Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-center when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecu...
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effective...
Time for an indepth review of IFSEC 2019 in London. This show had fewer exhibitors than previous shows, and the ‘vibe’ was definitely more low-key. Fewer exhibitors meant larger aisles and plenty of room to breathe, and the slower pace provided time for exhibitors to reflect (often negatively) on the return on investment (ROI) of large trade shows. There was little buzz on the first day of the show, but spirits picked up on the second day (when, not coincidentally, some exhibitors...
ExtraHop announces ExtraHop® Reveal(x) Cloud™, a Software-as-a-Service (SaaS)-based network detection and response (NDR) solution for the cloud-first hybrid enterprise. Reveal(x) Cloud provides deep and continuous visibility, enabling Security Operations (SecOps) teams to analyze every transaction, detect threats, and respond to attacks to gain control over their hybrid attack surface and protect their investment in the cloud. While the cloud has proven to be a force multiplier for De...
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security video wall and visual display solutions experts Ultimate Visual Solutions (UVS) works on projects in 15 countries around the world since its launch nine months ago. UVS changed its name from eyevis UK last September following the acquisition of eyevis GmbH by the Leyard group. Providing turnkey solutions The rebranding has allowed the company to offer an expanded range of products and services The rebranding has allowed the company to offer an expanded range of products and services...
Moxa Inc., a pioneer in industrial communications and networking, releases a major upgrade for its MXview industrial network management software. Enhanced compatibility now lets customers seamlessly integrate MXview into both IT and OT systems. In addition, it is possible to centrally manage large-scale networks featuring up to 10 sites using real-time, operational data to configure, monitor and diagnose a maximum of 20,000 devices. Key to the success of the new upgrade is a faster, more user-friendly interface that provides full visibility and holistic transparency into network status. Network management tool MXview will generate comprehensive reports, including inventory, traffic and availability, that empower customers to transform complex system metrics into IIoT performance indicators. MXview is a scalable network management tool developed to deal with the expanding industrial network requirements" “MXview is a scalable network management tool developed to deal with the expanding industrial network requirements of the IIoT,” said Theo Lai, Product Manager at Moxa. “We developed the latest version of MXview with two goals in mind: to make network management easier and to ensure that the software is simple-to-use for the best user experience.” Manage industrial networks In order to further simplify network management, MXview allows users to get the data they need from a main control dashboard where IT professionals can quickly analyze and respond to network changes so the issues can be resolved before escalating and impacting the business. Integration is simple: a web widget generates a URL enabling the integration of MXview into SCADA systems and other web-based applications where the control dashboard can be viewed from both local and remote sites at anytime. In addition to integrating MXview into OT applications, the software now supports RESTful API, which provides IT engineers with more options to manage industrial networks using their own dashboard to minimize maintenance effort. The net result of these upgrades is more effective use of network assets, which can lead to lower costs and reduced risk.
Dahua Technology, a video-centric smart IoT solution and service provider, showcases a wide range of competitive product portfolios and smart solutions to top security professionals during the International Security Conference and Expo (ISC West) at booth #14039 from April 10th to 12th. Dahua will also celebrate the fifth anniversary of its USA subsidiary on Wednesday evening, showing strong commitment to the local markets. Running with the theme ‘Empowering through Technology’, the Dahua products and technologies exhibited during ISC West are comprehensive from every aspect covering major surveillance market demands with the most advanced technologies. Competitive Product Portfolios Facial Recognition - Dahua Facial Recognition technology integrates face recognition, blacklist alarm, stranger alarm, VIP recognition, face tracking, face search, metadata search and other functions to offer a series of smart products including the exhibited AI Smart Capture Camera, 4MP Starlight Face Recognition IR Dome AI Network Camera and IVSS series for various scenarios and customer demands. Low - light Technology - Featuring advanced Starlight technology, Dahua starlight+ products are able to provide excellent colorful image and rich details even at night, solving the problem of poor color reproduction of images under low illumination environment with image color reproduction, large aperture, ultra-high sensor, white light and other technologies. Dahua Smart Thermal Series Cameras can be widely used for security monitoring, fire prevention and temperature measurementThermal Technology - Through a new integration of visible-light and thermal-light and a variety of AI-enabled intelligent functions, Dahua Smart Thermal Series Cameras can be widely used for security monitoring, fire prevention and temperature measurement. Combined with the back-end storage NVR and DSS PRO, Dahua Technology can provide an all-in-one system with front-ends, storages, and intelligent analytics to meet the requirements of customers. Smart Tracking - Dahua radar system consists of radar and speed dome camera (PTZ). On the basis of traditional CCTV security system, it combines the accurate target tracking performance of the radar products to provide a complete solution with front-end data acquisition, edge computing and back-end storage for a wide range of applications such as prison perimeter, airport runway, industrial park, energy pipeline and other important protection areas. Wide Area Security - The Dahua Multi-sensor Series Cameras can be used for large scene monitoring, target tracking, simple management and multi-service convergence. The Dahua 4x2MP Multi-sensor Cameras possess ground-breaking flexibility that can simultaneously move each sensor module around the internal track for a 180-, 270-, or 360-degree panorama, minimizing blind spots for an improved situational awareness, which is ideal for parking lots, supermarkets and intersections, etc. HDCVI 5.0 - The recently launched Dahua HDCVI 5.0 brings five core values: Perimeter Protection, Face Recognition, Metadata Search, Active Deterrence and Starlight & Full Color. Perimeter protection can identify humans and vehicles while filtering less important objects, face recognition let authorized persons to pass freely and can do immediate action to strangers, with the latest AI technology we make video surveillance more efficient and easy to use. AI-enabled Intelligent Solutions Featuring the above technologies, Dahua Technology also presented integrated solutions for a variety of vertical markets at the Expo. Intelligent Retail Solution - Dahua Smart Retail Solution applies video intelligence technology to specific retail business scenarios. According to the scenarios of large chain supermarkets, we have developed five