Technology has been developing and exploiting cybersecurity for nearly 10 years. The company keeps investing about 10% of its annual sales revenue in R&D every year, including cybersecurity. In addition, the company put together a professional team of nearly 100 personnel to focus on cybersecurity issues. With rich experience and sufficient resources, Dahua Technology promises to be positive, open, cooperative, and responsible when it comes to cybersecurity. Dahua Technology cybersecurity approach 1. Organizational structure In order to achieve better efficiency and effectiveness, Dahua Technology operates a comprehensive system to cope with all cybersecurity-related issues. The system, led by the cybersecurity committee, also contains a cybersecurity & data protection compliance group, cybersecurity institute, and product security incident response team (PSIRT). The cybersecurity committee, above all departments or teams, can call resources from the whole company, from the R&D center to the legal department, supply chain, overseas business department, etc. when necessary. Cybersecurity Institute is in charge of building the sSDLC process and implementing the process to all Dahua product series, making sure that all Dahua products are strong against cyberattacks. 2. Security development lifecycle Dahua adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security Dahua Technology adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security. During the security design phase, STRIDE + Attack Tree + PIA is adapted to improve threat modeling. During the security realisation phase, OWASP top 10 and over 150 CWEs are used to achieve static code analysis. During the security test phase, over 20 tools within 7 fields are applied to realize the multiple security testing. CompTIA PenTest+/Security+ are used to carry out professional penetration testing, while compliance ISO 30111&290147 and MITRE org CAN are followed during vulnerability management after the products are sold. 3. Emergency response system Cooperation with professionals from across the globe is a great way to improve vulnerability detection. Therefore, Dahua Cybersecurity Center (DHCC) is established to solve cybersecurity issues with security vulnerability reporting, announcement/notice, and cybersecurity knowledge sharing with our global customer base in order to provide them with more robust and secure products/solutions. Product Security Incident Response Team (PSIRT) is an integral part of DHCC. Composed of professionals ranging from marketing, supply chain, service, and legal representatives, PSIRT is responsible for receiving, processing, and disclosing Dahua product and solution-related security vulnerabilities. Team members are on duty 7 days a week and guarantee to respond to an emergency within 48 hours. End-user, partner, supplier, government agency, industry association, and independent researchers are encouraged to report potential risk or vulnerability to PSIRT by email. 4. Personal data & privacy protection Dahua Technology also attaches great importance to personal data & privacy protection. Complying with applicable laws and regulations such as EU’s General Data Protection Regulation, EDPB’s Guidelines on the concepts of controller and processor in the GDPR, ETSI EN 303645’s Cyber Security for Consumer Internet of Things: Baseline Requirements as well as US’s California Consumer Privacy Act, the company established the Personal Data & Privacy Protection Standard. The standard stipulates that privacy protection methods such as de-identification, data encryption, and systematic access control, privacy-friendly setting are fully adapted to the complete data life cycle all the way from the collection, transmitting, storage to sharing, copying, and deleting. In addition, working with world-renowned third-party institutions, Dahua Technology has received Protected Privacy IoT Product Certification and ETSI Certification from TÜV Rheinland, as well as ISO 27018 Certification and ISO 27701 Certification from BSI, which help demonstrating its capability in managing personal information and compliance with privacy regulations around the world. 5. Continuously iterating security baseline The security baseline built a security element layout of "AAA+CIA+P", a systematic protection framework Centered on the core principles of Security by Design and Security by Default, the Dahua security baseline initiative taps into product safety technology to provide users with adequate safety guarantees. Based on and practicing the security and privacy design principles, the security baseline builds a security element layout of "AAA+CIA+P", forming a systematic protection framework covering physical security, system security, application security, data security, network security, and privacy protection. 7 versions of baseline and 100+ principles have been developed to adapt Authentication, Authorization, Audit, Confidentiality, Integrity, Availability, and Privacy protection deeply into the product quality assurance system, making sure that all Dahua products enjoy the factory default security. 6. Product security center In order to help users clearly understand the security status and capabilities of the device, the product security center will assist users to conveniently and quickly set up the right security configuration to suit the scenarios. General security capabilities include privacy protection (face occlusion, information hiding, etc.), video encryption, security alarm, trusted protection, CA certification management, key management service, attack defense, and so on. 7. Cybersecurity ecosystem Adhering to openness and cooperation, Dahua Technology keeps cooperating with international authoritative security institutions to jointly build a secure ecosystem. By rich & in-depth communicating and cooperation with institutions like TÜV Rheinland, BSI, DNV·GL, Intertek EWA-Canada, and bright sight security lab, the company stays advanced its security capabilities and systems. In a widely networked world of IoT, cybersecurity challenges are pretty much a universal sore spot for companies globally. Dahua Technology, in the business of keeping people safe, takes cybersecurity seriously from head to toe. With a mindset that emphasizes cybersecurity and all the resources that it can allocate to establish, carry out and strengthen the cybersecurity approach, Dahua Technology plans to stay positive, open, responsible and improving for the matter of cybersecurity.
