Testing & Approvals
VdS 2540 for reliable CIE comprehensively revised guidelines, includes precise performance characteristics for risk minimization in the control and activation of alarm valve stations, and in fault monitoring. The ‘brain’ of every fire alarm system is the Control and Indicating Equipment (CIE). This is where all information from the monitored areas comes together, where processes such as alarming, clearing an object and, above all, the triggering of connected extinguishing systems ar...
Globally renowned sensor solutions specialist, HENSOLDT has successfully passed the Factory Acceptance Test of its new airborne multi-mission surveillance radar, PrecISR. In an online demonstration conducted, the PrecISR 1000 airborne multi-mission surveillance radar proved its capabilities to the customer, QinetiQ GmbH, an international provider of airborne special missions operations, based out of Möchengladbach, in Germany. PrecISR 1000 airborne multi-mission surveillance radar The ra...
Acronis, a globally renowned company in cyber protection and data security solutions, has announced an update of its Acronis True Image 2021 that incorporates a professional-grade vulnerability assessment tool into the personal cyber protection solution. Scanning operating systems and applications Individuals and home office users can now scan their operating systems and applications for exploitable vulnerabilities and get recommendations on effectively closing those security gaps. Users can...
A substantial focus of the security industry is on the selection and installation of security systems, and there is no doubt that this is a critical element of the process. However, in order to ensure that security systems such as access control, video surveillance, intrusion detection and panic alarms deliver on ‘game day’, an equal if not greater emphasis has to be put on the actions that are taken after the installers have closed the doors on the truck and driven away. This arti...
The COVID-19 crisis causes a burden for companies that have to finish their testing and certification programs because of standards that will be superseded. Examples are the EN 60950-1:2006 and EN 60065 that are used for conformity testing of fire and security products for the Low Voltage Directive 2014/35/EU. Euralarm, therefore, urges to postpone the end date of the co-existence period of the EN 60950-1:2006 and EN 60065 with nine months. Test houses and notified bodies affected by COVID-19...
DITEK, globally renowned provider of surge protection solutions, has announced the launch of a new Deflector Series Surge Protective Device model, DTK-DF120S12, specifically designed to protect convenience stores and multi-dispenser fueling stations from unnecessary damage caused by electrical surge events. DTK-DF120S12 This unique new configuration delivers a wide range of benefits to store operators by protecting sensitive fuel pump control systems and more from damage while ensuring that pr...
Feenics has announced that its Keep by Feenics cloud-hosted access control platform is now certified and approved for government and federal agency use in Personal Identity Verification (PIV) credentialing and Physical Access Control Systems (PACS). FIPS 201-2 Evaluation Testing Feenics attained its listing on the GSA Approved Products List (APL) for all versions of Keep after completing the Federal Information Processing Standard (FIPS) 201-2 Evaluation (sometimes called FICAM) Testing Program. FIPS 201 was developed to satisfy the technical requirements of HSPD-12, the Department of Homeland Security’s mandated common identification standard and database for credentialing federal employees and contractors. After months-long testing, review and validation of the platform by third-party accredited testing lab CertiPath, both on-premise and cloud-hosted server applications of Keep satisfied requirements to become available for procurement by federal entities and listed on the GSA Schedule. Cloud Smart strategy “As the government targets the acceleration of cloud-hosted deployments through its Cloud Smart strategy, Feenics has effectively opened new channels of business for its value-added resellers and integrators”, said Chris Smith, who leads Federal Government efforts at Feenics. This certification affirms the Keep proof of concept as a secure platform for federal government applications “Keep was validated against a rigorous, comprehensive set of functional requirements derived from government-wide specifications”, said Smith, adding that more than 300 tests were conducted in an installed simulation at CertiPath facilities. ‘Keep Access Control as a Service’ software “This certification affirms the Keep proof of concept as a secure platform for federal government applications”, Smith further stated, adding “To maintain this status, Keep Access Control as a Service (ACaaS) software will undergo ongoing evaluation of new and updated versions”. “There’s a cloud-first mentality across U.S. government agencies that will help reduce the carbon footprint of hardware, while improving efficiencies with real-time updates, redundancies and lower maintenance costs”, said Paul Di Peso, Feenics Executive Vice President, adding “Receiving our FIPS 201 approval and attaining our APL validates the direction of access control in this vertical market.” Integration with Mercury Security controller DiPeso said the government is heading rapidly in the direction of increased cloud implementation, especially as new IT modernization initiatives emerge. He said “We believe we can be a major asset to the government’s push to cloud adoption”. Keep software integrates directly with the authentic Mercury Security controller Keep software integrates directly with the authentic Mercury Security controller that authenticates the PIV credential, rather than a separate communication module, further reducing the installed hardware footprint. Enterprise-enabled access control solutions “As the cloud and serverless environment proliferates in the government space, there’s a move to lessen reliance of onsite hardware”, said Matt Barnette, President of Mercury Security. “Having enterprize-enabled access control solutions like Feenics using HID’s pivCLASS solution via Mercury’s LP4502 controller brings additional applications to installers and customers alike”. (Feenics is a Platinum Partner to Mercury Security, an HID company.) Feenics continues to fortify its position as an ACaaS pioneer, certified as an International Organization for Standardization ISO 9001:2015 Company. In addition, the company recently received a 2020 Platinum Govies Award from Security Today in the Access Control Software/Controllers category.
