HID Global, a front-runner in trusted identity solutions, announced it has been recognized as the overall top challenger and included in the market leadership category in the KuppingerCole’s Leadership Compass for Enterprise Authentication Solutions report. The analyst firm’s new report examines the product/service functionality and relative market share of 18 companies in this space as well as their innovative approaches to providing modern solutions. Serving consumers and enterpr...
The Genetec Channel Partner program has partnered with Credly to award verified digital badges to European channel partners who complete Genetec certification courses. Badges provide an easy way to share and validate the skills, experience, and technical knowledge. Digital badges are the best tool to highlight Genetec certifications and achievements on the website, social media, profiles, and more. Think of the badges as a bonus for the hard work—there's no extra cost involved. What is a...
Genetec Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it is broadening its portfolio of FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis™ access control system with the support of Veridt Stealth access control readers. Traditionally, the options for Federal Government organizations to replace a non-FICAM compliant system or to secure a ne...
Tyco, the security products brand of Johnson Controls, the globally renowned company for smart and sustainable building solutions, has announced its secondary sponsorship of the SYNETIQ BMW Motorrad team for the 2021 British Superbikes season. Support for TAS Racing “We are delighted to have the opportunity to renew our support for TAS Racing who run the SYNETIQ BMW Motorrad team,” said Gordon Morrison, GB Sales Director for the Johnson Controls’ Tyco access control and video...
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more power...
Exabeam, the security analytics and automation company, announces the appointment of technology industry veteran and former Splunk marketing leader Sherry Lowe to chief marketing officer (CMO). Lowe will be responsible for leading the global marketing strategy and will report directly to Ralph Pisani, president, Exabeam. Throughout Lowe’s 20-year career in the technology industry, she has built strategic marketing programs for rapidly growing tech companies such as Expanse, Druva and Splu...
W Series, the international single-seater motor racing series for female drivers only, is delighted to announce a new cyber protection and security partnership with Acronis, a globally renowned provider of cyber protection solutions. Global Cyber Security Partner The multi-year agreement sees Acronis become W Series’ new Global Cyber Protection and Security Partner, providing bespoke technology solutions for W Series’ on-track racing program, which will resume in 2021 and the W Series Esports League which launched in June 2020. Plans are already in place for a bigger and better on-track W Series season in 2021, including at least two races on the Formula 1 calendar, in Austin, Texas, USA, and in Mexico City, Mexico. Acronis will implement video and brand analytics of W Series’ on-track and virtual races Acronis will develop and maintain a secure data management system, improving W Series’ ability to store, analyze and share content with partners. Enhanced by their award-winning artificial intelligence technology, Acronis will implement video and brand analytics of W Series’ on-track and virtual races, thereby accelerating the generation of content through predefined access and filters. Cyber protection solutions Acronis’ range of cyber protection solutions are developed upon a five-pronged principle that aims to deliver Safety, Accessibility, Privacy, Authenticity, and Security (SAPAS) to organizations and users. This design methodology ensures that Acronis solutions deliver not only the highest caliber of safety and security to data, applications, and systems, but also a guarantee that data is tamper-free and easily accessible for smooth day-to-day operations. Acronis Cyber Protect One of Acronis’ top products that W Series will be using is the Acronis Cyber Protect, which provides fast and reliable backup, AI-powered anti-malware and anti-virus, and comprehensive endpoint management in a single solution. This integrated approach to cyber protection eliminates complexity and makes it simple for users to manage and monitor data across an entire network. Some of this technology will be delivered by Teknov8, a global provider of cyber security solutions that will support Acronis’ partnership with W Series as the Official #CyberFit Delivery Partner. Catherine Bond Muir (Chief Executive Officer, W Series) said, “Acronis’ innovative and award-winning cyber protection solutions are used by many of the major automotive companies and sporting organizations around the world." Acronis – W Series multi-year partnership She said, “Therefore, today’s announcement of a multi-year partnership against the backdrop of the ongoing global health crisis and the devastating economic impact that it has had, is a significant endorsement of W Series and our mission.” Acronis’ support will be vital as we prepare to resume our on-track racing program in 2021" Catherine adds, “It has become clear in our discussions with Acronis that they are as committed to improving equality and diversity in motorsport as we are, and their bespoke data management system will improve the speed and accuracy with which we can share our content, thereby helping to spread our message further and faster.” She further stated, “Acronis’ support will be vital as we prepare to resume our on-track racing program in 2021 with a schedule which is bigger and better than ever before. The W Series Esports League has also kept our drivers sharp and our fans entertained, and Acronis’ commitment to that brand-new platform reflects our own.” Enhancing cyber security in work from home environment Serguei Beloussov (Founder and Executive Officer, Acronis) said, “Ever since the COVID-19 pandemic hit, cyber-attacks have increased five-fold. Cybercriminals are ruthlessly targeting a workforce that has largely migrated to working from home on less secure networks.” Seguei adds, “Acronis Cyber Protect is perfectly designed to combat this threat, as it allows for system administrators to remotely manage and protect even devices that are not on the same network, so home users can keep both their professional and personal data safe and secure.” He further stated, “We are honored to have been chosen to help the W Series team get #CyberFit, and we look forward to a long and fruitful partnership with the team.”