ISS – Intelligent Security Systems, a foremost supplier of intelligent Video Management System (VMS) and analytics for myriad security and business intelligence applications, has released its unique SecurOS™ Soffit Intelligent system that escorts pedestrians using dynamic illumination to prevent accidents at crosswalks. A recent survey, conducted by the Governors Highway Safety Association, points out that most pedestrian fatalities occur on local roads, at night, and away from intersections. This fact suggests the need for safer road crossings and increased efforts to make pedestrians and vehicles more visible. During the past 10 years, the number of night time pedestrian fatalities increased by 67%, compared to a 16% increase in daytime pedestrian fatalities. To meet the challenge of the growing number of traffic accidents involving pedestrians at hazardous crosswalks on both city and country roads, ISS has developed SecurOS™ Soffit. About SecurOS™ Soffit SecurOS™ Soffit is an intelligent system of light accompaniment for pedestrians that helps prevent pedestrians from being struck on unlit or dark crosswalks. The solution draws the driver’s attention to the pedestrian by escorting them with dynamic illumination along the pedestrian crossing. The dynamic illumination significantly increases the speed of drivers’ visual-motor response, so they have the ability to brake in time to avoid accidents. The use of SecurOSTM Soffit provides a significant increase in road safety and reduces the overall number of pedestrian accidents and fatalities. This pedestrian crisis has ignited the development of vehicle sensors in most new automobiles. Evolving driver assistance technologies like forward-collision warning, adaptive lighting, and pedestrian automatic emergency braking not only keep drivers and passengers safe, but they keep other drivers and pedestrians safe as well. Operated automatically 24/7 What sets the SecurOS™ Soffit apart is that it is the only solution on the market designed to operate automatically 24/7 employing video analytics detectors based on artificial intelligence technologies using cameras that are built on an Intel platform. SecurOS Soffit provides video processing from an IP camera that can detect pedestrians The solution provides video processing from an IP camera that can detect pedestrians, determining their location at every moment and tracking their trajectory according to change in their speed. The algorithms are resistant to frame interference from noise like precipitation, trees, and shadows falling on a pedestrian crossing. Machine learning technologies minimize the chance that the device will respond to a non-human object. The SecurOS™ Soffit, unlike solutions where static or dynamic illumination of road signs or asphalt at pedestrian crossing markings is used, narrowly focuses the driver’s attention on pedestrians exclusive of other potential distractions. Software interoperability Interoperability with other traffic violation detection systems also provides a big advantage for this solution. SecurOS™ Soffit may operate with SecurOS™ Velox and SecurOS™ Crossroad and can ensure the detection of traffic violations like: Not giving way to pedestrians Not following speed limit Red light driving, driving through stop-sign while red light is active Bus-lane driving Wrong-way lane driving Not following road signs and many other traffic violations
Actuate, the globally renowned provider of automation and intelligence software for smart security camera systems, has announced that it has closed its Series A financing of US$ 8 million to expand the capabilities of its computer vision technology and build on the company’s growing portfolio of customers. The funding round was led by Tribeca Venture Partners and joined by Scribble Ventures, OCA Ventures, and Context Ventures, with additional support from existing investors, including Bling Capital, Upside Partnership, and Tensility Venture Partners. Critical layer of intelligence About 90% of organizations have security cameras, yet many cameras are unmonitored and most data goes unused, which can endanger lives and lead to significant economic losses. Actuate is adding a critical layer of automation and intelligence to support data-driven security decisions and enhanced vigilance. The company’s AI-powered computer vision software turns any security camera into an intruder- and threat-detecting smart camera that dramatically reduces the time it takes for security teams and law enforcement to respond to issues. AI-powered computer vision technology The Actuate solution integrates with any existing security camera without additional hardware The Actuate solution integrates with any existing security camera without additional hardware, providing organizations with safer, cost-efficient and end-to-end security automation. The software identifies safety and security threats in real time, reducing false positives by as much as 99%. When threats are detected, alerts are issued automatically, in order to help security teams respond quickly to gun presence, intruders, social distancing violations, loitering, and other security events. Security management solutions Actuate’s analytics are trusted by hundreds of customers nationwide and deployed at over 1,000 sites, including schools, offices, military facilities, construction sites, affordable housing, high-end residential buildings and industrial facilities. “We unfortunately live in a world where active shooter events and public safety threats continue to make headlines year after year, pointing to the critical need for faster, more accurate, and privacy-conscious security management solutions,” said Sonny Tai, the Chief Executive Officer (CEO) of Actuate. End-to-end security automation Sonny Tai adds, “Actuate empowers security staff at the places we live, work, shop, and depend on with end-to-end security automation, helping them to do their jobs better and improve safety outcomes. As we culminate a year of exponential growth, this support from our investors will be instrumental in driving the adoption of our security management platform and growing the range and accuracy of our privacy-conscious AI.” In leveraging the new funding to expand its solution’s capabilities, Actuate is enhancing its behavior detection technology, which allows the software to detect adverse events or accidents, such as slip-and-fall incidents, and is also further developing its all-in-one security management platform. Real-time video analytics and automation With its unique AI software, Actuate is bringing physical security into the age of automation" “With its unique AI software, Actuate is bringing physical security into the age of automation,” said Brian Hirsch, Managing Partner of Tribeca Venture Partners, adding “Actuate’s end-to-end platform, powered by unique IP, solves a myriad of security and building management challenges, across organizations through real-time, video-based analytics and automation.” “With professionals and students returning to offices and schools, we see a huge opportunity for Actuate’s solution to help manage social distancing concerns, while cost-effectively protecting against security and safety events that can not only hurt the bottom line, but also puts lives at risk. We’re proud to support the company in its mission to ensure a safer, more peaceful future for all.” Security monitoring service “We started deploying Actuate’s AI models this year and the difference in both accuracy and technical support has been palpable, so seeing Actuate’s venture funding success comes as no surprise,” said Blake Ballard, Director of Operations for Louisiana-based security company, Global Monitoring Solutions. Blake Ballard adds, “Security teams rely on technology and tools that work proactively to ensure safety at all times. Utilizing Actuate’s exceptional platform and top-notch team has enabled us to provide a much more reliable security monitoring service to our customers, making them the only solution we’d work with.”