Pivot3, a provider of intelligent infrastructure solutions, announced that it achieved Common Criteria Assurance Continuity certification for its Acuity 10.6 hyperconverged infrastructure (HCI) software platform. Pivot3 is the only HCI vendor with Common Criteria certification of a native-NVMe solution with policy-based management to automate data protection, security and workload performance. This provides government and enterprise customers with unprecedented capabilities to meet the highest security standards across the edge, core and cloud. Edge strategies The Common Criteria certification is considered the gold standard for securityMore than ever, enterprise-generated data is being created and processed outside of datacenters and the cloud. Because of this, government agencies and other highly-regulated industries are incorporating edge strategies into their initiatives to support the management of highly distributed data and infrastructure. “As more data is generated beyond the datacenter, federal customers require infrastructure solutions with the intelligence necessary to process and analyze across the edge, core and cloud – but without compromising security,” said Ben Bolles, vice president of product, Pivot3. “The Common Criteria certification is considered the gold standard for security, providing Pivot3’s customers with the confidence in knowing that their most mission-critical environments are protected and secure.” Framework for evaluating security features Common Criteria is an internationally recognized set of guidelines (International Organization for Standardization 15408), which define a common framework for evaluating security features and capabilities of information technology security products. This certification assures both government and private-sector organizations that Pivot3 provides the infrastructure necessary to mitigate emerging threats without compromizing security, resilience and manageability at scale. Pivot3 had previously attained Common Criteria certification on its prior generation software platform. The Common Criteria certification process consists of several evaluation assurance levels, each one more stringent than the last, with product security testing performed by accredited independent, third-party laboratories. This evaluation is recognized by over 28 participating countries, and others who follow the Common Criteria program unofficially such as the European Union. Common Criteria certification Commercial organizations also require Common Criteria certification for infrastructure and software solutionsThe U.S. government – as well as many other governments around the world --mandate Common Criteria certification of security products for purchases. All U.S. federal agencies are required to purchase commercial products that have met specified third-party assurance requirements and have been tested by an accredited national laboratory. Many commercial organizations also require Common Criteria certification for infrastructure and software solutions due to the certification’s intense security standards. Corsec, the global pioneer in product security requirements hardening, assisted Pivot3 with its Common Criteria evaluation and helped streamline the certification effort. Acuity software platform “Government agencies face new challenges as they seek to keep up with the growing complexity of IT while protecting against ever-increasing security threats,” said Matthew Appler, CEO, Corsec Security, Inc. “Pivot3’s achievement of the Common Criteria certification on the latest generation of its Acuity software platform brings a powerful range of new capabilities to this market, providing agencies with the intelligent solutions needed to serve citizens and protect our nation’s infrastructure.”
Keysight Technologies has announced Breach Defense, a security operations (SecOps) platform designed to improve operational security effectiveness. An integral element of the new platform is the Threat Simulator breach and attack simulation solution which enables network and security operations teams to measure the effectiveness of operational security by safely simulating the latest attacks and exploits on live networks. Security operations teams are faced with an increasingly complex network environment that is continuously under attack by a flood of cyber threats generated inside and outside of their organizations. Test-based evidence According to a recent Keysight Security Operations Effectiveness survey: Good security tools don’t always protect as expected: 50% of survey respondents stated they found their security solution was not working as expected after a breach had occurred. Most organizations don’t verify their security is working as it should: Only 35% of respondents have test-based evidence to prove their security products are configured and working correctly. Most organizations recognize the value of security testing: 86% of respondents stated they would value a solution that finds and helps to remediate vulnerabilities in a company’s security posture. Testing security capabilities Threat Simulator uses a series of lightweight agents to simulate attacks on a live network “An organization can be safe one day and vulnerable the next. Testing security capabilities at one point in time provides limited visibility to an organization’s ongoing security posture,” said Paula Musich, Research Director, Security and Risk Management at market research firm Enterprise Management Associates. “At its heart, security is both a people and processes issue." "By testing defenses on a regular basis using attack simulation, security operations teams can stay on top of changes that can turn good security hygiene into an exploitable vulnerability.” Enterprise security operations Keysight’s Threat Simulator solution provides enterprise security operations teams a method for testing security tools to determine their effectiveness in protecting the organization. It provides a continuous, automated security assessment of end-to-end production network security infrastructures, enabling organizations to quickly spot gaps and environment drift of security configurations, which is typically the result of someone in IT or a related group making a change without any malicious intent, while a patented recommendation engine provides clear remediation steps. Built on a software-as-a-service platform, Threat Simulator uses a series of lightweight agents to simulate attacks on a live network without exposing production servers or endpoints to malware or attacks. Threat Simulator features a library of threat simulations which is continuously updated by Keysight’s experienced Application and Threat Intelligence Research Center. An integrated dashboard makes it easy to conduct assessments, spot vulnerabilities and drill down on issues. Instructions to mitigate vulnerabilities Threat Simulator helps security operations teams find those gaps and gain actionable insight into how to close those gaps" It features step-by-step instructions to mitigate vulnerabilities to help security operations teams solve the issue. “Today’s network and security teams just don’t know how effective their security solutions are on a continuous basis,” said Scott Register, Vice President, Security Solutions, Keysight Network Applications & Security Group (formerly Ixia Solutions Group). "Security breaches aren’t always caused by a lack of capable products — often they are due to misconfigurations or a lack of security skills. Probing for coverage gaps has never been an easy task on a live network. Threat Simulator helps security operations teams find those gaps and gain actionable insight into how to close those gaps and improve their security posture.” Stop infected internal devices In addition to Threat Simulator, Keysight’s Breach Defense SecOps platform includes ThreatARMOR, a threat intelligence gateway. Complementing an existing security infrastructure, ThreatARMOR reduces attack surface by blocking up to 80% of malicious traffic at the source—decreasing the number of security information and event management (SIEM) alerts. ThreatARMOR can: block traffic from known bad IP addresses at line-rate speeds; block malicious IP addresses manually or automatically from SIEM tools; identify and stop infected internal devices from communicating with known botnet C&C servers; block traffic by geography; and block unused IP space / unassigned IP addresses and hijacked domains from a network.