Herta, the Barcelona-based facial recognition company, has recently launched a new range of solutions to help businesses and industries adapt to the new normality. Awarded with the COVID-19 Response Seal of Excellence by the European Commission, Herta’s new applications allow the monitoring of social distancing, occupancy control, mask detection, and facial recognition even when people wear masks. Herta's technology is characterized by having a known reputation, with real and large-scale security projects worldwide. By expanding its product range, the company aims to reinforce its mission: increase the world’s safety by building user-friendly computer vision solutions. With these new applications, Herta will help organizations comply with the new COVID-19 safety regulations as well as cover the needs that arise in this new normality.
HID Global, a front-runner in trusted identity solutions, announced the launch of HID® Signo, its signature line of readers that creates a new industry benchmark for the most adaptable, interoperable, and secure approach to access control. The new readers dramatically simplify system deployment and management, meet the advanced security requirements of today’s dynamic environments, and set organizations up for smarter, more connected access control. Demand for versatile solutions “With the industry now seeking to use access control systems as a backbone for creating intelligent environments, consultants, integrators and end-users are increasingly demanding more versatile, high-performance solutions,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control Solutions, HID Global. “HID Signo is built on an open platform and delivers on our commitment to innovation with its unprecedented flexibility and robust set of forward-looking features that optimize workplace experiences.” “Our goal is to put more choices in the hands of our customers and give them peace of mind in knowing they can continually adapt their systems as requirements change.” Mobile access For ultimate versatility, the readers are interoperable with over a dozen physical and mobile credential technologies so organizations can use their technology of choice and easily migrate to the latest solutions at their own pace. Additionally, with support for Apple's Enhanced Contactless Polling (ECP) to enable Student IDs in Apple Wallet, HID Signo is driving the next wave of flexibility and convenience with mobile access. Smart features Readers are IP65 rated and feature a capacitive touch keypad resistant to harsh weather conditions HID’s new readers are packed with smart features, such as automatic surface detection that recalibrates and optimizes read performance based on the mounting location. For rugged, outdoor performance, the readers are also IP65 rated with no additional gasket needed and feature a capacitive touch keypad resistant to harsh weather conditions. Transcending traditional access control HID Signo’s connectivity-by-design model empowers administrators to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. Additionally, the configuration can be further streamlined through the controller via the Open Supervised Device Protocol (OSDP). “HID’s novel approach to access control also lays the foundation for a future of cloud-connected systems that will enable new applications and innovative capabilities, such as the ability to proactively anticipate and address system issues before they occur,” Radstaak added. Multi-layered security Delivering multi-layered security with built-in support for OSDP Secure Channel and HID’s proven Security Identity Object technology, the readers store cryptographic keys on certified EAL5+ secure element hardware and custom authentication keys can be used to further enhance security. HID’s patented velocity-checking feature also protects against brute force rapid electronic attacks. Availability The new line of HID Signo Readers is available through Advantage Partners in major markets worldwide, with a phased roll out in select regions.
HID Global, a front-runner in trusted identity solutions, announced it will support the industry’s passwordless authentication initiative at RSA 2020 by demonstrating converged access solutions that extend zero trust security and FIDO2 authentication across the workplace in the physical and digital worlds. The company’s solutions, including smart cards, an expanded USB key family, and an updated cloud-based credential management service, are among the first to help realize the industry’s vision for a passwordless future at the door and in hybrid IT environments spanning on-premise and cloud applications. FIDO2 authentication solution Extending benefits of FIDO2-based passwordless authentication throughout the workplace “HID Global provides the industry’s only complete FIDO2 authentication solution for the workplace that provides a converged access experience from the door to on-premise IT systems and cloud resources,” said Brad Jarvis, Vice President & Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. “Besides making it easier and more cost-effective to deploy FIDO2 on employees’ corporate ID badges and other form factors, we increase value with HID IdenTrust digital certificates that give authenticators signing and encryption capabilities for email and documents.” “Our goal is to help drive the adoption of FIDO2-based passwordless authentication by extending its benefits throughout the workplace.” USB-C option HID Global is announcing the general availability of a USB-C option in its HID Crescendo© Key Series family at the conference. The Crescendo family supports passwordless authentication with an end-to-end approach to an organization’s workplace security. Key elements include Access Convergence that Bridges the Physical and Digital Worlds: HID Crescendo 2300 Series converged smart cards and HID Crescendo Key Series authenticators streamline and increase security, accelerate return on FIDO2 deployment investments, and plug vulnerability gaps in physical access systems and cyberspace. Growing Family of Authenticator Options: The Crescendo Key USB-C authenticator joins HID’s Crescendo Key USB-A device to provide an option for logical access option that also accepts a publicly trusted digital certificate. Users can digitally sign and encrypt emails, PDF documents, and files without the need for complex public key infrastructure (PKI) solutions. Centrally Managed FIDO: HID Crescendo Series cards and keys are among the first supported by enterprise-class credential management, which simplifies tasks like resetting PINs without needing user service re-enrollment. The updated HID Credential Management Service now also issues and manages HID IdenTrust certificates on Crescendo Key USB-C devices.