smart application scenarios including smart entrance and exit, shelf advertising, cashier loss prevention, operation analysis and remote shop patrol to help retailers optimize store layout and product display, improve storage efficiency as well as attract traffic flow. Intelligent Logistics Solution - Dahua Intelligent Logistics Solution takes Dahua video technology as the cornerstone, combine intelligent analysis technology, machine vision technology, big data technology, etc. to further divide into five sub-solutions including machine vision DWS solution, video tracking solution, vehicle entrance solution, park surveillance solution and logistics vehicle solution for different application scenarios. Intelligent Residential Solution - Dahua Intelligent Residential Solution provides an integrated and economic solution with multi-level protection including personal entrance, vehicle entrance, public area, unit security, home protection and control center to make people’s life more convenient, safer and smarter while improving operation efficient and saving energy for property owners. Intelligent Critical Infrastructure Solution - Dahua Intelligent Critical Infrastructure Solution offers an end-to-end solution featuring perimeter protection, thermal measurement, access control, video surveillance and auto-tracking system for electric power stations, oil and gas industries to ensure the safety of their daily operations, timely detection of terrorist threats and fire, quickly and easily viewing station status. Intelligent Education Solution - Dahua Intelligent Education Solution brings a new concept of pre-warning for campus administrators. The solution incorporates important scenario applications empowered by AI technology such as perimeter, entrance, public area, building and classroom to realize threat prediction, effective management of people and vehicles, establishing a secured and smart system for students and teachers while improving operation efficiency. Reliable security solutions Dahua Technology empowers our dealers and integrators to stay at the top of their field by providing the latest security solutions to their end-users" Empowering signifies Dahua Technology’s dedication to promoting customer satisfaction and partner development. While market demands are constantly evolving, Dahua Technology’s offering is also evolving to meet current and future needs, giving partners and end-users the assurance that they’ve selected competitive and reliable security solutions on the market. “Dahua Technology empowers our dealers and integrators to stay at the top of their field by providing the latest security solutions to their end-users,” Tim Shen, Director of Marketing at Dahua Technology USA, explained. “In addition, the resources we make available to our dealers ensure that they are up-to-speed on their knowledge of our technology and fully trained on the products.” To further address Dahua Technology’s social commitment locally, a group of the staff from Dahua Technology USA will participate in The Security 5KRun / 2K Walk organized by charity group Mission 500 on the morning of April 11th. With a mission of ‘Enabling a Safer Society and Smarter Living’, Dahua Technology will continue to focus on ‘Innovation, Quality, and Service’, to serve partners and customers around the world.
Dortronics, a pioneer in off-the-shelf and customized door control solutions, is showcasing its 4800 Series Intelligent Interlock Controllers here at ISC West 2019 (booth #1037). The newly enhanced controllers offer an abundance of features providing installers with a higher degree of versatility to meet customers’ specific needs. “Our enhanced line of door interlock controllers are a one board solution that allows the installer complete control of all operating and configuration options without complex software,” said John Fitzpatrick, President of Dortronics Systems, Inc. “This provides installers and end users with an efficient and easy-to-use access control solution.” Control Door Locks The 4800 Series Door Interlock Controller accommodates up to five doors, including doors with automatic openers. The unit features adjustable timers for propped door time, panic release unlock time, and unlock pause time for REX unlock time. Additional features include 12 inputs for door status, request for access, interlock override and emergency unlock. The unit’s 17 outputs control door locks (fail-safe or fail-secure), traffic lights and mirror door status with alarm outputs. Additional features include a watchdog circuit to monitor operation, LED input/output status indication and voltage spike/surge protection. The 4800 Series is available as a controller board only or with a 4-amp Class 2 UL 294 power supply.
At ISC West 2019, ASSA ABLOY will highlight its commitment to helping security professionals stay ahead of industry trends and innovation for their clients. ASSA ABLOY’s Booth (#8061) will feature cutting-edge solutions that help security professionals across industries navigate what’s next in access control. “At ASSA ABLOY, we’re focused on helping our customers prepare for the future so they can build a safer, smarter and more seamless business,” said Peter Boriskin, Chief Technology Officer at ASSA ABLOY Opening Solutions Americas. “We’re excited to share the products that allow us to help security professionals open what’s next in the industry.” Unattended Package Delivery At its booth, ASSA ABLOY will display new innovations in access including: Unmanned Critical Infrastructure: ASSA ABLOY will highlight ways to ensure the security of critical infrastructure that is often unmanned or unsecured. One such example is Intelligent Traffic System (ITS) cabinets that are vulnerable to risks ranging from vandalism to malicious physical and cyber-attacks simply because they aren’t adequately secured. Mobile Credentials: Mobile is already a crucial part of people’s everyday lives. With the shift to mobile, ASSA ABLOY is supporting the growing adoption of mobile credentials and making strides in capabilities by integrating with key strategic partners. Unattended Delivery: The security of unattended package delivery has given rise to a new set of challenges and opportunities. Booth visitors can learn more about ASSA ABLOY’s newest addition to the family, Luxer One, a locker technology company, and how smart lockers can be used as a package delivery solution. Intelligent Key System “These advances are the result of our continued commitment to developing solutions that improve security, safety and convenience for our customers,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “The innovations on display at ISC West are just the start of what’s coming down the pike as we explore new opportunities in the market.” Various Markets And Technologies The booth will also showcase new expansions in ASSA ABLOY’s product lines for various markets from education to healthcare, as well as the latest technologies, including: The Securitron M380E Magnalock, which provides a strong hold, an optional integrated REX, sleek design and easy installation with a new strike mounting template. The Adams Rite G100 wireless digital glass lock with Aperio technology, which makes extending access control to all-glass doors easy and affordable while maintaining aesthetics. The latest Attack Resistant Door Solutions, 2019 Secure Campus Award and 2019 Govies Award winning technology designed to delay intruder entry. The Medeco XT Traffic Cabinet Lock, 2019 Govies Award winning technology designed to secure critical infrastructure with 27/4 security and access through an intelligent key system.