The new open and modular video system platform MOBOTIX 7 fundamentally changes the use of video surveillance and video analysis. With its product portfolio of hardware, software and intelligent partner solutions, MOBOTIX can precisely map the current and even future requirements of various industries. One of the main areas of focus is the industrial and production sector. With MOBOTIX 7, MOBOTIX is completing its product and solution portfolio to meet all requirements in the industrial and production sector. The MOBOTIX MOVE models, the proven Mx6 and the new MOBOTIX 7 series cover all current and even future market requirements. From the high-quality standard camera to the AI-based high-end IoT video system developed for innovative and future applications: Robust, reliable, secure - Beyond Human Vision. Modern video technology Industrial and manufacturing companies benefit from numerous special video analysis apps Much more than safety, modern video technology helps to improve processes. With modern video surveillance and analysis, companies are increasingly able to optimize processes. For example, intelligent MOBOTIX systems can help reduce machine downtime, which makes a decisive contribution to more effective production. The fact that the cameras are maintenance-free is a big plus for company budgets. Industrial and manufacturing companies benefit from numerous special video analysis apps that are already available today and will be available in the near future. "Together with our partners, we are continuously developing intelligent industry solutions that meet the needs of their users. Supported by Artificial Intelligence and Deep Learning, our video systems can be tailored precisely to the needs of our customers. In this way, they meet the specific and individual challenges of our customers in industry and production," explains Hartmut Sprave, CTO of MOBOTIX AG. Thermal sensors, infrared illuminators They are ready for use even under extreme conditions like industrial and production plants, extreme environmental conditions prevail in some cases. Temperature fluctuations, dust, humidity - the robust video systems "Made in Germany" defy even difficult external influences and are among the most reliable in the industry. Most Mobotix cameras have an average service life - measured by the Mean Time Before Failure (MTBF) - of over 80,000 hours (>9 years). For indoor and outdoor installation, no additional protective housing or air conditioning measures are required. The highly sensitive optics, thermal sensors, infrared illuminators and even the intelligent apps master the most difficult optical conditions, such as darkness, steam, smoke and fog. Data Protection Edge computing eliminates the need for central video servers and recording devices Focus on data security and data protection Edge computing is an elementary component of MOBOTIX DNA. MOBOTIX cameras are high-performance computers with eyes. The entire video analysis - and optionally also the recording - takes place in the camera, with brilliant image quality, in real time and intelligently self-organized. The autonomous IoT cameras transmit images - securely end-to-end encrypted according to the highest standards - into the network only when relevant events occur. Transmitting less data also means that there are fewer opportunities for cyber attacks. Edge computing eliminates the need for central video servers and recording devices. High-quality electronic components Cyber security "Made in Germany" MOBOTIX only uses high-performance, high-quality electronic components. This principle is consistently applied throughout the digital world. Cyber security enjoys the highest priority at MOBOTIX and is lived intensively through the MOBOTIX Cactus Concept. For example, MOBOTIX is certified for cyber security by the internationally renowned French testing institute CNPP (Centre National de Prévention et de Protection) - the first European manufacturer to be so. Data security with regard to the GDPR is also elementary for MOBOTIX. Both access rights and camera settings can be adjusted sensitively and according to the application: 100 percent "Made in Germany" for cyber security. Complete product range "MOBOTIX thus offers industrial and manufacturing companies a complete product range that covers all needs and requirements in industry and production as a complete solution. Together with our partners and end customers, we develop customized systems from our entire product and solution portfolio that optimally meet the industry- and company-specific challenges," says MOBOTIX CEO Thomas Lausten.
Securitas UK has been officially recognized as a Top Employer by the Top Employers Institute for its commitment to delivering exceptional people management and HR strategies. Organizations certified as Top Employers dedicate themselves to providing the very best working environment for employees through their progressive ‘people-first’ HR practices. In order to be certified as Top Employer, Securitas had to achieve the minimum standard as set out by the Top Employers Institute across ten key topics: Talent Strategy, Workforce Planning, Talent Acquisition, On-boarding, Learning & Development, Performance Management, Leadership Development, Career and Succession Management, Compensation and Benefits and Culture. Securitas UK is the only security and protective services company to be accredited by the Top Employer Institute. Top Employer for the second year We are absolutely delighted to be officially recognized as a Top Employer for the second year running" Sarah Hayes, Human Resources Director, Securitas UK, commented, “We are absolutely delighted to be officially recognized as a Top Employer for the second year running. We strive to have the best team in the UK security services industry and by offering competitive salaries, great working conditions, training, learning and career development, we can attract and retain the very best people.” “Our talented, professional officers excel at keeping our clients’ people, property and assets safe, and in return we want to provide an exceptional employee experience which offers a rewarding career pathway for the next generation of security professionals.” “Over the past year we have fully embedded our online, end-end recruitment and selection processes, and launched our brand-new Securitas career development program to promote career progression and talent management across the organization.” Learning Management System Our certification as a Top Employer is a testament to our commitment to put our people first" “And with the launch of our new online Learning Management System, all our people can access a comprehensive catalog of Learning and Development solutions, ranging from Induction through to Leadership Development with the Institute of Leadership Management.” “Our certification as a Top Employer is a testament to our commitment to put our people first and provide them with the very best employee experience. We will continue to work hard to be the employer of choice in the UK, attracting and retaining the very best talent in the industry.” Top Employers Institute CEO David Plink says, “To become recognized as a Top Employer, an organization will have to prove that the implementation of their people strategies enriches the world of work of their employees.” “The certified participants are a shining example of a dedication to people practices as they continuously commit to empowering their employees for a better world of work. Congratulations!”
iland, a provider of secure application and data protection cloud services built on proven VMware technology, announced a new cloud region in Canada with the opening of its new data center facility in Toronto, Ontario, joining nine other cloud regions in Los Angeles, Dallas, Washington, D.C., London, Manchester, Amsterdam, Singapore, Melbourne and Sydney. The iland cloud region provides access to the company’s full suite of secure cloud services built on iland’s Secure Cloud Platform, including Disaster Recovery as a Service (DRaaS), Infrastructure as a Service (IaaS), Backup as a Service (BaaS), and backup services for Office 365, in addition to Cloud Object Storage. The Toronto facility is iland’s first cloud region in Canada with plans for an additional Canadian location. VMware solutions With this cloud region, iland is offering additional opportunities to its existing North American channel partners and is actively engaging new partners in the region, especially those with customers using VMware and Veeam solutions. “By extending iland services into Canada, we can better serve new customers and partners who seek the benefits of cloud computing, but must also meet Canada’s data sovereignty requirements,” said iland president and co-founder Brian Ussher. “Many of our North American customers and partners have operations that span across the United States and Canada border. Meeting the security and environmental standards of both sides will give them the peace of mind that their data and workloads are both proximal and secure.” Unmatched cloud services Expansion into Canada provides unmatched cloud services to customers in North America, while meeting the stringent demands of Canadian data security and privacy regulations. The new 242,000 square-foot facility includes security officers working 24 hours a day, seven days a week; provides numerous physical security measures; and it meets the certification requirements of ISO 9001, ISO 27001, CSA STAR and BS 10012. iland’s new cloud region is designed green to meet environmental demands of Canadian consumers and regulations, earning it a Gold level for Leadership in Energy and Environmental Design (LEED). The building includes granular-temperature and optimized-lighting controls, a rainwater capture irrigation system, cold aisle containment and high-efficiency-Turbocor chillers.