FLIR Systems, Inc. announced three dome-shaped, Pan-Tilt-Zoom (PTZ) security cameras, including two dual-sensor camera series for critical infrastructure locations, the FLIR Elara™ DX-Series, and the FLIR Saros™ DM-Series, and a high-resolution visible camera for safe city deployments, the FLIR Quasar™ 4K IR PTZ. The latest FLIR security products offer multiple lens options for long- and short-range needs to enable accurate perimeter protection of critical infrastructure, remote facilities, and in urban city environments, day or night. Perimeter security protection Critical infrastructure sites, such as utility substations and transportation centers, have significant and often increased security requirements. The latest FLIR Systems cameras featuring thermal imaging and 4K high-resolution sensors, the Elara DX-Series and Saros DM-Series, help deliver superior perimeter security protection where it matters most. With the ability to see through fog, rain, sun glare, and snow, both series provide the ability to spot heat signatures at all hours. Elara DX-Series & Saros DM-Series Elara DX-Series features a longer viewing range & Saros DM-Series provides a shorter viewing range The FLIR Elara DX-Series features longer viewing range capabilities, infrared illumination, and a wiper blade that can be remotely operated for use in harsh conditions to ensure a clear view. The more compact Saros DM-Series provides shorter viewing range capabilities in a weatherized housing. Both series offer eight lens options, enabling customers to choose the most appropriate lens for their application. Quasar 4K IR PTZ For the growing metropolitan city safety and security market, the Quasar 4K IR PTZ delivers high-resolution visible video quality with the best-in-class low light capabilities to give operators superior monitoring in large coverage areas. Seamless integration Providing VMS integration with FLIR United VMS and all major platforms, these latest FLIR security cameras can provide a comprehensive end-to-end experience with seamless integration to the FLIR United VMS platform or a complementary solution with integration available to all major platforms. Security and safety “With our latest products, FLIR is delivering advanced cameras purpose-built for perimeter protection and the evolving security needs of critical infrastructure sites and cities,” said Travis Merrill, President of the Commercial Business Unit at FLIR. “For surveillance in critical environments, including utility substations, airports, train stations, or stadiums, these perimeter protection cameras are designed to withstand harsh environments to help keep sites secure and people safe.”
Echodyne, globally renowned manufacturer of innovative, high-performance radars for government and commercial markets, has announced that it will be co-exhibiting with Security Radar Integrators (SRI) at the 19th annual American Association of Airport Executives (AAAE) Aviation Security Summit, taking place in Arlington, VA from December 4-5, 2019. Aviation security With ever-increasing drones in the airspace, protecting aircraft and airports from drones has become a major focus for regulators The event brings together senior leadership from the nation’s airports with officials from DHS, TSA, CBP and other key players in security policy to discuss the complex issues surrounding aviation security and to look ahead to challenges on the horizon, including the growing threat from drones. The drone disruption at Gatwick Airport in December 2018 grounded nearly 140,000 passengers and cost airlines more than £50 million. In the second quarter of 2019, the FAA collected reports of 714 sightings of unauthorized drones near airplanes and around airports in the U.S. With the growing number of drones in the airspace, protecting aircraft and airports from drones has become a major focus for regulators and law enforcement around the globe. Ground-based perimeter intrusion detection system Security Radar Integrators (SRI), globally renowned perimeter protection solutions for airports provider, announced the selection of Echodyne radars as the drone detection sensor for its existing ground-based perimeter intrusion detection system (PIDS) in October. The companies are collaborating on security system design and deployment, with SRI announcing its new white paper on comprehensive airport surveillance, ‘Full Coverage: Combining PIDS and UAS Detection for Critical Infrastructure’. The paper highlights Echodyne’s EchoGuard 3D radar and the role that high-performance radar plays in SRI’s Airfield Radar System (ARS). Leaders from both companies will be on hand at the Security Summit to discuss drone security for airports. 3D security solution “SRI has best-in-class technology and tremendous experience in designing and deploying airport perimeter security solutions,” said Dan Flynn, President of SRI. “We are excited to discuss our market-leading 3D security solution with airport executives and security leaders at the AAAE Aviation Security Summit.”