ReconaSense announces ReconMaps, a new module of its A.I.-powered security platform, designed to provide real-time decision support for advanced emergency and security management. This powerful geospatial visualization tool empowers organizations and security departments to quickly and easily view any type of incident, and the affected surrounding resources. The solution features geospatial mapping that connects the dots between the location of people and physical assets, and the evolving conditions around them. Beyond just identifying and mapping hot spots, ReconMaps allows users to apply flexible geofencing to define areas of interest, and all affected assets in an area. Further, the solution can automatically identify the fastest path to respond to any threat as conditions evolve in real-time. Controlling Access Permissions Includes visualising and identifying people, buildings or assets based on the severity, type and location of the threat This includes visualising and identifying people, buildings or assets based on the severity, type and location of the threat. When combined with live video feeds, response times and quality are drastically improved. As threat levels increase in a particular area, ReconaSense can send actionable guidance to targeted groups and individuals to relocate to safe locations, while controlling access permissions. Leveraging integration with GPS, RFID, devices, and other data sources, the solution can map any asset defined by an organization and ‘flag’ it the moment something atypical occurs – such as a gas leak in a pipeline, an unauthorized vehicle in a no-entry zone, or other events and activities that can be identified by a sensor or application and reported to ReconaSense. GPS-Directed Guidance ReconMaps geospatial A.I. features and benefits include: Geofencing: Define any perimeter on a map to monitor, track, communicate with and control people and assets in a specific range including any micro, macro or global location. Geospatial Analysis: Identify a potential threat or risk on a map, understand where and how widespread it is, and who and what may be affected. Proactive, Risk-Aware Guidance: Target specific individuals and groups based on their unique role, status and location and provide GPS-directed guidance to quickly reach safety zones and avoid a threat altogether. Optimal Routing: Accelerate response times and provide optimal paths for responders to reach an impacted area, people or assets based on real-time traffic, weather and travel conditions. Risk-Adaptive Access Control: Leverage integration with ReconAccess to provide or deny access to specific areas or safe shelters based on evolving risk conditions. Remote Control: Integrate with building automation systems to shut down or turn on safety systems according to established safety and security protocols. Analyzing Travel Schedules The solution works in combination with other components of the ReconaSense security intelligence platform and risk-adaptive access control solution to analyze, detect threats and send actionable guidance – without having to pull manual reports or look at spreadsheets that might slow down responses, and put lives and systems at risk. With such a broad, bird’s-eye view, ReconMaps makes it easier and faster for campuses, smart cities and smart buildings, geographically-dispersed organizations and critical infrastructure to assess location-based risks and to make real-time security decisions. The system can project and predict the impact of a weather event or other impending situation by analyzing travel schedules For example, the system can project and predict the impact of a weather event or other impending situation by analyzing travel schedules, scheduled calendar events for key executives, transportation plans and routes, and more. Any upcoming events that may put people and assets at risk can be rescheduled or re-routed and alerts can be sent to impacted individuals to avoid a potentially dangerous situation. Risk-Adaptive Access Control Solution “Too often in an emergency, limited interoperability between disparate security systems can impact the flow of information and allow things to slip through the cracks – increasing, rather than decreasing, the number of lives and assets at risk,” said John Carter, co-founder, president and CTO of ReconaSense. “ReconaSense geospatial A.I. offers a visual presentation layer that’s easy to navigate across highly-diverse, dynamic environments. It provides the ability to quickly and easily drill down into specific points of interest, and recommend intelligent, proactive responses.” Attendees at ISC West in Las Vegas are invited to learn more at a panel presentation on The Rise of Intelligence in Physical Security, featuring speaker Clayton Brown, co-founder and vice president of business development and strategy at ReconaSense, on April 11 at 9:45 a.m. PDT in Sands 304. The ReconaSense team will be onsite demoing its A.I.-powered security and risk intelligence platform and the industry’s first risk-adaptive access control solution, ReconAccess, in the Connected Security Expo, Booth #33091.