When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of them have a formal process in place. Large security projects require clear KPIs and targets (including monthly commitments), ongoing review, regular clear communication and a dedicated team for consistency and continuity from start to finish. Major Security System Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs If you don’t choose wisely, what you may end up with is company delivering a string of different people from different departments working on your installation at any given time, without a joined up approach. The person responsible for system design, for example, may never see your project when it’s actually being installed, which can lead to a potentially problematic and ultimately unsatisfactory outcome. While every major security system design project will bring about its own set of challenges, the approach taken by the security vendor should remain consistent. Here’s what it should look like at the different stages of the project and what you should expect from your supplier. Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs. Product Knowledge Going down this route limits your options and you could end up with a security system that meets the vendor’s product portfolio rather than your needs. That doesn’t mean to say that a security company that is not affiliated to specific manufacturers won’t have close relationships with a range of them. A close relationship can be beneficial in terms of in-depth product knowledge and preferential pricing. What’s most important is that the security company independently test and asses product rather than relying on manufacturers’ claims. They should continually appraise the marketplace to see what’s new and assess the value and relevance of product. They should also have the finger on the pulse of the security sector to identify where the market is going. Team work is essential with large projects not only to get the job done, but also to manage any risk Comprehensive Strategy At STANLEY Security we very much focus on identifying technology solutions that minimize financial outlay for a client, such as video analytics. At present we are testing facial recognition systems which have grown in popularity and delivery. A written, comprehensive strategy needs to be in place for the project, including forecasting that considers the longer timescales involved in large, complex projects and includes a ‘what if’ approach to ensure appropriate resource is available. So, for example, if a project looks like it is going to overrun due to unforeseen circumstances, you want to be sure you retain the same team on the project full time and that they are not transferred onto the next contract or dividing their time between the two. Manage Any Risk Team work is essential with large projects not only to get the job done, but also to manage any risk. Your vendor must have an experienced Major Project Team with a clear structure, so everyone knows their role and you know who you are dealing with at any given time. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate If subcontractors are being used by the security company, which is quite usual for very large installations and for particular specialisms (e.g. control room modelling), then a process needs to be in place to manage them and you need to be made aware of this. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate. High Security Requirements This is where the dedicated Major Project Team is vital as they will know the project inside out and have worked on it from start to finish, helping to avoid any end of project issues. Large, complex security systems, especially those with high security requirements, are not easy to deliver. They require skillful, experienced hands, substantial resources in both financial and staffing terms, and a clear, consistent procedure that everyone is fully aware of. Don’t assume that just because you are dealing with a large security vendor they will have all of these in place; think like a security professional and ask to see the evidence!
Security teams at casinos and gaming facilities are challenged daily to balance a welcoming and guest-focused attitude with a firm and capable presence to prevent and handle security issues, manage surveillance and security systems, and protect employees, guests, and assets. And all of this needs to be accomplished while complying with strict gaming regulations. An experienced security systems integrator can assist you with many of those challenges, including the very important job of ensuring that the correct security technologies are integrated and installed correctly to avoid downtime and maintain regulatory compliance. On the flip side, partnering with the wrong security integrator can be an expensive lesson with disastrous financial consequences due to system interruptions that can shut down gaming operations. However, selecting the right security systems integrator is not always an easy task. To get the answers you need, you need to ask the right questions. Here’s a list of criteria to help get the search process started. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry 1. Relevant And Proven Industry Experience This may be one of the most important factors for you to research. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry. You wouldn’t hire a plumber to fix your roof or a chef to repair your car, so why consider hiring an integrator without relevant work experience in your specific industry? Does the integrator have experience working with security solutions for casinos and gaming facilities similar to your facility? Have they worked with gaming commissions in your state? Do they have the gaming certifications necessary to ensure your new system is in compliance? And what specific projects have they done – with references you can contact? Even more, look for a systems integrator who has strong relationships with contractors, suppliers, unions and equipment suppliers, as they may need to call on them for assistance during the course of your installation. 2. Security Systems Knowledge Security technologies are evolving at an unprecedented pace which presents obvious advantages and some hidden dangers. It’s important that you select a systems integrator who not only installs products well – but also works very closely with equipment and software manufacturers to develop new and innovative solutions for the most challenging installations.It’s also important to ask about their procedures and processes for after-hours emergency situations Look for systems integrators that utilize integration and testing facilities to evaluate which system configuration and specific components meet your functionality needs, lighting challenges, resolution and frame rate requirements, and recording accuracy demands to ensure your system provides you with the highest levels of identification while maintaining regulatory compliance. Since no two systems are ever alike, it’s also important to look for custom integration capabilities employing solutions from different manufacturers to ensure you are getting the best possible solution on an application by application basis. 3. Brand Loyalty Versus Conflicts Of Interest There’s no doubt that security professionals have their preferred brands. This can be based on prior experience, proven reliability, superior customer support, or even personal relationships. But it’s also no secret that price and sometimes spiffs can play a deciding role on which products a reseller recommends. Be specific to ask questions about the systems integrator’s line card – which manufacturers’ products do they actually represent and why? And how do they select specific products for specific applications? If the answers to these simple questions seem vague, there may be more at play than meets the eye. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation. 4. Accelerating Resolutions How is the integrator’s firm structured? How long have they been in business? Who will be your daily contact? How long have members of the integrator’s team been with the firm? What experience do they have? It’s also important to ask about their procedures and processes for after-hours emergency situations, as you will likely need service after normal business hours. Find out if they offer on-demand remote system support to address problems immediately, and to accelerate resolutions if and when there is a failure. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation Most importantly, verify that they have technicians who can get to your physical location quickly in the event problems need to be addressed physically in order to keep your property in compliance. Even though it can be overlooked, it’s important to assure the system integrator’s organizational structure meshes well with your general requirements before starting a relationship. 5. Pricing Structure Of course, price is important, but while an integrator’s pricing should be competitive, it should be viewed as one of many selection criteria.An experienced systems integrator with casinos and gaming facilities will understand local, state, federal, and tribal regulations A security systems integrator with a proven track record of successfully configuring, installing, and servicing projects like yours, on time and on budget, is worth more than the small amount of money you might save by going with a low-cost integrator. 6. Knowledge Of Gaming Regulations A systems integrator who has experience working with casinos and gaming facilities will understand local, state, federal, and tribal regulations, and will provide you with a gaming surveillance and security solution that minimizes disruptions to your operations during its installation and after your new system has been implemented. Along with the requirement standards of performance, quality and reliability, compliance is critical to ensure fluid gaming operations. 7. Adding Value With Industry References Industry references are invaluable in determining your ideal choice. First, ask them to provide client contacts from their reference list, and contact those individuals. Questions to ask include: Did the integrator clearly understand the reference’s requirements? How did they contribute to the solution? What challenges did they need to overcome? Did the company deliver on time and on budget? How has the system(s) been operating since implemented? How has their support been? Why would you recommend them? A good security systems integrator will take extra steps to ensure your security solution is always working 8. Asking The Right Questions There are very few security systems integrators who can address all of a casino’s or gaming facility’s needs, but they do exist, and you’ll find them if you do your homework. Look for an integrator that can add value and not just take direction. A good security systems integrator will volunteer ideas to reduce maintenance costs, take extra steps to ensure your security solution is always working, and help save your casino money. Their success will be determined by their initial ability to understand your challenges and deliver the best possible solution to resolve them. And it all starts with choosing the right partner by asking the right questions.