SKIDATA, the globally renowned company in parking access and revenue management, has announced a new technology integration partnership with Openpath, an international company in touchless and modern access control, and workplace safety automation. SKIDATA – Openpath partnership Through this partnership, Openpath’s ground-breaking touchless and mobile access control technology will be integrated into SKIDATA’s parking access and revenue control equipment, in order to permit drivers to enter and exit SKIDATA-equipped parking facilities, using their Openpath credentials. “We are excited to be partnering with Openpath,” said Darrell Smithson, President for North America region at SKIDATA, adding “SKIDATA already makes the world’s most reliable and user-friendly parking equipment. The addition of Openpath’s technology will improve the customer experience by providing seamless entry into parking facilities.” Touchless and mobile access control This partnership will help ensure that SKIDATA will continue to lead the way in providing smart city infrastructure" “SKIDATA has always led the way when it comes to introducing new technological capabilities to the parking industry,” continued Darrell Smithson, adding “This partnership will help ensure that SKIDATA will continue to lead the way in providing smart city infrastructure.” The addition of Openpath’s technology, which provides touchless and mobile access via Bluetooth, Wi-Fi, and LTE technologies, to SKIDATA equipment, will permit drivers to access SKIDATA-equipped parking facilities with their smartphones and other personal devices, as well as via license plate recognition (LPR), allowing drivers to enter and exit parking garages quickly and conveniently, without having to stop and swipe a card, or reach out of their vehicle to validate parking access. Mobile access for parking facilities When drivers approach the parking facility, they can gain access via the SKIDATA app on their personal devices. Bluetooth, Wi-Fi, and LTE connectivity access are most useful for managing permit parking and the technology is perfect for parking owners and organizations, which offer permit parking, including residential facilities, office complexes, universities, hospitals, airports, special events parking, and stand-alone parking garages. James Segil, President and Co-Founder of Openpath, “With this integration, we are excited to further demonstrate how Openpath’s seamless user experience extends beyond just the four walls of a building. Providing safety and simplicity for users throughout their day; from the moment their vehicle enters the parking garage, to the doors, elevators, and turnstiles they use in repetition. End-to-end security solution James Segil adds, “Openpath’s technology enables a completely touchless experience for tenants and guests, and eliminates the need for users to juggle multiple apps or credentials to get where they are going. Our mission is always to deliver end-to-end security, while reducing friction and this integration is another great example of that.”
A lockout/tagout padlock is often the last obstacle to prevent premature machine energization, and a potential maintenance accident with impact on professionals and on their personal lives. To strongly highlight that lockout/tagout padlocks protect people, Brady Corporation now offers PrintFace: a complete padlock personalization, up to printing coworkers' pictures directly on their padlocks. By printing a face on padlocks, each lockout/tagout padlock can clearly show who it is protecting. PrintFace will help deter padlock tampering and will highlight that safety is very personal. Other personalization options Removing padlocks in lockout/tagout should only be done by the padlock owner, who is shown on the lock. Team leaders, or a site safety manager, can step in if necessary, by following an agreed-on procedure that maintains safety. Next to adding a picture, other personalization options are available including adding a company logo, serial number, text, and more. In addition, padlock engraving is available to achieve an even higher reliability Personalization can be printed in full color and in high resolution directly on Brady's nylon SafeKey padlocks for lockout/tagout. The print is abrasion -, chemical -, and UV-resistant and highly reliable in both in- and outdoor lockouts. In addition, padlock engraving is available to achieve an even higher reliability, at the expense of color and complex shapes. Standard safety padlock As a third, standard approach to personalize padlocks, it is also possible to write or print basic information on self-adhesive labels supplied with any Brady padlock. Brady's SafeKey lockout padlocks offer 700% more lock and key combinations than a standard safety padlock. An innovative lock mechanism enables 100 000+ combinations that can optimally support complex key hierarchies including several master and grandmaster keys. All key numbers are charted to ensure no two keys in the same company will open the same lock if so required. This enables a safe, future-proof lockout/tagout program that fully respects the procedure's one person, one lock, one key principle.