At ISC West, Bosch will showcase how its offerings deliver value to integrators and end users by enhancing security, improving efficiency, and solving common challenges. Visitors to the booth will see intelligent solutions for vertical markets and new products and services that make systems easier to install and manage. “Gaining efficiency, reducing costs, and increasing profits are challenges for integrators and end users alike," said Brian Wiser, President of Bosch Security and Safety Systems, North America. "With technology that is faster to install and easier to integrate, and services that simplify system management, we're helping integrators serve more customers in less time. Seamless integration and built-in intelligence also combine to empower integrators to create smart, customized solutions that substantially improve security and offer clear business advantages beyond security. As a result, there is significant value for integrators and end users that choose Bosch for their security, safety, and communications needs." Wireless Remote Commissioning At ISC West, Bosch will launch a new fixed dome camera series with wireless remote commissioning capabilities At ISC West, Bosch will launch a new fixed dome camera series with wireless remote commissioning capabilities that reduce installation and set-up time by up to 75 percent. The FLEXIDOME IP starlight 8000i cameras offer an innovative product concept that enables set-up in only three convenient steps: installing the mounting bracket, connecting the cables, and attaching the camera module. Innovative wireless remote commissioning enables installers to work smarter. Currently, to reach cameras, technicians must repeatedly climb ladders, or a lift needs to be rented. With this new camera series, commissioning can be done wirelessly or remotely with no need for ladders or lifts. A tablet or smartphone with the Bosch Project Assistant app can be used to adjust the pan, tilt, roll, and zoom to set the required field of view without touching the camera or lens. If any changes are required post-installation – to accommodate a different store layout or high-risk area – this can be done remotely to save time, effort, and resources. i Series Intelligent IP Cameras Bosch’s portfolio of intelligent ‘i’ Series cameras featuring built-in video analytics is also expanding. In addition to the existing IP 4000i, 5000i, 6000i, 7000i, 9000i and new FLEXIDOME IP starlight 8000i cameras, Bosch will preview MIC IP starlight and MIC IP ultra 7100i cameras. These rugged cameras are made with anti-corrosive metal and can function at temperatures ranging from -40 to +140 degrees Fahrenheit. The MIC IP ultra 7100i delivers 4K ultra HD resolution for mission critical applications, such as city and highway surveillance, making them ideal for monitoring highways, bridges, ports, perimeters, and more. A new firmware release for the IP 7000i, 8000i and 9000i cameras will also introduce Camera Trainer functionality to "i" Series cameras with on-board Intelligent Video Analytics. Camera Trainer brings machine learning to Bosch IP cameras, enabling integrators to tailor them to detect the objects and situations that matter most. The ability to identify user-defined objects and situations can be combined with the existing alarm rules and object filters of Intelligent Video Analytics for even more flexibility and accuracy. It substantially improves the level of security for people and property and opens up new possibilities for customized applications. For example, it could be used to separate vehicles clustered in front of traffic lights or to determine how long a vehicle has been parked in a bay. With Camera Trainer, video cameras can be taught to recognize and detect stationary objects or certain situations instead of being triggered by motion alone. Installer Services Portal Bosch will also preview an improved Installer Services Portal to help dealers and integrators better manage security devices, services, and invoices Bosch will also preview an improved Installer Services Portal to help dealers and integrators better manage security devices, services, and invoices. The mobile-ready site offers single sign-on for secure and easy access to Bosch communication services, including cellular data plans for control panel communications and cloud connectivity for remote programming and end user app connectivity. With the portal, dealers and integrators gain enhanced reporting for service billing by device, secure online invoice payment capabilities, and the ability to customize access to technical or billing information by assigning employee roles within an account. In addition, a new Installer Services Portal companion app will make it easier for dealers and integrators to add devices to their portal accounts by simply scanning a product's QR code with the app. Bosch Security Control Panels ISC West attendees will also learn how Bosch security control panels, video systems and analytics, access control, and communications technology work together to deliver increased security, efficient monitoring and control, automated audio announcements, and more. To demonstrate the full power of these solutions, Bosch will simulate a retail store within its booth where visitors can experience how integrated solutions improve overall safety and security, reduce shrink, and help retailers improve merchandising and operations. For example, visitors can see how pressing a cashier station panic button connected to the Bosch G Series Control Panel will display an alarm and video in the Bosch Video Management System (BVMS) as well as trigger the Telex Radio Dispatch system (IP-224) to issue an announcement on store personnel’s two-way radios. In addition, attendees can flip a switch to simulate a fire and experience how the AVIOTEC IP starlight 8000 camera uses video-based fire detection to quickly detect a fire before it spreads, while notifying store personnel. Parking Lot Video Monitoring Attendees will also learn how to improve management of outdoor areas, such as parking lots and loading docks, and to identify high-risk situations Attendees will also learn how to improve management of outdoor areas, such as parking lots and loading docks, and to identify high-risk situations like loitering using security and communications technology. For example, they will see how a camera can be used as a sensor to detect a delivery truck approaching a loading dock bay. The camera can trigger the warehouse's Bosch public address system to issue an audio notification that sends staff to a specific bay to receive the delivery. If the dock door is left open, the Bosch G Series Control Panel will issue an alarm and trigger a different audio notification to prompt staff to close the door. Bosch loudspeakers installed throughout the store, outdoor area, and booth can be used for both announcements and background music. Designed to work together, Bosch systems make it easier for integrators to implement customized solutions that provide significant benefits for their customers. Integrated systems are possible whether customers choose a complete Bosch solution or use software from other providers. Bosch products are compatible with solutions from a range of industry partners.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organization, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organization and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviorAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organizations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behavior and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organizations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerized applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratization of AI in the IP camera market.Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding The Global IP Camera Market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analyzed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-Processor-Enabled Video Analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most timeMicroprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognize how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast Processing For Rapid Response At City Level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyze traffic situations Quick local decisions on the video cameras are also used to help analyze traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-Time HD Video Monitoring And Recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-Gen IP Cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognized in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyze the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalization. Each camera at the edge can be personalized to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recognizer on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI At The Edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as old familiar faces will be vying for your attention. With only three days, it’s nearly impossible to explore every booth and every vendor. Ultimately, you’ll want to focus your limited time on companies whose partnership can lead to your organization’s long-term success. In that context, I’d like to suggest a few things to think about as you wend your way through this year’s tradeshow. The Next Wave In IP Technology The fact that the whole world is going IP is nothing new. The network-based connectivity trend has been ongoing for more than 25 years. What’s changed is the nomenclature. Today it’s all about the Internet of Things (IoT). What was once exclusively an analog-based video surveillance market has shifted predominantly over to IP For the security industry, the concept of IoT really began with connecting DVRs through a network. Then in 1996, IP cameras – the first true IoT devices – hit the market. Since then, what was once exclusively an analog-based video surveillance market has shifted predominantly over to IP, providing exceptional growth opportunity for any company wanting to be on the leading edge. Today, however, that market is relatively saturated and growing at a much slower rate. In response, consolidation of the market has started to accelerate. Many vendors are disappearing while a select few are becoming stronger. Though the IP video