The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), machine learning, cloud-based video management systems and cloud-based access control systems. New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow.The global managed security services market is projected to reach nearly $40.97 Bn, with a CAGR of 16.6% over the next five years Need For Education And Enhanced Security With the increased profile of the industry, one can clearly see that the physical security industry is expanding globally to new consumers; bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols and the need for education. This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership. According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years. Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprised of cloud services at nearly $7B. Sharing Security Service Best Practices In September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity. The physical security market will have nearly 18% of the total market opportunity comprised of cloud services These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities. Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions; VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers.Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise Cloud Versus Non-Cloud Services The insight that one was able to glean from this information and, that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions. The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition and as such should be addressed across all levels of manufacturing, implementation, and customer utilization. Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products. Ensuring Successful Deployment As a SaaS service provider, the technical personnel makeup results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed.Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry. As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions. Data Security Strategies Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimize attack surfaces, create complex, proprietary associations in a multi-layered and multi-tiered connection throughout the application and lastly ensuring that all communication to and from customers’ devices are encrypted and secured. Implementing a process to protect customer’s data records and facilities begins with mapping out a strategy to secure software and hardware Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests. Addressing Cyber Threats These tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the manufacturer is providing the latest solutions available in the market.Integration implementation personnel should gain greater knowledge in networks and cybersecurity best practices for their solutions An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises. As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected. It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner. Knowledge Of Networks And Cybersecurity Best Practices The products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation. However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions.The products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply In most cases, this will mean additional jobs for new higher-level personnel, access to additional services to provide to end users, and an elevation of networking and security expertise within their business. Expanding The Reach Of Physical Security These new-found skills and expertise will likely bleed into new markets and expand the reach of the traditional physical security market. It truly is an exciting time to be a part of a rapidly expanding market in the physical security space and to watch the industry react to the growing need for cybersecurity within products and services. In the next four years, there will be new innovations, new investments, and new winners and losers in products and services. It seems clear that those integrators and manufacturers who have begun to create the strategies and products for tomorrow will be well ahead of those who are not actively addressing the need for SaaS products, yet the window to opportunity remains wide open.
Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also known as red teaming). The session, titled “We Sneak into High Security Buildings and Get Paid for It,” will be presented by Michael Glasser, President, Glasser Security Group. He has two decades of experience providing security design strategic planning, implementation oversight, auditing and penetration testing. “Penetration testing determines whether people and systems are providing the protection you think they are,” says Glasser. Various system components should come together into a solution that works for the client. People, technology and architecture are all components of successful security systems. His motto: “Stop guessing and starting testing." Test-driving security systems “You can compare it to driving a car,” says Glasser. “You want to be sure the brakes work and the engine works, but then somebody has to test-drive the car.” Stop guessing and starting testing" The concept of penetration testing goes back to the Cold War, when the military had “Red Teams” and "Blue Teams,” competing squads that used their skills to imitate attack techniques enemies might use. More recently, the term “pen testing” has become common in the cybersecurity industry, often referring to “white hat” hackers that test the effectiveness of cybersecurity measures. Applying the concept to physical security in corporate America brings the concept full circle. “People think their controls work, but they realize they really need to see if it all works together,” says Glasser. Pen testing in corporate America “You can go to any military base or nuclear power site and you see pen testing,” says Glasser. “But often it doesn’t happen in corporate America.” Sometimes physical pen testing is approached as an extension of cybersecurity testing because addressing physical threats is an element in cybersecurity, too. “It’s the same service, except to make sure the physical house is in order,” says Glasser. Glasser’s session will be among the SIA Education@ISC East presentations scheduled at the education theaters on the show floor at ISC East, Nov. 20-21 at the Javits Center in New York. The process If you believe the movies, Glasser’s job is all fun and excitement, like a “bunch of kids having fun.” The reality is more mundane, he says. “People think it’s fun, but it’s work, not fun.” The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities before attempting a break-in. Research is based on threat modeling: What is a company worried about? Who is the bad guy? What do they want to do? What are the threats? The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities Among other tools, Glasser uses Open Source Intelligence (OINT), which is collection and analysis of information gathered from public, open sources, such as media, the Internet, public government data, etc. Glasser comes from a physical security industry family – both his mother and father were employed in the security industry – and he attended his first ISC East show in the 1990s when he was 11 years old. As a security consultant and security expert witness for more than 20 years, he has previously spoken at GSX and various ASIS International events.