The role of physical security has expanded and grown rapidly over recent years. Below are some of our observations, particularly throughout the pandemic, and a look towards the changing times ahead. The new era of physical security The role of private security has shifted dramatically over the last decade and beyond. Historically, the focus was on protecting assets such as property and goods, but more frequently now the sector is being asked to play an even bigger role in protecting the public from physical danger. During the current coronavirus pandemic this has increased to high profile marshalling in city centers and public areas to ensure social distancing is in place, as well as managing people and traffic through COVID-19 Testing Sites. The role of private security has shifted dramatically over the last decade and beyond As these responsibilities have changed so to have the expectations on the industry, which are now wide ranging. However, this is not a new phenomenon, as we have seen how this has specifically impacted on the role of door supervisors in recent years. Whereas this primarily used to be focused on protecting the venues themselves, this role has now expanded with the same door supervisors finding themselves responsible for areas beyond merely the front entrance. Not only are they fulfilling the traditional role, but they are increasingly relied upon to provide welfare and support far beyond the traditional remit. Credit needs to be given to the industry and those within it who have driven these changes, particularly with regards to what can be termed ‘safeguarding’. Whilst mandatory SIA license training includes specific guidance and instruction for 'safeguarding', or how to help vulnerable people, it was instigated by the industry itself. As a result, now the person being refused entry to a venue due (for whatever the reason), now finds themselves often being helped by the door supervisor, for example, by arranging a taxi for them, rather than allowing a young and/or vulnerable person - perhaps separated from their friends, to wander off alone into the night. Pandemic constraints Throughout the pandemic, security operatives are being deployed to provide a positive physical presence to support and instill the importance of social distancing, mask wearing and to ensure the safety of the public. Who would have thought that in 2020 it would be commonplace to see the vast majority of supermarkets, large and small, with an obvious security presence! Filling a void (changing responsibilities) Alongside this, and for some time increasingly private security has been asked to fill a vacuum created by greater demands on policing and consequently they have naturally moved towards contributing to what can be termed 'place management'. The latter was a concept that primarily came about as efforts increased to 'revive' towns and city centers where a safe, welcoming, inclusionary environment was seen as critical to attracting a wider demographic, rather than the dominant economy being centred around night-life, which was seen as the domain of the 'young'. You may have read about efforts to diminish the distinction between the day, evening and night-time economies and replicate what was happening in the large out of town ‘retail’ centers e.g. the Trafford Centre in Manchester. There you can shop, eat, drink, watch a film, bowl almost at any time in the day. Towns and cities have increasingly tried to replicate this, for example asking other venues, such as museums to stay open longer. Responsibilities have also shifted towards enforcing legislation when appropriate, particularly at a local level Consequently, with greater expectations placed on private security operatives today, as well as their traditional role of protecting property and people, their skill set is extending to include a greater emphasis on customer service and being well voiced in welfare issues. Also, responsibilities have also shifted towards enforcing legislation when appropriate, particularly at a local level, which is further evidence of security operatives increasingly taking on duties and responsibilities which have previously always been in the remit of the police or other enforcement personnel. Framework schemes to facilitate this have transited online, and been under public scrutiny, most notably the Community Safety Accreditation Scheme (CSAS). CSAS allows Police Chief Constables to 'allocate' powers to accredited security providers operating in their geographical regions, which whilst it has been in existence for many years isn’t probably widely known about beyond the industry itself. Training must meet the need This leads to the question of training: we need to talk about training and what’s necessary in this new era of security, in line with the increased expectations and responsibilities of the security operative. Where does the role of private security start and stop? All regulated security operatives have been given specific training to gain their SIA license, and many companies operating in the field of large-scale crowd management offer their own bespoke learning and development. Such training can include: Stages and pits (area found in front of the stage) Externals (often outside the footprint of the licensed venues) Directional stewards Roaming response operatives With such courses being optional and unregulated, how do we create an adequate baseline skills base? Whilst some of this training can be accredited and/or included in recognized qualifications it can be the case that security providers have developed their own ‘guidance’, which for some companies is used to respond to emerging risks. The industry being asked to be integral to the pandemic response is an example of where companies are putting together guidance, which may be based on emerging central Government thinking. The science of large-scale events Over the years we have seen a real boom in events. Specifically, large scale (50,000+) music events are no longer restricted to festivals and have been seen as a lucrative source of income, for example, the use of soccer stadia in the closed season, to maximize year round usage. For example, a number of years ago Manchester City Football Club staged the return of Take That resulting in a wider demographic attending events, from your older fan, probably with children the same age as they were when they last saw them live, to young children attending their first live music event and everybody in between. Safely managing these types of 'diverse' event and crowd management has become a science in its own right with many considerations including crowd dynamics, crowd behavior, ingress and egress planning, transport plans and of course, contingency planning for the unexpected. Maintaining public safety – applying the science Consequently, if the overarching aim for any pandemic response is public safety, then the objective for the security industry should mirror this, aiming to maintain complete safety for the public. If the overarching aim for any pandemic response is public safety, then the objective for the security industry should mirror this This should always include managing the flow of people in highly charged environments, now with the added consideration of social distancing in what are worrying times for the average person on the street. Private security has a pivotal role to play as social conventions are rebuilt and the world grasps its new normal. Where you want to gain compliance by cooperation then it needs to be certain that the security operatives are: "the right people, in the right place, at the right time, doing the right things and working alongside the right partners". We believe that this can only be achieved by applying science to these situations, a skill that that is second nature to those who routinely deliver effective security. We need to clarify the role of manned security providers covering the limitations and extent of their responsibilities. This needs to be unanimous across the licensing bodies, employers and public in order for operatives to fulfill the role and an industry benchmark set. Security firms are not the police, BUT it is important to note that their role is integral to keeping people safe.