revolution is now a fait accompli, there are still a few ancillary security technologies that are just beginning to jump on the IP convergence bandwagon. I’m referring to two in particular: IP audio systems and IP intercom solutions. Like their IP video cousins, these relatively new IP systems are built on open platform standards and provide the same benefits for convergence as happened in the camera space: better scalability and ROI, more functionality, and easy integration with third party systems. The technology is a great complement to a customer’s existing IP surveillance system or an ideal replacement for an antiquated analog audio system. So I’d recommend spending time at booths showcasing this technology. Listen to the crystal clear sound quality. Learn from the various vendors how easy IP audio systems are to custom configure, remotely manage and scale. And discover the different ways the IP technology can be used, from paging, public address and broadcasting background music to augmenting security systems and perimeter protection solutions. The potential markets that can benefit from this latest IP technology are wide and varied, everything from hotels, hospitals and transportation hubs to educational institutions and retail chains. So it’s well worth your time to take a look at this growing opportunity. AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board Artificial Intelligence: Hype Vs. Reality Video intelligence or video analytics was the big trend a decade ago. But it quickly fizzled out when hype crashed into reality. In the ensuing years algorithms have greatly improved, leading to more reliable analytic performance. Now it’s commonplace for video surveillance solutions to include a wide range of analytics from motion detection and people counting to dwell time analysis, object left behind and license plate recognition. The latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI) With analytics gradually becoming mainstream, the latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI). These self-learning applications parse event data and use what they’ve learned from the experience to make determinations or predictions that can increase the accuracy of future alerts. Before you get swept up in all the big promises that have yet to prove deliverable, take time at ISC West to educate yourself about the current state of the technology. AI works well in some areas. For instance, AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board. Talk to some of the AI vendors at ISC West to learn when and if AI might be right for your organization’s analytic applications. See who has actual, field-proven solutions and who is just offering ideas that might take many years to prove useful in real applications. Connecting With The Right Partner Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners Choosing the right partner is as important in business as it is life. Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners. You’re sure to find a number of new companies entering the field this year. Also be sure to notice which companies are absent. Have they left the surveillance industry? Are they struggling financially and can no longer afford to show up? If you partnered with them in the past, where does that leave your business today? As you explore potential vendor relationships, make sure you not only look at the arc of their technology development, but also their long-term financial stability and the kind of support services they offer. Cybersecurity should be front and center on your radar, along with timely updates, product integration with your existing technology and ongoing training to gain the most benefit from your investment. Look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimize waste and lower their carbon footprint Think of ISC West as the ultimate meet-and-greet - look around the tradeshow floor and see who might by likely partners Another important thing to find out is whether their business ethics align with yours. Is sustainability important to your company? How about corporate social responsibility, diversity and inclusion? Ultimately you want to do business with healthy, innovative companies that share your core values. If being green is a fundamental principal of your company, look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimize waste and lower their carbon footprint. If striving for better global citizenship is your corporate mantra, you need to know how the vendor is assuring their operation complies with environmental laws and regulations. In terms of maintaining social and ethical standards, it’s important to know where the vendor stands on issues such as human rights violations, compulsory child labor, fair wages and sourcing minerals from countries in armed conflict. Go In With A Plan There’s so much to discover at ISC West this year that four days isn’t nearly enough time to see it all. So you’ll have to strategically pick and choose which booths and vendors to visit. I’d advise that you plan out your days in advance so that you can get the most value from the choices you make.
The threat of drones is a growing concern around the perimeter and in the airspace surrounding airports. According to a UK Airprox Board report, the number of times a drone endangered the safety of an aircraft in the UK airspace rose more than a third in 2018 compared to the year before. The highest-profile recent drone incident was at UK’s Gatwick Airport, where a drone sighting last December triggered a three-day shutdown of the UK’s second busiest airport, disrupted the travel plans of 140,000 people and affected 1,000 flights. Unauthorized drone activity And there have been other recent incidents of drone disruptions at airports: At Heathrow Airport in January 2019, flights were temporarily stopped for about an hour ‘as a precautionary measure’ after a drone was reported. The UK Airprox Board recorded 39 dangerously close drone encounters at Heathrow in 2018. In the U.S., flights into Newark Liberty International Airport were disrupted for about 90 minutes in January after a drone sighting. Dubai International Airport, the world’s busiest for international travel, closed its airspace for about 30 minutes in February due to suspected unauthorized drone activity. In March and again in May, air traffic at Frankfurt Airport in Germany was grounded due to drone sightings – for about 30 minutes in the first instance and about an hour in the second. Drone detection systems Security has a role in preventing drone incidents, although pilots often report themSecurity has a role in preventing drone incidents, although pilots often report them. At Gatwick, the initial reports of a drone over the airfield came from airport security officers. After the incident, the UK government rushed through legislation to enlarge the drone exclusion zones around airports to a maximum of 5 km (up from the previous 1 km). In the U.S., the exclusion zone around airports is a radius of about 5 miles, and even more in sensitive areas such as the National Capital Region around Ronald Reagan Washington National Airport, where restrictions are 15 to 30 miles. Airports in the U.S. are allowed to deploy drone detection systems but may not use counterdrone technology (such as shooting down the drones), which is reserved for the Justice Department and Homeland Security. Dedicated new technology “News that drone threats to aircraft are increasing should come as no surprise,” says Simon Barnes, Business Development Manager – Airports Europe for Genetec. “Recent reported incidents are just the tip of the iceberg. As drones become increasingly ubiquitous – both from hobbyists and their growing use in professional arenas – we can expect to see many more incidents.” From speaking to airports across the world, Barnes has learned that two of the most pressing challenges they face are how they secure their perimeters (as intruders become increasingly sophisticated) and identifying ‘Friend from Foe’ as operational needs must be maintained. “When it specifically comes to drone detection, the short-term temptation can be to introduce a dedicated new technology to address this specific threat,” he commented. More comprehensive response We need to work with technology, not against it, in order to ensure public safety and security"“However, the last thing a functioning airport needs is an independent system that isn’t unified with all of the other security measures in place. Only when the data from all of these inputs is visualized in one place can an airport begin to make sense of its environment and enable a fast and efficient response to evolving challenges such as the insider threat and malicious drone activities. We fully expect airports to respond to this changing landscape, to help ensure a more comprehensive response.” Philip Avery, Managing Director of Navtech Radar, adds: “In today's current climate of increased national threats, we need to work fast to keep up with modern risks. However, creating new, complicated laws open to misinterpretation or enforcing a complete ban on privately owned drones seem like Luddite solutions that undermine the potential of innovative technology. We need to work with technology, not against it, in order to ensure public safety and security.” Help mitigate risk Navtech Radar sells the AdvanceGuard system for drone detection. Tavcom Training, part of the Linx International Group, has responded to requests from the security industry for expert training in order to be better prepared for and mitigate against the threat of Unmanned Aerial Systems (better known as drones). The company offers a two-day Drone Detection classroom-based course for £375+VAT. Our drone detection course gives security professionals advice from experts" “The responses to the [recent] airport drone attacks were played out in the spotlight, with much public debate regarding the seeming lack of a pre-defined plan of action to prevent or contain such an incident,” explains Sarah Hayward-Turton, Sales and Marketing Director at the Linx International Group. “Our drone detection course gives security professionals advice from experts in drone technology, to help mitigate risk and implement countermeasures to thwart unauthorized drone activity.” The course will be offered again in November 2019 and in February 2020.