Despite any negativity you may hear, Hikvision is optimistic about their role in the U.S. market. “We demonstrate that we can be trusted, and that we should be trusted,” says Jeffrey He, Vice President, Hikvision, and President, Hikvision USA and Hikvision Canada. “We have sound products and technology. Our mission in the security industry is to protect, not to harm. Otherwise why would we be in this industry?” Hikvision is committed to investing in the North American market, where there was ‘positive year-over-year growth’ in 2018 and ‘strong’ sales in Q1 this year, according to Eric Chen, General Manager of Hikvision USA and Hikvision Canada. HikCentral Central Management Software The company’s U.S. focus is shifting from products to solution sales, with emphasis on ‘mid-market’ small- and medium-sized businesses (SMBs). The largest verticals are retail and education, and there are emerging opportunities in the cannabis market. Launch of the HikCentral central management software (CMS) is a component of the company’s solution-sales approach. Launch of the HikCentral central management software is a component of the company’s solution-sales approachMr. He acknowledges the growth of ‘anti-China sentiment’ in the United States and other parts of the world, which he says will impact Hikvision’s operations globally. Specifically, in the U.S., ‘political’ elements impacting Hikvision’s business include ongoing tariffs and a trade war, Congressional calls for export controls and sanctions, and a provision of the National Defense Authorization Act (NDAA) that bans use of Chinese video surveillance products in government applications. Specifying Cybersecurity Initiatives At ISC West In spite of it all, Hikvision’s message at the recent ISC West show was overwhelmingly positive, and the company also detailed cybersecurity initiatives they say put the Chinese company ahead of many competitors in the industry. Eric Chen came in as General Manager last year; he previously spent a decade working for Hikvision in China. Chen reports solid 18.8% year-over-year growth for Hikvision globally, totaling $7.4 billion last year. He notes the company saw 40% compounded growth between 2010 and 2018. Globally, there are 34,000 employees, 16,000 of whom are research and development (R&D) engineers. Hikvision’s expanding global footprint includes 46 international branches. There are three manufacturing facilities in China, in addition to one in India. HikRewards Program For HDP Customers At ISC West, Hikvision’s theme was ‘Focus on Your Success’, including introduction of the HikRewards program that provides rebates to HDP (Hikvision Dealer Partner) customers, their core dealer base. A new online Hikvision Knowledge Library for HDPs provides training and reference materials dealers can share with employees. A new tech center, introduced in December, provides data sheets, product information, and support resources. There is also a North American R&D team headquartered in Montreal. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls A customer satisfaction survey launched in March provided good feedback from customers. “They know who to call if they have a problem,” says Chen. “We want to focus on making customers successful.” The success theme also extends to Hikvision employees, who are featured in videos describing their jobs and enthusiasm for Hikvision. There are some 400 employees in the North American operation. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls. Half of the booth was focused on solutions, especially retail and education, and also gaming and commercial real estate. Security Products Displayed At ISC West A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS systemProduct highlights at the ISC West booth included the 32-megapixel PanoVu multi-sensor dome camera, whose 180-degree panoramic image was displayed on a 65-inch monitor. A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS system. Some products new to the North American market, including intercoms, turnstiles, emergency call stations, and under-vehicle inspection, were displayed. Hikvision’s deep learning products are moving into their second generation, including the ability to obscure private information on videos to comply with GDPR/privacy requirements (previewed at ISC West and released later in the year). Algorithm components of Hikvision’s DeepInMind artificial intelligence are being adapted into a platform called AcuSense for value-priced products, which can recognize a human or vehicle and help filter out false alarms. Also being adapted to products with lower price points are the ColorVu system that incorporates visible light LEDs to provide color images at night, and DarkFighter low-light capabilities. Penetration Testing Of Cameras And NVRs As a global manufacturer, Hikvision faces a high level of scrutiny about cybersecurity, which Mr. Chen says is “a good thing for us,” enabling them to highlight the steps they are taking to improve cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity In September 2017, Hikvision began working with third parties (including Rapid7) for penetration testing (ethical hacking) of its cameras and recorders. That same month, Hikvision set up a Cybersecurity Hotline open to anyone with questions about cybersecurity, including white-hat hackers and researchers. Even before that, Hikvision had an open-door policy on cybersecurity and a program for patching and disclosing responsibility. In February of 2018, Hikvision released a 40-page Cybersecurity White Paper describing cybersecurity testing and processes built into the software development lifecycle. That same month, Hikvision launched an Opened Source Code Transparency Center and offered an open invitation to anyone wanting to inspect Hikvision’s source code and let them know of any vulnerabilities. FIPS 140-2 Certification By NIST Hikvision has also become a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA), which ensures their patching and incident reporting programs have been reviewed by a CNA partnering company. Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVRsIn August, Hikvision received Federal Information Processing Standard (FIPS) 140-2 certification, a U.S. government encryption standard created by the National Institute of Standards and Technology (NIST). Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVR products. Davis said the FIPS 140-2 certification process began before the NDAA ban on use of Hikvision products in the U.S. government, and in any case is a standard that ensures a high level of encryption. “We wanted to make sure we had the same level of technology,” he says. “It was not to win over the government.” Making Industry More Cybersecure “We are really trying to have third parties test and certify our equipment,” adds Davis. “We are trying to be open and transparent. Education and awareness are key.” “We need the trust of customers in the security community,” says Mr. He. “No matter what, we have to follow the highest standards to offset the concerns and accusations.” In April 2018, Davis became a member of the Security Industry Association (SIA) Cybersecurity Advisory Board to help make the entire industry more cybersecure through education, awareness and standards. Hikvision has also joined the Forum of Incident Response and Security Teams (FIRST at first.org), a global cybersecurity incident response consortium that cooperatively handles computer security incidents and promotes incident prevention programs. Davis has presented Cybersecurity Road Shows in 22 cities in the United States and Canada, and also in Australia and New Zealand. The 90-minute presentations focus on education awareness around cybersecurity and seek to get attendees engaged and aware about cybersecurity in business and also in their homes.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Knightscope, Inc., a developer of advanced physical security technologies focused on enhancing U.S. security operations, announced that it is has taken a major step in its commitment to help better secure schools across the country by selecting Clovis Unified School District in California as its beta testing location for a suite of new technologies under development. The Company had prior announced this effort earlier this year when it solicited students to get involved and submit essays on how Knightscope’s fully autonomous security robots could help in a school setting. Security Robots To Monitor School Safety “With over 100,000 schools in the country, we need to develop a new set of tools and technologies as a critical part of our long-term mission to better secure the United States of America,” said William Santana Li, chairman and chief executive officer, Knightscope, Inc. Knightscope’s robots will provide the authoritative presence needed on a school campus and provide actual intelligence by filling in the blind spots" “Being able to utilize a real-world environment to test, sample, and iterate on new capabilities while inspiring students to pursue STEM careers is certainly a winning combination,” continued Li. “As a teacher of thirty years, my philosophy has always been to be proactive instead of reactive, and the idea of security robots monitoring a school is definitely a proactive approach to school safety. Knightscope’s robots will provide the authoritative presence needed on a school campus and provide actual intelligence by filling in the blind spots with their ‘eyes and ears,’” said Clifford A. Nitschke, Jr., AP United States Government and Politics Instructor, Clovis North High School. Trialling A New Technology In School Safety Mr. Nitschke’s class submitted the winning proposal to Knightscope. “We are honored to be chosen by Knightscope and to be given the opportunity to pilot a new and exciting technology in the field of school safety.” The Clovis United Unified School District Governing Board is scheduled to meet on January 16, 2019 to formally accept the beta testing program by Knightscope. The meeting is planned to occur at 6:30pm at the Clovis Unified Professional Development Building, 1680 David E Cook Way, Clovis, CA 93611. Assuming an approval by the Board, the parties will determine implementation timing thereafter.