You are not alone: operators everywhere are asking themselves what are they going to do? How are they going to get back to business, and fast? How are they going to cost-effectively operate with all the new safety requirements that have arisen as a result of COVID? How are they going to ensure it all gets done for the safety of customers and staff? How are they going to protect their brand from the negative exposure of being identified as a property with a reputation for COVID? The economic impact of COVID is expected to hit brick and mortar businesses the worst, as their businesses are dependent on people being physically present. According to a recent report by RBC, it is estimated that 70% of Americans expect to avoid public spaces, 57% of Canadians will be unwilling to attend conferences without a vaccine and 63% of people will prefer to drive vs fly. This means, that for those of you in the business of travel, conferences, co-working spaces, retail stores, museums, art galleries, restaurants, sports arenas, hotels, cruises, airlines, resorts, theme parks, long-term care, education, etc. in the blink of an eye your approach to on-site safety just changed. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitisation To get back to business and operating at full capacity after COVID, operations must find a way to eliminate the fear, uncertainty and doubt in the minds of their customers and employees. The affect of COVID-19 on safety and security To safely get back to business, the Centers of Disease Control and Prevention (CDC) emphasis that all operations need a pandemic response planJust like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budget. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitization, the lines between the security and maintenance just blurred. From customers, to employees, to government regulators, to management, the focus is now on operations and the sanitization policies, procedures and actions of the team. To put this change of priority into perspective, six months ago, sanitisation was not top of mind for people. Why, because it was not a life or death issue, we had other first world problems to garner our attention. From an operations perspective if we enabled a sanitization issue to become significant enough to impact the safety of customers and staff and therefore the brand, then that was an operational choice versus a mistake. Standards for sanitisation Just like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budgetThe issue is, today while the operating priority of sanitization has significantly increased, it is not measured and managed to the same standard as the other safety and security concerns across a business. Also, important to consider, while people may not hold an operation liable during this first wave, we can guarantee they are not going to be as understanding during the second wave or a future pandemic. To safely get back to business, the Centers of Disease Control and Prevention (CDC) and the Occupational Health and Safety regulators emphasis that all operations need a pandemic response plan and should follow these simple guidelines: Develop your plan Implement your plan Maintain and revise your plan While this sounds simple enough, keep in mind that requirements are constantly evolving and will continue to do so for the foreseeable future, or at least until all the research is in. To create an emergency response plan for a pandemic, properties must first determine what needs to be sanitized. The current requirements dictate that most surfaces and objects will just need a normal routine cleaning, it is only the frequently touched surfaces and objects like light switches and COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-havedoorknobs that will need to be cleaned and then disinfected to further reduce the risk of germs on surfaces and objects. The challenge is when you step back and consider what people touch in a day; the list quickly grows. After only 30 minutes, I easily came up with a list of over 60 items that one could call ‘high touch’! If you think about it, the list is extensive; telephones, doorknobs, drawer handles, counters, pens, keypads, computers, etc. and the list is only going to get longer as the research comes in. The challenge is when you step back and consider what people touch in a day; the list quickly grows Operating efficiency If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper and filing cabinetsTo scope the impact on operations as part of the plan, we must then find and identify all of those high touch things across the property. If we then combine that with the fact that CDC requires that all high touch locations must not only be cleaned more often, but that they also require that each location is first cleaned with soap and water, and then disinfected for one minute before finally being wiped down. This means a one-minute task just turned into a 4-minute task, that must now be completed multiple times a day. From a resourcing perspective this adds up quickly, and operating efficiency must be a priority. Not to mention it is going to get very complicated to measure and manage especially. Post COVID rules Getting back to business is going to be complicated; lots to do, lots of moving parts and no technology to help. The fundamental challenge to keep in mind is not that the sanitization requirements have evolved, the real issue is that for most businesses this area has been left unchanged for generations. Still today most rely on checklists, logbooks and inspections to manage the responsibilities of our front-line workers, which might have been fine before COVID. Post-COVID the rules have changed and so should the approach to managing physical operating compliance on the front lines. COVID like most physical operating requirements is tactical, detailed and specific; broad strokes, the honor system and inspections are not going to cut it. The digital transformation COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-have. If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper, filing cabinets filled with checklists, never to be seen again. Only with the right data can we significantly improve the operational decisions necessary to accelerate our return to full operating capacity. At the end of the day, to fully recover, operations must eliminate the fear, uncertainty and doubt in the minds of customers and employees, only then can we really get back to business.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
A high majority of Americans (83%) are concerned about a criminal attack causing physical harm at large-scale events such as sporting events or concert festivals. More than one in five (22% of) Americans say they have canceled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks and the safety of their data. Across the pond, three in 10 Britons think twice about attending large-scale events due to data or physical security issues. Although less than half of U.K. survey respondents have changed their plans to attend large events, some 45% are taking extra security precautions. Brits are as afraid of using public Wi-Fi at an event as of a physical criminal attack. These are some of the insights from the 2019 Unisys Security Index survey of more than 13,000 consumers in 13 countries, including 1,000 in the U.S. and another 1,000 in the United Kingdom. Currently, the U.K. index is at 147 (down from 149 in 2018), which is one of the lowest of the countries surveyed Security index scores of countries Unisys gauged attitudes on a range of security-related issues and created an index based on survey results. The index is a calculated score from zero to 300 based on concern about eight specific issues within the categories of national, financial, Internet and personal security. Currently, the U.K. index is at 147 (down from 149 in 2018), which is one of the lowest of the countries surveyed. In contrast, the U.S. index is now at 165, considered a serious level of concern and the highest among developed countries surveyed. Globally, the index average stands at 175, with the Philippines scoring highest with an index score of 234 and the Netherlands registering the lowest concern ratings with a score of 115. Concerns about misuse of information Privacy is an area where concern is growing. “This year more than half of U.K. citizens expressed concerns about the misuse of their personal information,” says Unisys’ Global Chief Security Architect, Salvatore Sinno. Another 49% expressed serious concerns that intelligence services listen in on them through electronic devices such as mobile phones or smart speakers. The summer calendar of major sporting events, concerts and festivals raises the levels of security concern The summer calendar of major sporting events, concerts and festivals raises the levels of security concern. Nick Aldworth, former National Counter Terrorism Co-Ordinator, tells the BBC that the