Lack of cybersecurity of video systems made headlines in 2016. The Mirai cyberattack that year impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cybersecurity attacks later in the day were more global in nature. The cyberattacks were carried out by a botnet, a network of bots, which are software applications (in this case, computer viruses) that communicate with each other and run tasks automatically over the Internet. IP-Enabled Cameras Bots can infiltrate unprotected computers and then use the computing power of their ‘hosts’ to carry out various kinds of cyber-attacks on other Internet targets. In the case of the Mirai attacks, a hidden army of bots worked together to bombard various websites with so many bogus requests that the sites became overwhelmed by the volume of traffic and could not respond to legitimate requests. It’s called a denial of service (DDS) attack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders (DVRs). In other words, the bots used the computing power of our industry’s video products to launch the headline-grabbing cyberattack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders Safeguarded Communication Since 2016, awareness of cybersecurity for video systems has grown. Today, it is understood that video solutions should be designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted, and any commands and configurations to control cameras and other devices are transmitted via a secure channel (HTTPS). Some basic best practices can go a long way to improving the cybersecurity of video systems. A small change is to remove default passwords from products and software, and to avoid using ‘guessable’ passwords. All firmware should be encrypted to reduce the possibility of it being downloaded from the manufacturer’s website and deconstructed. Use of a secure operating system that is regularly updated can protect against video tampering, altering, spoofing and snooping. Video Surveillance Systems Another precaution is to avoid remote login using Telnet or FTP, which are less secure. Finally, use of digital certificate provides assurance that data from a third party is true and not falsified. All data should be encrypted with digital certificates. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats Free downloadable guides and other resources provide specific recommendations on hardening video surveillance systems by applying proven cybersecurity initiatives. For example, the OnSSI Hardening Guide for Networked Video Surveillance Systems includes guidance on password strength, how to avoid poor password practices, collaboration with IT and HR departments and how to apply software and firmware security updates. Hardware-Level Encryption It also includes standard, advanced and enterprise cybersecurity best practices for cameras, servers and workstations and networks. Another cybersecurity requirement is data-at-rest encryption to ensure that data, such as stored video, is secure right down to the storage medium in which it is held. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Despite the clear benefits, data-at-rest encryption lags other areas, such as network and endpoint security, in terms of the investment it currently receives. A Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security.
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect Anomalous Data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make Critical Decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple Camera Streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing color. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion Detection Scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyze video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
AMG Systems has been commissioned to help digitise the traffic monitoring system for newly-extended hard shoulder bus lanes on Belfast’s main motorways, to make it more efficient, secure and reliable. A new IP-based CCTV system was being installed as part of the extension project, so the underlying fiber network needed to be upgraded in order to handle the high-grade images being transmitted back to the city’s Traffic Information and Control Center (TICC). The upgrade helps to enhance passenger journeys by improving the quality of real-time information sent to traffic management teams. AMG – Juniper Networks partnership AMG, working with Juniper Networks, a leader in secure, AI-driven networks, brought the IP-driven CCTV project together across numerous government agencies and private construction contractors to create a cost-efficient, robust solution for Belfast’s M1 and M2 motorways. The Northern Ireland Department for Infrastructure (DfI) awarded a tender to Graham Construction to work on the extension of hard shoulder bus lanes along the M1 and M2 motorways, intended to improve journey times and service reliability for bus passengers without affecting general traffic flows. The scheme was designed by DfI consultants Aecom, who also carried out site supervision and project manager roles during construction. The work included the provision of new and upgraded Pan Tilt Zoom IP-based CCTV cameras for traffic monitoring purposes by the Traffic Information and Control Center (TICC) in Belfast. Hikvision PTZ IP video camerasGraham used Hikvision PTZ IP video cameras – installed by Chubb – for traffic monitoring Graham used Hikvision PTZ IP video cameras – installed by Chubb – for traffic monitoring. But connecting them to the Pelco system in use at TICC was not as straightforward as it at first seemed, which is where AMG Systems and Juniper Networks came in. “On each of the two motorways, the existing fiber network had only two spare fibres, so all the images had to be combined onto the two, allowing for a resilient ring,” consultant Jo Hopkins of Highways Consulting says, “meaning that if one fiber broke, the other would be able to transmit all the images. The existing cameras on the network were analog, but we took the opportunity to install digital cameras. This reduces the number of times the images are sampled and converted from analog to digital and back again, which improves the quality of the image.” Connecting IP cameras to Fiber Network Hopkins worked with Graham on the project, and said AMG was asked to provide a reliable, cost-effective means of connecting new cameras onto the existing fiber network, bringing the images back to the Traffic Control Center in Belfast. “The task itself was straightforward, but the integration into an existing live system made the project more complex,” she said. Hopkins and AMG Systems Business Development Director Sara Fisher worked to address the network challenge, which included upgrading from analog to IP cameras for the first time on the Belfast motorways. AMG switches The network design utilizes nine AMG switches on the M1 fibres and 15 switches for the M2 The network design utilizes nine AMG switches on the M1 fibers and 15 switches for the M2. At the TICC control room, there are a further four AMG switches which allow the IP cameras to connect to the existing Pelco monitoring equipment. Fisher explains that the control room network connection was further complicated as the TICC’s existing system called for the use of multi-casting and VLANs, and an existing firewall also had to be factored in. “The most appropriate interface in this case was Layer 3 POE switches from our partner Juniper Networks,” she said. IP video surveillance A DfI TICC representative said: “The joint network design by AMG and Juniper Networks has met the challenge presented to them in upgrading our hard shoulder bus lane cameras from purely analog to IP and has provided a resilient network, intended specifically for the task. AMG’s post-sales service and advice has also proved extremely helpful.”