The Annual Fraud Indicator estimates that fraud costs the United Kingdom approximately £190 billion every year. The private sector is hit the hardest and loses around £140 billion a year, while the public sector loses more than £40 billion, and individuals lose roughly £7 billion. The effects of fraud can be devastating on both individuals and organizations. Companies can suffer irreversible damage to reputation and be forced to close, and individuals can experience significant personal losses. Everyone should be aware of the risks and take steps to protect themselves against fraudulent activity. Fraud detection technology Fraud detection technology has advanced rapidly, over the years and made it easier for security professionals to detect and prevent fraud. Here are some of the key ways that Artificial Intelligence (AI) is revolutionising fraud detection - with insight from Tessema Tesfachew, the Head of Product at Avora. An anomaly can be described as a behavior that deviates from the expected An anomaly can be described as a behavior that deviates from the expected. According to Tessema Tesfachew, “Autonomous monitoring and anomaly detection specifically, have made detecting fraudulent activity faster and more accurate. Machines can monitor data 24/7 as it comes in, build patterns of behavior that take into account seasonality and shifting trends, and identify events that don’t fit the norm.” For example, banks can use AI software to gain an overview of a customer’s spending habits online. Having this level of insight allows an anomaly detection system to determine whether a transaction is normal or not. Suspicious transactions can be flagged for further investigation and verified by the customer. If the transaction is not fraudulent, then the information can be put into the anomaly detection system to learn more about the customer’s spending behavior online. Accurate root cause analysis Root cause analysis goes one step further than anomaly detection, by allowing security professionals to pinpoint what caused the anomaly. Tessema explains how an example of this would be if a system detects that the rate of fraudulent transactions has increased. Root cause analysis would pinpoint the specific ATM or point of sale, where this increase is occurring. Swift action can then be taken to prevent fraudulent activity at that location in the future. Fewer false positives As mentioned, false positives can occur if a fraud detection system identifies behavior that goes against the norm, for instance, if a customer makes a transaction in a new location. In many cases, customers are required to complete identity verification to prove that a transaction is not fraudulent. Digital customer identity verification can help brands build a strong and reputable image. That said, forcing users to complete identify certifications regularly can cause frustration and harm the customer experience. AI anomaly detection AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data AI anomaly detection is far more accurate and results in fewer false positives. Increasing the accuracy of anomaly detection helps companies improve customer relationships and build a strong reputation. This will have a positive impact on brand image and sales revenue. AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data. Machines are more efficient than even the most skilled fraud analysts and make fewer errors. This is why AI fraud detection software is the preferred option in larger organizations. Importance of fraud analysts However, fraud analysts still play an important role in fraud prevention. Using a combination of human intervention and AI is usually the most effective approach when it comes to fraud detection. According to pymnts.com, innovative organizations now use a variety of AI and supervised and unsupervised machine learning to identify and protect against fraud. AI systems can complete time-consuming and repetitive tasks, such as data collection and analysis. This means that fraud analysts can focus their time and attention on critical tasks that require human intervention, e.g. monitoring risk scores. AI can automate processes and enhance the quality of the fraud analysts’ work. Conclusion In to Tessema Tesfachew’s opinion, “Fraud detection has become vastly more efficient and effective with the introduction of Artificial Intelligence (AI). Previously, methods for detecting fraudulent activities were still data-rich, but relied more on human intervention and expert bias, and were thus, more time consuming and prone to error.” AI technology, particular anomaly detection, has streamlined fraud detection and created a more efficient, and accurate system for detecting and preventing fraud. Covid-19 has increased the number of online transactions, which creates more opportunities for fraudulent activity. However, it also allows businesses to gain more information on their customers and enhance the capabilities of AI security software. It is more important than ever for organizations to utilize AI technology in fraud detection strategies.
The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol. This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.
While COVID-19 caused widespread disruption and many challenges for businesses, its sudden arrival prompted some very quick decision-making around how to maintain operations. For some businesses, cloud-based video conferencing solutions provided a welcome alternative to meeting face-to-face. A year on and it seems that this sudden and mass adoption of cloud has accelerated a digital transformation process in other departments. Physical security too is increasingly moving to the cloud in the form of hosted solutions, where Video Surveillance as-a-Service (VSaaS) is providing comprehensive protection across a range of industries and sectors. To better understand the impact of this migration to the cloud, hosted security provider Morphean commissioned a survey of 1000 senior decision-makers across the UK, Germany, and Sweden, working in HR, facilities management, IT, and security. As well as ascertaining purchasing intent around hosted security applications among a broad spectrum of buyers, the results would provide key indications around the abilities of cloud to benefit organizations in regard to both security and business operations. An increasing urgency around VSaaS and ACaaS adoption Low costs, flexible scalability, demand for real-time and remote access to security data are key to the adoption of hosted solutions Survey results revealed that 51% of senior decision-makers are currently using cloud-based video surveillance (VSaaS) and/or a door entry/access control system (ACaaS). This represents a 3% increase in comparison to responses from a 2019 survey (48%), and broadly reflects projected growth in the physical security market from USD $93.5b in 2020 to USD $120.3b by 2025 at a CAGR of 5.2%. Low costs, flexible scalability, and demand for real-time and remote access to security data are key to the accelerated adoption of hosted solutions in the current climate. A significant 70% of respondents agreed that the pandemic had actually increased the necessity/urgency for businesses to adopt VSaaS and ACaaS, with IT Services revealed as the sector with most respondents strongly or somewhat agreeing (82%), followed by Security (73%). Results highlight a hosted physical security market which is in a strong position for 2021. Physical security utilizing the cloud can unlock many security and business benefits for the modern organization as it faces many new challenges. Business optimization and operational insights The benefits of VSaaS and ACaaS prompted Morphean to examine what areas of the business were optimized, or in need of improvement. 