government is not doing enough to ensure venues are secure. He supports a campaign for more rigorous checks at venues in the U.K., named Martyn’s Law, after Martyn Hett, a victim of the Manchester Arena attack in 2017. safety Pointers while attending event Salvatore Sinno of Unisys provides the following pointers on keeping safe this summer: If planning to attend a crowded event alone, let someone know. Make sure friends or family know where you are going, when you plan to arrive and when you are expected to return. Plan ahead and check local authorities’ alerts; sign up for any travel or news alerts to receive updates on traffic or news of any disturbances. As soon as you get to an event, survey your surroundings. Make sure you know where the exits are and agree on a meeting place with friends in case you should get separated from the group. Know where stewards and information points are so you can speak to someone if you need to. Be vigilant for suspicious activity at an event. Don’t be afraid to report something you think is unusual, such as unattended baggage or people behaving in a suspicious or threatening way. In an emergency, stay calm and move to the edges of crowds. Try to leave the area quickly and calmly. If you need to, follow the standard police advice of ‘Run, Hide and Tell’. Only buy event tickets from official channels or trusted websites. Update your mobile device with the latest, most secure software and avoid unsecured Wi-Fi networks; keep your phone charged and take along a battery charger pack. Don’t make electronic transactions at unofficial event vendors; be careful with contactless cards or making mobile transactions. “Whether it’s your physical security or the security of your data, you can take precautions around major events so you do not make it easy for criminals to take advantage,” says Sinno.
Coming off a successful ISC West show, Honeywell is sharply focused on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine Learning-Based Analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralize decision making, and allow customers to manage it all from anywhere. Solutions For Vertical Markets Honeywell Commercial Security is focused on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalized systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behavior as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing Technology For Sports Security The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices. Hypervisor software separates a computer's operating system and applications from the underlying physical hardware. The elements continue to function as before, and software keeps them separated virtually, while also enabling the system to run more economically on less hardware. Virtualization Within Hyperconverged Systems Hypervisor software separates a computer's operating system and applications from the underlying physical hardware Software companies such as VMWare, Microsoft Hyper-V and Nutanix provide virtualization software that enables hyperconverged systems in the IT world. However, bringing hyperconverged systems to the world of video surveillance requires special handling, and security integrators may not be aware that hyperconverged software from the IT market does not work seamlessly with video data. Specifically, these hypervisor software systems have latency problems that are not compatible with video. Therefore, hyperconverged software systems must be adapted to meet video’s needs. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations of security integrators and end users while also providing economic and operational advantages of hyperconverged systems. Why A Virtual Machine Can Aid Your Server Solution A hyperconverged system can transition a stack of 10 or more application servers down to three servers, with all the applications still virtually separated on fewer machines. Each server is used to 100 percent of its capacity, which is more efficient. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations Both operating and maintenance expenses are lower, and if more computing resources are needed for a virtual machine, the software interface enables an end user to allow more processing power, RAM or disk space to that application. Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses. When a video system is working on a hyperconverged cluster, what happens if there is a hardware failure? The virtual system gets moved to a cluster that is working, but there might be a 30-second gap in video, which would not be acceptable for a critical application. All video must therefore be saved in two places. Virtualized Server Stacks From BCDVideo BCDVideo has entered into an engineering partnership with Scale Computing to develop an optimized hypervisor based on Scale Computing’s HC3 software that is also efficient for writing video.Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses Virtualization in the physical security market can create traffic patterns that are unlike traditional IT, and changes need to be implemented to accommodate for that. To avoid a “bottleneck” that can occur during the virtualization process, the virtual machine and the underlying physical hardware must be optimized to account for the virtualization process. “Performance and high-availability are critical in the video surveillance market and not all HCI solutions will adapt to video data,” said Dan Pierce, VP of Strategic Sales at Scale Computing. “With Scale Computing’s HC3 platform and BCDVideo’s ‘purpose built’ approach, customers will benefit from a solution that’s adapted to meet industry wide requirements while simplifying the management and maintenance of their infrastructure.” Hyperconverged infrastructure will become more and more prevalent in the video market, especially for large systems that have high camera counts and longer video retention times. Hyperconverged systems offer a more efficient use of resources and save costs because hardware is more fully utilised. Previous problems of using hyperconverged systems for video have been solved, which paves the way for much more widespread deployment. Over time, we should expect hyperconverged system to become more common for larger video installations, such as gaming, sports arenas, large cities, universities, corporate campuses and airports. The key to success is applying knowledge both of the needs of video systems and of how hyperconverged systems can be adapted to meet those needs.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Center, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights Security Center is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
FLIR Systems, Inc. announced it has installed its EST screening system at the Pentagon Visitor Center in Washington, D.C. The company’s integrated EST screening solution, the A700 EST-IS, features the FLIR A700 thermal imaging camera. The system is being used to screen visitors for elevated or higher than expected skin temperatures, which can help guard against the spread of COVID-19. The installation of its EST system at the Pentagon is one of many efforts FLIR is currently discussing with United States Department of Defense officials for applications across the armed services. The news follows statements made by FLIR President and CEO Jim Cannon on a recent earnings call that the company booked roughly $100 million in new EST business in the first quarter of 2020. Skin temperature screening For more than 40 years, FLIR has provided advanced thermal imaging technology to America’s military" More recently, General Motors announced it will use FLIR cameras at many of its sites to screen workers in an effort to help prevent the spread of the novel coronavirus. “For more than 40 years, FLIR has provided advanced thermal imaging technology to America’s military - on its aircraft, helicopters, ships at sea, and to forces on land,” said Cannon. “We’re honored to again serve the U.S. defense community in this effort to better protect visitors to the Pentagon and support elevated skin temperature screening.” Thermal imaging cameras For applications in public buildings, hospitals, airports, schools, sports venues, or manufacturing, FLIR Systems’ EST cameras can be a first line of defense in managing the risks associated with a global pandemic. These groups and others are using FLIR thermal imaging cameras and software for the initial screening needed to help detect people with signs of elevated skin temperature. Once identified, those individuals can be checked with a medical device to determine if they have a fever, one of the symptoms of a coronavirus or other flu infection. FLIR is a global provider of thermal cameras for temperature screening-related applications. Its technology has been employed worldwide by customers since the 2003 SARS epidemic, with unique functionality that includes advanced measurement tools and alarms to enable faster critical decisions.