In January 2018, the Mayor of New York, Bill de Blasio and the City’s Security Infrastructure Working Group announced plans to bring permanent perimeter barriers, or bollards, to high-profile sites and to create a process to streamline their design and construction. With funds exceeding $14 million for permanent bollards in Times Square and more than $50 million to commence the broader rollout of new protective measures in phases. Mayor de Blasio said, “In 2017, New Yorkers witnessed the horrible capacity of people willing to do us harm, whether it was in our subways, on our bike paths or in Times Square. But we will not be cowed and our expanded investment today in barriers and bollards in our public spaces underscores our resolve in keeping New York City safe from future attacks. In this new year, we can and will protect our iconic public spaces while New Yorkers go on living our lives, including by hosting a record number of tourists.” “These additional safety bollards will allow New Yorkers and visitors to be more secure at landmark locations and other sites throughout our City,” said Police Commissioner James P. O’Neill.With vehicles becoming a weapon for terrorists, the need to protect citizens has dawned on most large cities Ensuring Public Security And with vehicles seemingly becoming the weapon of choice for terrorists, the need to protect citizens from 'people willing to do harm' has dawned on most large cities, leaving many still trying to find the best way to protect their citizens. Admittedly in many cases, it seems to be ‘after the horse has bolted’ so to speak. In 2016, a lorry was driven into crowds celebrating Bastille Day in Nice, killing 87 people and injuring 458. This was an awful, cowardly and devastating attack that had a huge impact on so many lives. The stark reality is however, after two previous vehicle attacks in France, if there had had been tougher security measures in place, rather than an increased police presence, and a plastic temporary barrier, then many of those citizens would still be alive today. MacSafe For Vehicle Incursion Prevention Reacting to these devastating events, Metropolis Nice C.te d’Azur decided to install a safety barrier along the Promenade des Anglais. The new barrier, or vehicle incursion prevention system, MacSafe, was tailormade for the Promenade des Anglais by Maccaferri and J&S Franklin. It was inaugurated in July 2017. It is crash test rated to stop a 19-tonne truck travelling at 50km/h and impacting at 20°, equivalent to the vehicle used by the terrorist in Nice in 2016 and can withstand two successive impacts. The system is also accredited by the UIAU (University of Venice). The MacSafe system consists of two high tensile steel cables supported on tubular steel posts and anchored at each end with our patented energy dissipation system. The posts are secured to ground foundations and all external fixings are designed to prevent them being easily removed. The force of the vehicle impact is distributed through the cables and posts and absorbed within the patented energy dissipaters. The energy is absorbed through compressive deformation and not by friction. This ensures better and more reliable performance throughout the long-life of the barrier.Las Vegas plan to have their existing 800 bollards updated to some 7,000 by the end of 2018 Balancing Security And Aesthetics On the 19th December 2016, a truck was deliberately driven into the Christmas market next to the Kaiser Wilhelm Memorial Church at Breitscheidplatz in Berlin, killing 12 people and injuring 56 others. One year on, and the Christmas Market in Berlin is protected by large concrete barriers, armed police patrols and stop and search checks. In January 2017 in Melbourne, 6 people were killed and 37 injured when a car sped down a footpath crashing into pedestrians, by June 2017 $10 million had been allocated, and temporary concrete barricades and bollards had been installed around the City of Sydney. In January 2018, the City of Gold Coast began installing heavy duty retractable bollards capable of repelling the force of a large heavy goods vehicle. They had previously resolved to spend $515,000 on bollards which met the Australian standard, but on the advice of the QPS Commonwealth Games security adviser, it was recommended that the bollards comply with a European standard bringing the cost of the project to $1.095 million. Las Vegas plan to have their existing 800 bollards updated to some 7,000 by the end of 2018, to increase the safety of those walking The Strip in Sin City. However, some cities are still concerned about the aesthetics of concrete bollards on their historic cities, a case of balancing security over protecting tourism. Physical Barriers For Pedestrian Security Take for instance, Barcelona in Spain. On the 17th August 2017, a van was driven into pedestrians strolling along Las Ramblas, in Barcelona, killing 13 people and injuring at least another 130. Advice was given that bollards were needed, warnings of impeding threats were given, and yet, the action taken was to increase policing levels on the streets. Now, thankfully, there are a few bollards and increased police presence on the streets, and going forward they are “studying the possibility of installing physical barriers to prevent further attacks with vehicles.”Although guard rails would not have stopped either of the London attacks, they can limit the damage In London on 22nd March 2017, a car was driven into pedestrians on Westminster Bridge, killing 5 people and injuring 49 others. The driver also stabbed a policeman to death. Built-In Counter Terrorism Design Again, in London, on 3rd June 2017, a van was driven at pedestrians in the London Bridge Area. Three attackers began stabbing people, before being shot by police. 8 people died. 48 were injured, 21 critically. Controversially previously installed 'Guard Rails' had been removed from London’s streets to protect cyclists and make the Capital more ‘attractive’. Although guard rails would not have stopped either of the London attacks, they could have limited the damage. However, today, protective barriers are erected on Thames bridges and from London’s experience of previous terrorist activities (IRA) there are very few buildings or indeed public spaces that don’t have ‘counter-terrorism’ design inbuilt. Government-Initiated Guidance The UK Government has produced a 174-page guide, Crowded Places Guidance, that highlights the threat as a vehicle being used as a weapon, but also highlights that these threats can be “mitigated by installing physical measures (including blending into the landscape or streetscape) which may be passive (static) or active (security controlled). These measures can be installed either on a permanent or temporary basis. All such measures should meet appropriate standards in terms of their vehicle impact performance, design and installation.” Vehicle security barriers, need not be ugly concrete monstrosities. Nor do they need to be concrete lumps that need huge lifting gear to place them. They can be totally inconspicuous, letting everyday life continue and forgetting they are there, or full on ‘in your face’ shouting a warning to would be terrorists that this area is safe.Planters can be installed quickly and are sited to allow pedestrians to pass through while vehicles can’t PAS68 Street Planters They come in many guises, from retractable bollards and passive static bollards to street furniture. Even cleverly disguised PAS68 Street Planters from Securiscape, which have an attractive floral display whilst cleverly acting as a security barrier. These planters can be installed quickly and are sited to allow pedestrians to pass through while vehicles can’t, but due to intelligent design, incorporating a surface mounted, reinforced structure which can stop a vehicle if it is used as a battering ram. But if none of that appeals, then there are many landscaping options, including, ditches, bunds and berms. DefenCell Mesh Gabion DefenCell by J&S Franklin, is a lightweight geotextile welded mesh gabion that once filled with locally available materials, can be incorporated into security measures for public places and protection. Filled and stacked, these gabions can be covered and planted, maintaining the aesthetic and environmental considerations of high profile or sensitive locations. Sadly, people with ‘evil intent’ are a fact of life. Which makes vehicle security barriers a permanent part of our city landscapes. So, whether hidden or in plain sight they will be there be to Protect and Protect again.