43% of those surveyed stated that data/information security was the most optimized aspect of their company. The total number of respondents who indicated that physical security was already optimized had risen by 4% since our 2019 survey, to 27%. It was those working in IT who saw the greatest disparity in security-related optimization, with far fewer recognizing that physical security was optimized (28%) compared with data/IT security (55%). This may point to an opportunity to increase physical security optimization to be on par with data/IT security. 95% of those surveyed agreed that if an existing security system could deliver insights beyond security to assist decision making it would influence adoption. It is clear that the growth in connected digital devices through the IoT is resulting in a growing appetite for physical security, such as network cameras, to enhance existing IT systems and assist business intelligence gathering. As an example, consider an office environment where access control and video data can be used to determine an employee’s movements in the event of a positive COVID-19 result and alert others who may have made physical contact with that individual. A future proof business model Decision-makers surveyed that use of cloud technologies to increase in the future as a result of COVID-19 78% of the 1000 senior decision-makers surveyed anticipate their organizations’ use of cloud technologies to increase in the future as a result of COVID-19. Rather than being tied to fixed IT infrastructure on-premises, businesses are able to customize and scale quickly to meet ongoing challenges without the need for large upfront capital investment. The convenience of as-a-service can be paid for out of operational expenditure as a monthly cost. This is the proven business model of the cloud. Yet the security industry has been slow to adopt it. One key challenge is the way in which the prevalent business models in the sector operate. Transitioning to sales cycles based on monthly licenses rather than up-front purchases won’t be easy, but the security channel must learn how if it is to remain competitive and drive new business opportunities. This recurring revenue model will be interesting for the physical security industry who will have witnessed uncertainty and, in some cases, a downturn in revenues as decisions around capital expenditure were put on hold during the crisis. Full support and extensive functionality From a customer perspective, 28% of respondents highlighted cost benefits as a key factor in the move towards VSaaS/ACaaS and 19% indicated that they would expect to see all-inclusive updates/upgrades and support. VSaaS and ACaaS are supported by the latest software updates and firmware upgrades, so are always up to date. Additionally, functionality such as remote management allows operations to be monitored offsite via mobile device. Access from any location (32%), remote maintenance (31%), and the ability to monitor empty sites (29%) were all identified as key benefits of introducing VSaaS and ACaaS, alongside better security (40%) and better functionality (33%). The revelation that such technology is employed by over half of organizations across a wide range of industries is a comforting validation of its benefits, and evidence that hosted physical security is in great demand. 30% of those surveyed indicated that they did not currently use such solutions, but were considering their implementation. Cloud’s resilience and ability to connect the world during the COVID-19 pandemic has clearly proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. VSaaS and ACaaS provide flexibility in a security and business solution that meets the demands of a rapidly evolving industry.
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardized across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organization.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centers (CTCs) helps expand clientele, and the Convergint Development Center (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organizations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options“Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Marriott International Inc. is a hospitality company and the Gaylord Opryland Resort and Convention Center is a Marriott property in the world. Located in Nashville, Tennessee, Gaylord Opryland offers visitors the chance to experience Music City under a single roof. The resort has a hotel with over 3000 suites and rooms and a smaller adjacent hotel with more than 300. Risk assessment Ryman Hospitality, the organization that owns Gaylord Brand Hotels, decided to embark on a risk assessment of their properties in 2017. The third-party assessors discovered that CCTV systems were lacking in all of the hotels, including at the Gaylord Opryland Resort. According to Greg Pezzo, Gaylord Opryland Resort and Attractions’ Safety and Security Director, “The system consisted of old operating systems and cameras that didn’t all work. The security team could not get consistent playback from all of their cameras, and they were not able to store data for more than a few weeks at a time.” As a result of the risk assessment, ownership decided to invest in a complete upgrade of all its hotels and chose the Gaylord Opryland as its test case. Their strategy was to use Opryland as the model and then upgrade their other five Gaylord hotels following its success. Installation of multidirectional cameras Working with integrator Herring Technology, Ryman Hospitality designed a solution that features a new video management system (VMS) from Milestone Systems and 400 state-of-the-art cameras from Hanwha Techwin. The Resort purchased a variety of Hanwha cameras, including 145 XND-6010 full HD cameras with video analytics, 182 Q series indoor and outdoor dome cameras with IR, and more than 20 PNM 7000 and 9000 multi-directional cameras. Deciding where to place their cameras was a relatively simple process. Pezzo explains, “We added cameras where we had high volume, where we had experienced problems in the past, and where we didn’t previously have cameras at all.” They also looked at their own data relating to theft and other incidents to help determine camera location. High-quality imaging camera The surveillance system and the cameras are helping to protect the resort against liability from potential lawsuits According to Pezzo, one of the main functions of their upgraded system is protecting the resort against false claims. He states, “From a claims perspective, this surveillance system and, specifically, these cameras are helping to protect us against liability from potential lawsuits.” He explains, “Our older security camera images are grainy or black and white, which means we could not get the level of detail we needed. But, with Hanwha cameras, we are able to capture high-quality images in real-time that show us, for example, how a guest fell: whether there was an obstruction, water on the floor, an indentation, or whether the guest simply tripped.” The ability to protect the organization against potential lawsuits equates to significant ROI for the Resort. Easy to keep track of movement As a result of the upgrade, security is easily able to track persons of interest clearly as they move throughout the resort. Says Pezzo, “With 3000 rooms and a million square feet of property, the ability to see an individual this clearly as they move through our spaces is incredible. In the past, we would lose people in uncovered sections. They would just disappear. But that doesn’t happen anymore.” For the Gaylord Opryland Resort and Convention Center, the upgrade had an immediate impact. According to Pezzo, “On the first day after installing the new cameras, someone attempted a false claim, but we were easily able to prove that it was not our fault.” For 2021, the Resort plans to invest in more new cameras every few months as the budget becomes available.