Ports of Jersey operate the island’s busy harbors and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harboring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbor Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbor. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totaling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doorsTo drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
Neath Port Talbot residents have been given a road safety boost in the form of a new Mobile Enforcement Vehicle (MEV). It has been supplied by Videalert, one of the UK’s leading suppliers of intelligent traffic enforcement, video surveillance and management solutions, which was awarded the contract after due procurement process. Mobile Eforcement Vehicle “Indiscriminate and dangerous parking around Neath Port Talbot will no longer be tolerated,” said Councillor Rob Jones, Leader of Neath Port Talbot County Borough Council. “The newly purchased mobile enforcement vehicle seeks to challenge those drivers who choose to park on school keep clear markings, within clearly defined bus stops and on pedestrian crossings with no thought for the safety of others. It is hoped that this MEV vehicle will help to further ensure greater safety and protection for pedestrians and other road users as we progress through 2019.” It is hoped that this MEV vehicle will help to further ensure greater safety and protection for pedestrians" As part of an ongoing campaign, the council’s road safety team carried out a county-wide School Gate Parking campaign in partnership with South Wales Police and the Mid and West Wales Fire and Rescue Service. This included banners to be displayed outside all schools to raise awareness as well as delivering education to all pupils - encouraging them to be a positive influence on their guardians taking them to and from school. However, it was determined that enforcement for persistent drivers was the most effective way to tackle this growing road safety menace. ANPR And Digital Video Platform The Mobile Enforcement Vehicle (MEV) comes equipped with two roof-mounted high-tech ANPR cameras and two colour cameras to capture contextual video evidence of vehicles whose drivers have chosen to contravene traffic orders across the County’s territories. The on-board systems are controlled by one of the Council’s Civil Enforcement Officers using a dashboard-mounted touchscreen. All contravention evidence data is transferred to Videalert’s Digital Video Platform in the parking office at the end of each shift. The Videalert system automates the construction of video evidence packs which are reviewed by trained council operatives prior to sending confirmed offences to the back-office processing system for the issuance of penalty charge notices to the registered keepers of vehicles. Road And Residential Safety The winning entry of ‘iPatrol’ was submitted by a pupil at Gnoll Primary School In order to promote the safety messages to younger residents, the Council’s Road Safety Team also engaged with all Primary School pupils in a competition to name the vehicle. The winning entry of ‘iPatrol’ was submitted by a pupil at Gnoll Primary School who was presented with a Chromebook, sponsored by Videalert, by Neath Port Talbot Council Mayor Cllr Dennis Keogh at the Mayor’s Parlour in Port Talbot on Thursday, January 24th. According to Tim Daniels, Sales and Marketing Director at Videalert: “This new generation of multi-purpose mobile enforcement vehicles (MEVs) gives Councils greater flexibility in the way that they can deal with a wide range of moving traffic and parking contraventions.”
Bath and North East Somerset Council (B&NES Council) is extending its Videalert CCTV enforcement platform with the installation of additional cameras for its approved class C clean air zone (CAZ) that gives exemptions to private cars but charges higher polluting buses, coaches, HGVs, LGVs/vans, private hire vehicles and taxis. Videalert was awarded the contract to ensure full and seamless integration with the council’s existing hosted digital video platform which is already being used to enforce a wide range of restrictions including bus lanes, bus gates and permit parking. Videalert CCTV Enforcement Platform B&NES Council was one of 28 councils directed by the government to prepare an action plan to urgently reduce high levels of nitrogen dioxide (caused by vehicle emissions) to within EU and national limits by 2021 at the latest. The authority had originally proposed a Class D CAZ, charging all higher emission vehicles, including cars, to drive in the city center. However, following further ongoing technical work and a public consultation in December - which garnered an unprecedented 8,421 responses - a class C option with additional traffic management, was agreed. According to Chris Major, group manager for Transport and Parking at B&NES Council: “The new charging class C CAZ will achieve compliance by 2021 apart from a single exceedance caused by localised traffic issues. We believe this will be resolved by installing traffic signals at two junctions.” HD ANPR Cameras Videalert will be installing HD ANPR cameras to enforce the new CAZ scheme at key road junctions across the designated boundary Videalert will be installing HD ANPR cameras to enforce the new CAZ scheme at key road junctions across the designated boundary. The hosted Videalert platform will automate the management and enforcement of this new zone, providing real-time identification including vehicle make, model, color and euro standard rating for pre-filtering and updating the whitelist of compliant vehicles held at the edge to minimize transmission costs. Information on non-compliant vehicles will then interface with the UK government’s new national clean air zone database for vehicle validation and payment. The system will also provide detailed analytics and impact analysis highlighting the reduction in non-compliant vehicles entering the zone over time. Support Multiple Applications Tim Daniels, Sales and Marketing Director at Videalert, added: “The award of this high-profile contract confirms Videalert’s ability to handle the evolving requirements of clean air and low emission zones. It also demonstrates how a single video data platform can support multiple applications, enabling councils to address the challenges of improving traffic congestion and air quality simultaneously.” The CAZ should commence operation at the end of 2020. The daily charge will be £9 for non-compliant taxis, private hire vehicles and light goods vehicles (the minimum standard being euro 6 for diesel and Euro 4 for petrol), and £100 for buses, coaches and HGVs (the minimum standard being euro 6).
Apstec Systems announces that its Human Security Radar (HSR), the first fully automatic real-time mass people screening solution, has been selected by Esenboga Airport, Ankara, to significantly boost security in land side areas. Chosen following a rigorous selection process, including a pilot installation, HSR will be installed at the terminal entrances as part of ongoing security enhancement measures by the Turkish State Airports Authority. It will enable people screening without slowing down the flow of traffic, with each system capable of scanning up to 10,000 individuals per hour. The technology was deployed in partnership with local distributer AKBA. Cost-Effective Solution The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism. Since these events there has been global interest in securing the land side of airports, but traditional aviation style security checkpoints or manual searches, which scan one individual at a time, are not suited to purpose and result in large queues of passengers, which are vulnerable to attack in their own right. With existing approaches to security screening providing impractical, inconvenient and expensive to operate, terminals have remained susceptible to attack, or are subject to intrusive and disruptive security screening regimes. HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in such high footfall scenarios. Enhanced Security Measures The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. The walkthrough system uniquely combines unparalleled high throughput, speed and accuracy, simultaneously screening multiple subjects in real-time for threats, without the need for an operator to inspect suspect materials. With 40,000 passengers traveling through Esenboga Airport every day, the deployment of HSR will be instrumental in improving security for millions of people. Through deploying HSR as part of its commitment to terminal safety and enhanced security measures" “HSR constitutes a major breakthrough in the way airports protect the land side of terminals,” commented Osman Aksoy & Sirzat Balin,Co-Founders, AKBA. “Through deploying HSR as part of its commitment to terminal safety and enhanced security measures, the Turkish Airport Authority has taken a major step to prevent the reoccurrence of terrorist attacks.” Mass Transport Hubs Esenboga Airport’s uptake of HSR is the latest major deployment of the technology, which is currently utilised by some of the world’s largest airports, as well as sports stadiums, entertainment venues, mass transport hubs and networks, places of worship, hotels and high-end retail and entertainment centres. “HSR is proven to dramatically improve safety in crowded public spaces, and enables venue owners to close a critical security capability gap,” added Gregory Labzovsky, CEO, Apstec. “We’re therefore delighted to be working with Esenboga Airport to enhance safety for millions of travellers. AKBA, our distributor in Turkey, were instrumental in helping the Turkish Authorities understand the potential of HSR.”
Stadshavens Medemblik operates five busy ports in the Netherlands – at Pekelharinghaven, Voorhaven, Middenhaven, Westerhaven and Overlekerkanaal – and it also has two bridges under its control, as well as the thriving Westerhaven lock. The company has grown by around 30% each year since 2015 and the efficient, friendly welcome provided by the operations team is an important factor in this success. Under the leadership of Wijnand Baerken, Stadshavens Medemblik wanted to plan for further growth and it identified improved video surveillance capability as a key requirement. Van der Laan was confident in recommending IDIS IP video technology, which is flexible and robust enough for all conditions, and which would allow the old analog infrastructure to be adapted. Multi-Standard Infrastructure Without the need for extended cabling or civil works and associated planning permission the installation was quick and efficient A complete observation plan was drawn up, with Van der Laan and IDIS collaborating closely, identifying the best locations for cameras based on viewing angles, lighting conditions and the control features required. Much of the existing cabling has been retained, thanks to the IDIS Center multi-standard infrastructure, and the system has been extended to new areas with both wireless and fibre links. Without the need for extended cabling or civil works and associated planning permission the installation was quick and efficient. The old analog video system already installed at Stadshavens Medemblik was outdated, with the cameras no longer able to cope with the challenging waterside environment. In poor-visibility conditions - including rain, fog, and glare - images were unusable. The system was also inflexible, making it hard to adjust or add cameras. Enabling Greater Efficiency Another major challenge was to improve observation of water and road traffic at Medemblik, with a bridge located above the lock preventing a direct view from the port office. To tackle these problems, the trusted technology systems provider Van der Laan was asked to design and install a solution using the best available technology. The new solution is not just preventing crime but enabling greater efficiency and control across all the port’s operations Cameras including award-winning IDIS PTZs have been placed at all strategic locations, on the bridges, the lock, the ports and importantly at the entrance from the IJsselmeer. All integrated and controlled through intuitive IDIS Center video management software, the new solution is not just preventing crime but enabling greater efficiency and control across all the port’s operations. Competitive Systems "From the harbor office operators utilising IDIS surveillance can immediately ascertain the size of boats as they enter the port, check where there is mooring place and send the skippers directly to the right location. The IDIS mobile app is proving particularly convenient as it allows us to see exactly what’s happening day and night and enable the operations team to offer immediate assistance if needed." Stadshavens Medemblik, Wijnand Baerken, Director. "The IDIS platform is perfect for combining various IP and analog systems. Moreover, it is more secure than competitive systems. IDIS systems use proprietary protocols and the way in which data is processed makes them very difficult to hack." Van der Laan Techniek. Dennis Selbach, Account Manager. Looking to the future, plans are being developed to enlarge the port significantly, and Van der Laan and IDIS look certain to be involved.
Round table discussion
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?