To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, a new smart IoT industrial park in Hangzhou has been put to use by Dahua Technology, a video surveillance solution provider. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Efficient Information Integration The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialized requests and ever-changing reality.The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production(preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning high-end devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools, etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. Fast Processing According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. Dahua Smart Industrial Park provides the great benefit of internal synergy The faster speed also applies to the development of new molding, since Dahua Smart Industrial Park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organizing system is supported by topnotch equipment, such as MAKINO high-speed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005MM, while also supporting CAD / CAM / CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days.Higher quality results in less likelihood for products to malfunction especially when they are used in critical situations Time- And Cost-Saving Solution By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors, etc., all of which proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, not-allowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons: first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, Dahua has put together an effectively closed loop for quality control in the manufacturing process. Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example: it can process components, in metric size, as small as 03015(0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry.Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process Enhanced Vision And Intelligent Analytics Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high-definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognize flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.In the future phase, this industrial park is expected to be more intelligent to enable a safer society and smarter living Safe Society And Smart Living Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialized needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialized use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one. And in the future phase, it is expected to be more intelligent, to realize client-centered flexible production and to enable a safer society and smarter living.
ip.access has announced a collaboration with Imaginet, a provider of IT network and security solutions, to implement a rapidly deployable disaster response network in Makati City, the Philippines. Makati City, part of the Metro Manila region, is the main financial hub and has a population of 6 million people. Built on a drained mangrove swamp, the city’s infrastructure is at a high risk for significant damage in the event of an earthquake, typhoon or other natural disasters. In the event of a disaster it is likely that communications infrastructure would be affected – hindering efforts to direct the population to safety and locate people trapped in collapsed buildings. To improve the city’s preparedness for natural disasters, the local Disaster Risk Reduction & Management Office (DRRMO) worked with Imaginet to implement a rapidly deployable mobile network. Deployed via four command vehicles, the network will allow first responders to communicate with the population and report back to the central command office.The ip.access team has an inherent understanding of disaster situations, with extensive experience working in harsh environments Ensuring Disaster Preparedness Basing the network on 2G technology, to ensure that signals would be capable of penetrating collapsed buildings and enabling communication through SMS messaging, ip.access was tasked with designing, installing and testing the network in a tight six-week window. Following a successful commissioning period, the four command vehicles were first deployed in December 2017. Commenting on the partnership, Blair Duncan, CEO at Imaginet, said, “This was a challenging technical undertaking. As such, we needed confidence that we were working with a partner that could deliver a high quality solution. In that respect ip.access were an ideal partner – the team has an inherent understanding of disaster situations, with extensive experience working in harsh environments. We knew that we could rely on them to equip our vehicles with the robust and reliable radio network the DRRMO requires should a disaster strike.” Small Cell Solutions Nick Johnson, CTO at ip.access added, “We have a wide range of award winning commercial off-the-shelf (COTS) small cell solutions that can be easily integrated and operated within a wide range of specialist deployment scenarios – including in disaster response settings.” “Communication is critical in a disaster situation, so the fact our proven solutions deliver five nines availability with exceptional reliability makes them ideal for applications like the vehicle-borne network in Makati City.” Due to the success of the vehicles, the Makati City DRRMO is now looking to increase its fleet to nine vehicles to enable more flexibility and more robustness in its disaster readiness.
Muir Group Housing Association, which manages more than 5,500 homes across the country, has formed a new partnership with OpenView Security Solutions, a national supplier of electrical and mechanical services, to further enhance the level of services to residents. The contract started on 1st June 2017 and OpenView Security Solutions is providing a range of specialist services including PAT testing, fire risk assessments and the ongoing maintenance of fire alarms, emergency lighting, door entry systems, automatic doors and barriers. The transfer of these services from the previous contractor was efficiently achieved by both organizations. Residential Safety And Security According to Mike Proudfoot, Maintenance manager at Muir Group Housing Association, “This partnership will be very important in ensuring that we maintain our ongoing commitment regarding the safety and security of residents. As a landlord, OpenView’s involvement will be crucial in helping us to meet our obligations and the long-term benefits will be positive, both for Muir residents and the housing association as a whole.” Andy Ward, Sales Director at OpenView Security Solutions, added, “We are excited about embarking on a new era with Muir Group Housing Association. With extensive experience of working closely in partnership with housing associations, Openview understands the importance of ensuring that all equipment is working efficiently at all times and is committed to providing the highest quality service to the organization and its residents.”
Round table discussion
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Sometimes you see it coming and want to scream out: “Don’t do that.” We all make mistakes, but it’s hard to sit and watch others as they go down the wrong path. It’s especially difficult when the errant party is a customer, and when their wrong move might somehow end up reflecting badly on you as a technology or security systems provider. Much better to anticipate the problem by expecting the possible mistake before it happens. We asked this week’s Expert Panel Round Table: What is the biggest mistake you see your customers make when it comes to buying or installing security or surveillance systems?