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that Reiknistofa bankanna (RB), an IT service provider for Icelandic financial institutions, has recently overhauled its security infrastructure with Genetec Security Center. Managing cameras With the help of its system integrator, Hafnes Ehf, Reiknistofa bankanna is now using Genetec to manage its cameras, access control and video analytics, through one unified interface. Reiknistofa bankanna (RB) is a provider of mission-critical IT systems for Icelandic financial institutions, responsible for the country’s central clearance and settlement system, and a number of multi-tenant core banking solutions. Enhanced data and staff security As the backbone of Icelandic Financial Services, Reiknistofa bankanna places a very high importance on security and not only data security, but also to protect employees and visiting clients. While its server rooms and offices are protected via disparate video and access control systems, the technology was old and maintenance was becoming both, a financial and an operational burden. RB operates its solutions, across multiple data centers, in a shared, multi-bank environment. This requires a modern and reliable system that brings video and access control into a single solution, making it easy for operators to understand what is happening, when, where, and what action to take next. Genetec Security Center Genetec Security Center was the optimal choice as it simplified daily security operations As an open unified platform, Genetec Security Center was the optimal choice as it simplified daily security operations, allowed for further integration with other tools, such as RB’s heating and cooling systems, and delivered business-wide value. “From day one, we wanted a unified system which could help our teams understand the situation quickly, alerting them if anything required their attention,” said Geir Saemundsson, Data Center Manager at Reiknistofa bankanna, adding “The Genetec solution does just this and is allowing us to built-in customized alerts so we gain business intelligence, providing us with better ROI.” Improved security management “Physical security teams are demanding simplicity and greater functionality,” said Anthonie van der Ploeg, Director of Sales for Benelux & Nordics at Genetec, Inc., adding “Unification can offer them both by bringing together all security system components seamlessly in a single software platform in a way that can vastly improve security management.” Anthonie van der Ploeg adds, “We are delighted that Iceland’s Reiknistofa bankanna has experienced the deep business insights Genetec Security Center is capable of delivering, and we look forward to supporting them as they evolve and grow their operations.” Deep integration and analytics Geir Saemundsson concludes, “The time savings delivered by Genetec have been immense. It’s been a worthwhile investment, especially as it can evolve with us, and allows us to move at our chosen speed. Considering its ease of use, deep integration and leading analytics, we look forward to continuing the partnership over the coming years.”
March Networks, a global video surveillance and video-based business intelligence solutions provider, is pleased to announce that one of California’s busiest transportation authorities will standardize its entire bus fleet on the company’s RideSafe mobile solution. RideSafe solution The US$ 4 million contract will see more than 400 buses deployed with March Networks’ complete end-to-end RideSafe solution. The contract includes cloud-based monitoring of all of the transportation authority’s mobile cameras and recorders, a services contract providing annual and recurring revenue for March Networks for up to 7 years. RideSafe solution enables transit operators to maintain the highest security for passengers and employees, respond quickly to emergency situations, and resolve liability claims faster with integrated surveillance video and vehicle metadata. It also provides peace of mind with sophisticated monitoring through March Networks’ Insight Monitoring and Resolution Service. Insight Monitoring and Resolution Service With Insight, March Networks’ managed services professionals proactively monitor all video devices and troubleshoot issues remotely, saving customers’ time and money by eliminating unnecessary truck rolls. If a physical update is required, March Networks immediately dispatches a technician to conduct onsite repair services. All activity is logged online, giving customers a complete view of their network via a secure web browser. RideSafe GT Series Hybrid Transit NVRs Fully integrated with Insight is March Networks’ RideSafe GT Series Hybrid Transit NVRs Fully integrated with Insight is March Networks’ RideSafe GT Series Hybrid Transit NVRs (Network Video Recorders), the backbone of the RideSafe solution. The highly reliable, Linux-based recording platforms are purpose-built for transportation environments, with industry-recognized SAE J1455-standards and tamper-proof enclosures that protect against dust and moisture. They allow operators to quickly access live and recorded video and search for incidents based on vehicle information, such as GPS location, when managed by March Networks Command for Transit video management software (VMS). Mobile cameras deployed As true hybrid appliances, the NVRs support a mix of analog and IP cameras, allowing transportation agencies to migrate to IP video cost-effectively and at their own pace. The California transportation authority will also deploy March Networks’ ruggedized mobile cameras, including its new SE2 Fleet Dash Camera and SE2 Fleet Wedge Camera. Both cameras deliver 2MP resolution and feature industry-first LED flicker mitigation technology, which suppresses the strobing in the recorded video caused by LED light sources. Eliminating flicker in surveillance video ensures brake lights and other light sources are not mistaken for flicker and allows for more accurate post-incident investigations. Cloud-based monitoring solution “By offering the most reliable video surveillance technology and secure cloud-based monitoring services, March Networks is meeting the needs of transportation customers and rapidly growing the services side of our business,” said Net Payne, March Networks’ Chief Sales & Marketing Officer. Net Payne adds, “Almost 27 million people rely on this transportation authority’s buses each year. We are proud that our RideSafe solution was chosen to help safeguard this ridership.”