An upgrade of surveillance, using the latest video technology from IDIS, has put Circuit Zandvoort in poll position as host venue for the 2020 Formula 1 Grand Prix in the Netherlands. As well as wider improvements to the track, a top priority at the circuit was a complete overhaul of the video monitoring capability to meet the requirements of Formula 1. Security and safety surveillance Circuit Zandvoort will be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS For Track Manager Niek Oude Luttikhuis a key objective was to rapidly implement a solution that would be much easier than the previous system to use, maintain and adapt in the future. To achieve this, he brought together a team including IDIS – Korea’s surveillance manufacturer. Significantly improving security and safety surveillance of the track, their solution will also let the Formula 1 organizers temporarily receive functional authorized access of video data for the duration of the competition. Video management software At the heart of Circuit Zandvoort’s new system is IDIS’s server-crunching, 64 channel DS-IR300 NVR technology, pre-loaded with IDIS Solution Suite video management software (VMS). This allows all the track’s existing cameras to be easily integrated and operated alongside the latest IDIS 5MP speed dome PTZs and 12MP bullet cameras. It also delivers impressive new functionality, including ultra-high-definition monitoring capability using IDIS Smart UX Controls. The system now provides real-time image capture of the highest quality, with no lag, ghost-shadowing or stuttering of images, even when cars traveling at high speed are displayed. Critical Failover technology It ensures that recordings are automatically updated without the need for engineer calloutsImages on the racing control room video wall are now crisp and clear. And looking ahead, the IDIS Solution Suite VMS will make it easier to sustain this high standard by allowing cost-efficient, remote firmware updates and system maintenance. Circuit Zandvoort will also now be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS. This protects against video data loss due to a wide range of potential fault conditions, such as network instability or power failure. It ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings while the fault is resolved. No interruption to surveillance The entire upgrade was completed while the original system continued to run in parallel, confirms Track Manager Niek Oude Luttikhuis. This meant there was no interruption to surveillance during implementation, which was vitally important as the track is in almost continuous use. “There is fantastic mutual communication between IDIS and the different suppliers – they think ahead and complement each other,” says Mr Luttikhuis. “And from the start IDIS demonstrated a deep understanding of the security and operational requirements of our circuit and a passion for motor racing.” PTZ cameras for tracking With the new system operational as promised, in the control room a rotating team of 10 people work with the IDIS Solution Suite VMS, with minimal training required to use all its features and functions – including easy search and retrieval, and silky-smooth control of the ultra-high-definition (UHD) PTZ cameras for tracking in real-time. Authorization levels can be set, giving each individual specific user rights, and during the Grand Prix itself the Formula 1 organizers will also be given access to the system. If necessary, this will also include the ability to view and retrieve footage on mobile devices via the IDIS Mobile app – helping the 2020 Formula 1 Grand Prix to run smoothly behind the scenes.
The Danish Superliga football club Brøndby IF were aware that family attendance had fallen at some of the more high-profile games, such as the local derby with F.C. Copenhagen, due to concerns over hooliganism and safety. With an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist for causing trouble, the football club wanted to find a way to make genuine fans feel safer by preventing problems before they could occur. Improving security With the use of cameras and facial recognition, blacklisted offenders can now be automatically identified in the crowd before they attempt to enter the stadium. This system identifies any individuals registered on the offenders list and alerts security staff to prevent them from entering. The automated procedure at the stadium entrance also decreases congestion at the gates, so genuine fans can get into the stadium faster. As well as improving security outside, the system allows staff more time to focus their attention on creating a safe and entertaining environment for those inside the stadium. The technology can identify faces that are difficult to recognise with conventional techniques Facial recognition server The Panasonic facial recognition software ensures high levels of accuracy. The technology can identify faces that are difficult to recognize with conventional techniques, such as those taken from an acute angle and even when part of the face is concealed or hidden by sunglasses or scarves. In fact, the National Institute of Standards of Technology (NIST) in independent testing identified the system as the most accurate facial recognition server on the market. And the system is already working. One blacklisted offender was prevented from entering the stadium at the very first home game of the season in mid-July and he will receive a fine and extended ban. Protection of personal data However, some fans were initially sceptical about the scheme. They were worried about the Big Brother concerns of privacy and personal data protection. These fears quickly faded once the club explained the sensitive way that the scheme had been implemented. Security personnel remain in control of the process at every stage. The technology flags potential blacklisted offenders and the security advisers then take over and investigate further before taking action. People-led and technology supported The solution is people-led and technology supported. Personal data privacy is also protected because the facial recognition technology does not store the images or data of any supporters, other than those registered on the blacklist. In addition, all personal data is stored on an internal server, not connected to the internet or to any other system, significantly reducing any cyber risk of data breach. After seeing the results of the technology and receiving reassurances about data protection, both Brøndby management and fans alike have welcomed the new technology. Moving forward there is also the potential to utilize a national hooligan register with the system to help spot traveling troublemakers within Denmark.
Zayed University is the newest of three government sponsored higher education institutes in the United Arab Emirates. The campus is located on the mainland of the Emirate of Abu Dhabi, near the Abu Dhabi International Airport and Masdar. The 229,000m campus houses six colleges across 28 separate buildings, including faculty and administration buildings, a childcare facility, residence halls, classrooms, science and computer labs, cafeterias and a sports complex, all equipped with the latest technology. Future development plans will see the student population increase to 7,500 and the campus grow to cover a net area of 269,000m. Access to and from the campus is an important concern for Zayed University and is carefully managed around the clock to keep the 6,000 strong student body safe. Managing gate barriers and doors Banner sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowedThe university employs Serco to implement and manage their security requirements. Serco partnered with Gallagher, selecting the Command Centre security platform to manage gate barriers and access controlled doors with just under 650 MIFARE readers and 130 controllers across the site. Zayed University implements a policy to provide students with a secure campus environment. This includes managing the entry and exit of the students based on their scheduled classes. To achieve this, Zayed University runs an interface between Command Centre and its Banner system. Banner is a comprehensive computer information system that contains information on courses, students, faculty, staff and alumni, including financial aid, finance and human resource components. Entry and exit requests for students to pass through the campus gates are sent from Command Centre to the Banner system for approval, using the Command Centre OPC Alarms and Events interface. Based on the time of the entry or exit and the student’s schedule, the Banner system decides whether the request is accepted or denied. Banner then sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowed. Safe and secure environment for students Its intuitive user interface provides flexibility and easy management of operations"Gallagher security solutions provide the assurance and the knowledge that movement throughout campus is managed simply and efficiently to ensure a safe, secure environment. “Keeping students safe is of utmost importance to us,” says Mukesh Karsan, Serco IT Manager at Zayed University. “The Gallagher system helps us honor this commitment. Its intuitive user interface provides flexibility and easy management of operations.” He adds that he’s been “impressed with the reliability and robustness the system offers; it’s powerful, versatile and allows security personnel to carry out their day-to-day responsibilities with efficiency.” Gallagher solutions are trusted by education providers worldwide to: issue student and faculty access cards manage individual access rights control campus and dormitory access secure computer labs, science labs and other high-value assets integrate with scheduling and resource booking systems evacuate or lock down sites in case of an emergency Time and money saving solutions From intelligent integration with building management systems, to people and time efficiencies gained through automation and smart use of resources, Gallagher designs solutions that save time and money. Whether it’s across multiple zones within a single campus, or over multiple campuses, Gallagher solutions offer an intelligent, powerful way to ensure business continuity, protection of assets and keeping people safe.
Beijing Daxing Airport, due to open in September, will soon be the second in Beijing to secure daily operations with state-of-the-art technology by Airbus. Airbus will provide one Tetra DXTA server, and nine TB3 base stations with eight TTRX 32-channel receivers per base station for Bejing’s second international Airport communication structure. The system will be mutually backed up by the Beijing Capital International Airport to enhance the communication and management of the two airports. The whole network will be put in use before the 30th of September, the official opening date of the airport. This new airport will possess eight runways and serve around 100 million passengers annually, all of which will be secured with Airbus technology. Seamless communications Airbus Tetra system has played a vital role in securing tasks relating to passenger transportationTests carried out in April proved the interconnectivity between the digital trunk communication systems of both airports to be reliable, as stable and clear communications were recorded. The two Tetra systems provided by Airbus are fully interconnected; this will allow for Airport related entities such as Airlines and ground service companies to benefit from seamless communications between both airports. Beijing International Airport is also equipped with an Airbus Tetra system, which has provided highly stable, reliable, and flexible communication security for daily operations since its deployment in 2008. Over the past ten years, it has played a vital role in securing tasks relating to passenger transportation, as well as the logistics of high-scale world sports events. The current system serves over 10,000 subscribers. In 2018, the Beijing Capital International Airport saw over 100 million passengers for the first time, making it the second busiest airport in the world.
Round table discussion
A major benefit of technology innovation is more application opportunities. As video cameras become better and more versatile, new uses are emerging that extend the benefits of video surveillance, often outside tried-and-true parameters. Sometimes security camera manufacturers are on the front lines to see new ways video is contributing value to integrators and end user customers. We asked this week’s Expert Panel Roundtable participants: What is the most unusual application of surveillance cameras you have seen recently?