The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential, for both internal and external users. The museums needed a system that will be able to cope easily with changes, site extensions and two-site operation, and a solution that would remove the need to change all cylinders, when an employee loses a key. eCLIQ locking cylinders installed Now, the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders, across the two sites. ASSA ABLOY’s eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights, and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Designed for museum security Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact, and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers, along with their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. eCLIQ locking system Fitting eCLIQ locking system was a simple and wire-free task, and the museum staff, performed the installation themselves. One training session, with the admin software, was sufficient, to put them at ease with their new system. Looking after eCLIQ components is also easy, an integrated lubricant reservoir ensures cylinders, don’t require maintenance for up to 200,000 cycles. AES encryption, rapid processing, and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. Easy and effective access control “I am very happy with the eCLIQ solution,” said M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums, adding “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council, to show the effectiveness and simplicity of the eCLIQ solution.” Guyot adds, “Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
Videosoft's adaptive low bandwidth video streaming technology has been selected and installed on the Mayflower Autonomous Ship (MAS), in order to help relay high-quality footage of the ship’s various missions, back to humans on land. On its maiden voyage this spring, the Mayflower Autonomous Ship will trace the route of the famous 1620 Mayflower ship, sailing from Plymouth, in the United Kingdom to Plymouth, in Massachusetts, USA. Only this time, there will be no human captain or crew on board, as the 15 meters, lightweight, hybrid-electric powered trimaran (multi-hull vessel) crosses the Atlantic Ocean. Real-time feedback and visuals Videosoft’s technology will help capture footage from the Mayflower's six onboard cameras at sea. Using satellite connectivity and compression technologies, footage will be transmitted back to AI developers and research scientists, providing them real-time feedback and visuals, during the mission. It will also be used to provide the media and public with updates about interesting events that occur during the ship’s ocean adventures. “The ability to receive live video feed from the ship using minimal communication bandwidth is a game changer for us,” said Don Scott, the Chief Technology Officer (CTO) of the Mayflower Autonomous Ship for Marine AI. Reliable monitoring of the live situation Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation" Don Scott adds, “Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation and give us confidence in the vehicle’s operation at sea. It has already been an invaluable tool during sea trials and we look forward to having the live feed during the voyage itself.” The international grassroots project is led by marine research organization, ProMare, alongside IBM, which is acting as both lead technology partner and lead scientific partner, with other key design and construction partners, including MSubs, Aluship (Aluship Technology) and Marine AI. AI Captain with computer vision technology With an AI Captain at the helm, MAS is able to operate for long distances and durations at sea collecting critical data about the ocean. Powered by IBM’s computer vision, automation, and machine learning technologies, the AI Captain maintains constant situational awareness and makes decisions about what to do next in line with collision regulations. Small, lightweight edge devices from NVIDIA provide local computer power for operational independence, relying on IBM Cloud connectivity when available. Cutting-edge video streaming solution Videosoft was selected for its cutting-edge video streaming solution and its ability to reliably stream video from onboard cameras and computer vision systems, which scan the horizon for hazards, as the Mayflower Autonomous Ship sails. Videosoft's software runs on IBM's platform, which skippers the vessel and is linked via satellite. Videosoft's Chief Executive Officer (CEO), Stewart McCone said, “This project is designed to transform humanity’s relationship with the ocean. To say we're totally thrilled to be involved in the Mayflower Autonomous Ship project would be an understatement.” Stewart McCone adds, “By working alongside innovative and specialist companies, who are experts in their field and have an intimate knowledge of what they are doing, Videosoft is enabling the ambitions of this multi-million-pound project. Streaming live video from ocean-going vessels is not straightforward and you really need to know what you're doing to pull it off successfully.” Intelligent transmission protocol An intelligent transmission protocol is required to maintain connectivity" He further stated, “An intelligent transmission protocol is required to maintain connectivity. In addition to switching between satellite and cellular networks, variable signal strength, the topography of network masts, atmospheric conditions, satellite capabilities, speed, and variables all impact the available bandwidth.” Stewart McCone said, “Videosoft, which has developed software specifically for the satellite and cellular industry, to negate the typical issues that arise when using such networks, has made it possible to have eyes on the ocean 24/7. The unique protocols that the Videosoft team has built into our software mean that any video delay from the Mayflower will be dramatically reduced, with any streamed video automatically adapting to the amount of available bandwidth, while retaining good quality.” Real-time situational awareness Stewart continues, “Even in our knowledge-rich industry, not many people realize that this can be done, but it can and is relatively simple to put in place, thanks to our easy-to-use software platform. As with CCTV, IoT and surveillance applications, Videosoft's ability to provide reliable video streams creates a real-time situational awareness that is critical to the operational success of projects, such as the Mayflower Autonomous Ship.” He further adds, “The Videosoft vision has always been to get involved in pioneering projects, such as the Mayflower and serves to underpin Videosoft's mission statement of deploying technology to solve real-world problems at the highest global level, using video and remote services, to make the world be a better, safer place. We're showing that this specialist tech does exist and that we can enable all Internet of Things (IoT) applications for the common good. If that interests you, come and talk to us.”
82% of schools and colleges in both the US and Northern Europe see a potential role for CCTV/video monitoring systems in supporting a safe return to face-to-face teaching in school buildings and across further education college campuses, following the pandemic. Many schools and colleges have already adapted their video monitoring systems. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 12 months. Video monitoring systems The AVA Security Education Sector Security Survey provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 12 months. Safe-specific video analytics Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the next year. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels in retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 12 months. Contactless access control The education sector is a deployer of facial recognition analytics in existing cameras Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 12 months. However, the education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22 percent of schools and colleges have deployed facial recognition to date, although this is set to more than double as 29% over the next 12 months. Reduced VMS costs The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely in 2021. Cybersecurity has become a key IT priority As IT, Operations, and Security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few weeks, the University of Hertfordshire experienced a major cyberattack which led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely’ that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. Smarter, easier to use video systems There was some disquiet about the quality of existing video systems’ core capabilities, the Ava Security research found. For example, 29% thought it was a ‘High Priority’ to improve the speed of finding and retrieving video evidence after a security or safety incident. A further 40% saw it as ‘Somewhat a Priority’ to improve the systems’ retrieval capabilities to find ‘required footage of incidents easier and quicker. It currently takes too long.’ Further, 22% saw the need for ‘better integration between video monitoring camera systems and other security-related systems, such as access control or alarm systems’ as a ‘High Priority’, while over half (57%) saw wider security systems integration as ‘Somewhat a Priority’ now. Nearly two-thirds (66%) of video monitoring system decision-makers in the education sector were keen to make their video monitoring systems ‘more intelligent, using video analytics to support better post-event decision-making’ – placing this improvement as either a ‘High Priority’ or ‘Somewhat a Priority’. Cloud on the horizon 73% of the education sector is experiencing accelerated cloud migration Others were more focused on Cloud Migration of more IT Systems. Over half (51%) confirmed that their cloud migration plans had been accelerated in 2020/21 and a further 32% confirmed that a new budget had already been allocated for moving more services into the cloud in the financial year 2020/21. That means that altogether (net) 73% of the education sector is experiencing accelerated cloud migration. Linked to this, the same study uncovered that 58% found ‘adoption of Video Surveillance as a Service (VSaaS) i.e., moving their video monitoring system into the cloud’, as a ‘net priority’ for improving and optimizing their video monitoring systems looking forward. VSaaS selection criteria For the 82% of all education respondents actively considering VSaaS options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS right now, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people’. Third-party cameras While 24% of education sector decision-makers considering VSaaS, said it was critical that the provider was not headquartered in mainland China. A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment.' A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Latest analytic capabilities An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and color searching’. Balance of power The Ava study also explored whether the events of the last year had prompted changes in terms of who looks after the management of video monitoring systems. There was some evidence in the education sector that as CCTV has increasingly been migrated onto the network, IT departmental control is increasing. According to the study, nearly a third (31%) of schools and colleges’ video systems passed more control of their video monitoring systems to their IT department – taking the total percentage of video systems run by IT in the education sector to 39%. However, security and/or facilities management still holds the balance of power in the running of these systems with 50%, with 24% gaining responsibility for video monitoring during the pandemic. Only 4% of systems confirmed they had fully outsourced video system management and 7% confirmed that more of the management, upgrading, and running of their systems had been outsourced over the last year. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimizing the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection There is a strong determination to adapt existing school surveillance systems to new COVID-safe requirements" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Cloud Connector Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
Round table discussion
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
When the United Kingdom voted to leave the European Union, a world of uncertainty unfolded for those doing business in the UK and the EU. The referendum was passed in July 2016. Including subsequent delays, the separation was completed after four years in January 2020, with a transition period ending December 2020. Even with the deadlines past, there are still pockets of uncertainty stemming from the separation. We asked this week’s Expert Panel Roundtable: How has Brexit affected the security industry?
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?
Security software: Manufacturers & Suppliers
- ACT Security software
- Milestone Security software
- Vicon Security software
- DSX Security software
- Hanwha Techwin Security software
- Gallagher Security software
- HID Security software
- TDSi Security software
- Bosch Security software
- Nedap AEOS Security software
- CEM Security software
- CCTV Software Security software
- Software House Security software
- PAC Security software
- Honeywell Security Security software
- FLIR Systems Security software
- Panasonic Security software
- Dallmeier Security software
- IDTECK Security software
- Geutebruck Security software
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Six Things To Look For When Adding AI Cameras To Your OperationDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload