Security monitoring system
Current UK Managing Director Andy Madge will retire, effective 1 July 2024, handing over responsibility for the UK and Ireland subsidiary to Mike Garrod. Mike Garrod, with extensive experience in the aerospace and defence sectors, joined Frequentis UK on 13 May to begin a phased handover to close Andy’s seven successful years as Managing Director of the UK and Ireland subsidiary. Frequentis UK Frequentis UK operates across all five Frequentis business segments, including civil and...
Sonatype, the software supply chain optimisation company, announced an integration with ServiceNow, the AI platform for business transformation, to incorporate Sonatype Lifecycle software composition analysis and open-source vulnerability scans directly into existing workflows. This accelerates the response to application vulnerabilities, particularly in open-source software components, enhancing security measures and remediation efforts across enterprise environments. Unified vulnerability ma...
Databarracks, the technology and business resilience specialist has acquired Glasgow-based PlanB Consulting to enhance its Operational Resilience and Cyber Continuity consulting practice. PlanB Consulting Chris Butler, Resilience Director, Databarracks commented, “We are thrilled to have PlanB join us. PlanB has been a powerhouse in Business Continuity and Resilience for almost two decades. They’re widely known, highly respected, and one of the true thought pioneers in our ind...
Check Point® Software Technologies Ltd., an AI-powered, cloud-delivered cyber security platform provider, has published its Global Threat Index for April 2024. Androxgh0st and LockBit3 attacks In April 2024, researchers revealed a significant increase in the use of Androxgh0st attacks, with the malware being used as a tool for stealing sensitive information using botnets. Meanwhile, LockBit3 remained the most prevalent ransomware group in April, despite a 55% drop in its rate...
ISS (Intelligent Security Systems), a renowned global provider of video intelligence and data awareness solutions, was named one of the small group of winners of this year’s “E-Awards” by the U.S. Department of Commerce. Originally created by President John F. Kennedy via executive order in 1961 as part of an effort to honour America’s pioneering exporters, the “E-Award” (“E-for-Export”) is the highest recognition an individual or entity can rece...
Over three in ten US-based critical infrastructure organisations (36%) that have fallen victim to a ransomware attack have risked legal repercussions by paying a ransom. The findings are in new research by pioneering cybersecurity services firm Bridewell, surveying 519 staff responsible for cybersecurity at US critical infrastructure organisations in sectors such as civil aviation, telecommunications, energy, transport, media, financial services and water supply. Infringing UK and US laws 66%...
News
IDEMIA Secure Transactions (IST), a division of IDEMIA Group, is a provider of payment and connectivity solutions for financial institutions, mobile network operators, and automotive manufacturers. Bamboo TAP Card By introducing the Bamboo TAP Card, IST is setting a new standard for environmental responsibility in urban mobility. The TAP team at L.A. Metro became the first player to symbolically deploy these cards which were sold at the Los Angeles Times Festival of Books on April 20 and 21, and distributed throughout the Metro bus and rail system on April 22 2024. Eco-conscious alternative This launch reflects IST’s broader mission to support its clients in their transition, moving towards sustainable practices Crafted from FSC™-certified bamboo, an exemplary sustainable resource, the Bamboo TAP Card offers an eco-conscious alternative to traditional transit fare cards. Its distinctive texture and its natural origin not only enhance the user experience but also symbolise the user’s commitment to protecting the environment. This launch reflects IST’s broader mission to support its clients in their transition, moving towards sustainable practices and reducing reliance on non-renewable resources. IST innovates to find ways of reducing the impact of its products, for example by offering cards made from recycled and recyclable plastic. Reducing plastic usage The collaboration between IST and TAP comes at a crucial time when global initiatives are focused on reducing plastic usage. Earth Day 2024, with its theme of combating plastic pollution, presented the perfect backdrop for this launch, emphasising a shared dedication to environmental stewardship. Seamless and secure transactions Bamboo TAP Card, like all IST’s technologies, ensures seamless and secure transactions while redefining the standards The Bamboo TAP Card, like all IST’s technologies, ensures seamless and secure transactions while redefining the standards of eco-consciousness in the urban mobility sector. The bamboo is certified by the Forestry Stewardship Council™ (FSC™), assuring no deforestation, the protection of plant and animal species, fair wages and a safe work environment for the workers, and the respect of the local communities. A sustainable solution "At IDEMIA Secure Transactions, we are driven by the conviction that our technological innovations can foster a more sustainable and inclusive world," said David MITEL, Urban Mobility Business Line Director at IDEMIA Secure Transactions. "The introduction of the Bamboo TAP Card is a testament to this belief, offering a tangible solution that aligns with the environmental values of our clients. All our teams are dedicated to finding solutions to contribute to the transition towards a more sustainable future."
OSI Systems, Inc. announced that its Security division received an order from an international customer for approximately $9 million to provide the Company’s Eagle® M60 high-energy mobile cargo and vehicle inspection systems including related service and support. Multi-year framework agreement This order represents the initial fulfillment under a multi-year framework agreement between the company and the customer, setting the stage for future supply of additional solutions. OSI Systems’ Chairman and CEO, Deepak Chopra, commented, "We are proud to receive this award to deploy one of our major cargo and vehicle inspection systems. We are committed to helping our customers in their efforts to enhance border checkpoint safety and security."
In an exciting development for professionals in the electrical, HVAC, and industrial sectors, Extech has just announced the launch of its new series of measurement tools. This latest offering includes the advanced EX-series of multimetres and clamp metres, the innovative IAQ320 air quality monitor, and the versatile BR450W borescopes. These tools are engineered to offer exceptional value without compromising on the critical aspect of safety. Extech's latest innovations EX-Series Multimetres and Clamp Metres: The newly released EX-series are not just tools; they are guardians in the toolkit. Designed with integrated safety features, these devices ensure accurate diagnostics while protecting engineers from potential electrical hazards. Their cutting-edge technology simplifies complex measurements and enhances the reliability of every reading, making them indispensable for professionals. CTA: Discover the EX-Series Now. IAQ320 Air Quality Monitor: The IAQ320 stands out as a beacon of health within indoor environments, monitoring air quality with precision and reliability. It's particularly crucial in spaces where air quality directly impacts health and safety regulations. With real-time data tracking and easy-to-understand metrics, this monitor is a must-have for maintaining safe, compliant, and healthy working conditions. CTA: Learn More About the IAQ320. BR450W Wireless Video Borescopes: When it comes to internal inspections, the BR450W wireless video borescopes offer unmatched clarity and accessibility. These devices provide high-resolution images of hard-to-reach places, facilitating non-invasive diagnostics that help avoid costly disassembly and potential damages. Ideal for applications ranging from automotive to aerospace, these borescopes ensure that no fault goes undetected. CTA: Explore BR450W Features. Why add Extech’s latest tools to the toolkit? Unmatched Value: Extech's commitment to providing high-quality, durable, and reliable tools at competitive prices remains steadfast. The new tools are designed to deliver top performance while being economically viable, offering the best bang for the buck in the market. Enhanced Safety: Safety is paramount in any professional setting, and Extech has gone the extra mile to integrate advanced safety features into its new tools. These enhancements not only protect the engineers but also ensure the longevity and accuracy of the tools themselves, which is essential for conducting safe and effective operations. Ease of Use: With intuitive interfaces and user-friendly designs, these tools reduce the complexity of tasks, allowing professionals to focus more on getting the job done right and less on tool handling. Enhancing the professional capabilities with Extech's latest tools Whether they're a seasoned electrician, a dedicated HVAC technician, or an industrial professional, Extech offers a wide array of measurement instruments tailored to various professional needs. Discover the full range of Extech products and learn how they can support daily tasks and contribute to a safer, more effective workspace by visiting Extech's official website.
Money Carer, a UK-based national social enterprise focused on providing secure money management services for vulnerable people, has partnered with global card manufacturer Tag Systems and biometrics company Fingerprint Cards AB (Fingerprints™). The companies have created and launched a biometric-enabled ‘carer card’, addressing barriers that have traditionally restricted vulnerable people in the UK from accessing financial services. Carer card In 2010, Money Carer invented and launched the first ‘carer card’, a secure shopping card solution that enables carers to make purchases for those they care for. The card system has since evolved, offering balance limits, a sweep system, free ATM withdrawals, and spending controls. The Money Carer Card supports hundreds of care providers and thousands of individual carers across the UK and is also used by many local authorities and law firms who are responsible for managing the finances of their vulnerable clients. PIN for authentication Vulnerable cardholders, or their carers, no longer need to remember and enter a PIN Before incorporating Fingerprints’ technology, the Money Carer Card relied on the PIN as a means of authentication. Vulnerable cardholders, or their carers, no longer need to remember and enter a PIN to make a payment. They simply place their selected thumb or finger on the sensor and tap to make the payment at the point of sale. This simultaneously simplifies the checkout process while enhancing security. Inclusivity and autonomy Sean Tyrer, CEO of Money Carer, comments, “At Money Carer, we are committed to promoting inclusivity and autonomy." "For many of our clients, especially those with memory or visual impairments, the PIN on a payment card is a barrier that restricts financial inclusivity. With biometrics, our clients will never have to remember or input a PIN again, opening doors to financial autonomy that were previously closed.” T-Shape® (T2) sensor module BCaaS allows Money Carer to issue the next generation of cards seamlessly The next-generation carer cards come from Tag Systems, which incorporate Fingerprints’ second-generation T-Shape® (T2) sensor module, software platform, and algorithm. Tag’s unique Biometric Card as a Service (BCaaS) offering which includes payment processing, allows Money Carer to issue the next generation of cards seamlessly. The cards will be available soon through the Money Carer website and app. For each account with Money Carer, up to five biometrics-enabled cards can be issued. Simple authentication Adam Philpott, CEO of Fingerprints, comments, “Our primary objective at Fingerprints has always been to make strong authentication simple." "We’re extremely proud to be part of a project directly addressing barriers that have traditionally restricted vulnerable people from accessing financial services. This is a perfect example of how technology can be used to drive inclusivity.”
Sepura recently announced that it has been awarded the contract to supply the Department of Health and Social Care via the NHS Ambulance Radio Programme, its next generation of hand-portable mission-critical communications devices for frontline ambulance staff across England. The contract will enable 11 English NHS Ambulance Trusts to benefit from the very latest broadband technology, which addresses the need for optimum performance across the testing environments and working practices of ambulance staff including front-line clinicians. SCL3 device This agreement includes the delivery of over 16,500 new SCL3 broadband hand-portable devices together with a full eco-system of accessories and a full Mobile Device Management (MDM) service, which provides over-the-air device management and software provisioning for both LTE and TETRA services that is fully controlled by the customer. Created with mission-critical users in mind, the SCL3 device has the flexibility to be deployed as LTE only or as a hybrid TETRA and 4G/5G, providing a powerful device to enable the migration to mission-critical broadband communication. Airwave TETRA network SCL3 is the link to future MCX utilising its optional TETRA module to provide a migration path Supporting the best of both worlds, the SCL3 is the link to future Mission Critical Communications (MCX) utilising its optional TETRA module to provide a migration path from existing TETRA communications to MCX services. In the field of NHS Ambulance Trusts, the SCL3 will maintain communications on the existing Airwave TETRA network, as well as encompass the benefits of broadband data and a migration path to ESN. Physical characteristics The physical characteristics of the device support frontline operation in all environments, which include wet conditions, shifting temperatures, and humidity. A long lifecycle, with continuing support for device hardware and software, is also an essential part of the SCL3 value proposition. Flexible user design Duncan Bray, Director of NHS Ambulance Radio Programme, comments, "ARP has selected Sepura for this significant contract because they displayed a strong understanding of the needs of the Ambulance users and a flexible user design backed up with a pedigree in producing robust mission-critical devices." Steve Barber, Chief Executive Officer, Sepura, comments, "Sepura is proud to continue to support the NHS Ambulance Radio Programme with the best products in the market, yet again demonstrating our market leadership in the supply of critical communications devices and solutions worldwide."
Eurotech, a renowned provider of edge computing systems and a pioneer in the field of Industrial Internet of Things (IIoT) and Edge AI, proudly announces its inclusion in the 2024 Gartner Magic Quadrant for Global Industrial IoT Platforms. This recognition marks the fifth consecutive time Eurotech has been listed, underscoring its consistent excellence and innovation in the IIoT space. Importance of IIoT platforms The Gartner report, highly regarded across industries for its in-depth analysis and impartiality, highlights the increasing importance of IIoT platforms in enterprise environments, noting, "Global IIoT platforms are becoming the enterprise industrial data aggregator with advanced analytics capabilities to enable industrial data integration." The report adds, "CIOs and software pioneers implementing IIoT platforms to connect traditional OT software systems with IT solutions will learn about which vendors do this best." Robust IoT solutions Eurotech is one of the 18 companies recognised in this prestigious research document, a testament Eurotech is one of the 18 companies recognised in this prestigious research document, a testament to the strength of its robust IoT solutions. Paul Chawla, CEO of Eurotech, remarked on the company's consistent recognition, "Being recognised once again by Gartner not only confirms Eurotech's position as a frontrunner in Edge AI and IoT solutions but also highlights our ongoing commitment to addressing the evolving needs of our customers. This achievement is a testament to the hard work and dedication of our entire team." Edge AIoT hardware, software, and services Robert Andres, Eurotech's Chief Strategy Officer, also reflected on this achievement, "We highly value our sustained presence in the Gartner Magic Quadrant for Global IIoT Platforms." Robert Andres adds, "This acknowledgment motivates us to continue our mission of providing robust, secure, and open Edge AIoT hardware, software, and services, driving us to further innovate and excel in our field." Reliable standard Being listed in the Gartner Magic Quadrant is a crucial benchmark for customers and partners, providing a reliable standard in the selection process of technology providers. Eurotech's presence in this report assures stakeholders of the high quality and reliability of its offerings, enhancing the company's reputation and trust within the market.
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
In a groundbreaking initiative to bolster security measures, Indian Railways has successfully implemented Herta's state-of-the-art facial recognition solutions across its extensive network of train stations in the Eastern region. This transformative project marks a significant step towards ensuring the safety and well-being of passengers and staff throughout the railway system. The project becomes the largest one in the world in the transport sector. Herta has also been awarded two more regions that will be implemented after the Eastern one. Facial recognition technology The deployment of Herta's cutting-edge facial recognition technology is part of IndianRailways' commitment to embracing advanced solutions for enhancing security. By leveraging Herta's expertise, the railway network aims to create a safer environment for passengers, mitigate potential security threats, and streamline operational efficiency. Key features Key features of Herta's facial recognition solutions implemented at 230 train stations using thousands of video surveillance cameras include: Real-time Identification: Herta's technology provides real-time facial identification capabilities, allowing for swift and accurate recognition of individuals within the train station premises. Enhanced Security: The implementation of facial recognition enhances security by automatically identifying and alerting authorities about the presence of individuals with potential security concerns, contributing to the overall safety of passengers and staff. Efficient Monitoring: Herta's system enables efficient monitoring of the train stations, offering a proactive approach to security management. The technology assists in the quick response to incidents and ensures a rapid resolution of security issues. User-Friendly Interface: The intuitive user interface of Herta's solutions facilitates easy integration with existing security systems, providing a seamless experience for railway personnel responsible for monitoring and managing security. Stringent security requirements Mr. Rahat Jain, IDIS INDIA - MD, expressed his enthusiasm about the successful implementation, stating, "We are delighted to announce the successful integration of Herta's facial recognition solutions at Indian Railways." Startologic, the official partner overseeing the deployment of Herta's facial recognition solutions at Indian Railways, is proud to be part of this transformative project. The successful implementation showcases the capability of Herta's technology to meet the stringent security requirements of one of the world's largest railway networks.
HID, the worldwide pioneer in trusted identity solutions, announces that Royal Jersey Laundry has introduced a new tracking feature of HID’s linen management platform at each of its 5-star hotel customer sites to guarantee that drivers drop off and collect precise linen stock and that costly errors are avoided. Linen tracking This new feature replaces a paper-based system used by drivers for the management of cages filled with clean/soiled linen delivered/collected at customer sites. It provides detailed end-to-end tracking of linen cages across multiple customer locations throughout the whole cycle of washing, packing, delivery, and collection, a complex process given that 550,000 pieces are laundered each week for numerous clients. Royal Jersey Laundry Royal Jersey Laundry works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah Founded in 1915, Royal Jersey Laundry is one of the few cleaners servicing the luxury hotel sector. Based in a 25,000 square-foot purpose-built facility in Dagenham, rebuilt in 2021 for £15 million after a fire, it works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah, The Peninsula London, and The Ritz. Need for constant communication Supporting the five-star segment is demanding given the constant communication required between the hotel and laundry, exacting standards, and the quantity and range of items to be laundered. This includes duvets, sheets, towels, and bath robes along with smaller items such as foot mats, drink coasters, shaving towels, and dry cleaning for guests themselves. Royal Jersey Laundry operates 24/7, employs 150 staff members, and washes 40 tons of linen per day. Maintaining laundering schedule Five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a schedule In contrast with budget and mid-level hotels, five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a rigorous laundering schedule and ensure guests always receive fresh, cleaned linens. “An average 300-bed hotel will have around 30,000 items of linen which will cost around £250,000,” says James Lincoln, Royal Jersey Laundry’s managing director. “The volume of linen is so high and it’s always moving such that accurate inventory control was a major challenge verging on the impossible.” HID cloud-based RFID linen management system Before the HID cloud-based RFID linen management system, everything was done manually. Laundry staff would check items off ironing/folding machines, a wholly error-prone process, and log the quantities on pieces of paper. The operational overhead for the laundry was exacerbated as the various linen items from the different hotels had to be kept separate, too. “Linen is everywhere: on beds, in cupboards, in transit, and at the laundry, yet no one had full insight into stock levels and, when things went missing which often happened, typically we’d get blamed,” says Lincoln. Real-time linen inventory management LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process To address these problems, Royal Jersey Laundry installed a real-time linen inventory management system from HID combining LinTRAK® RFID tags, a full set of RFID equipment including table-top and conveyor-belt scanners, one RFID portal and one cabin scanning unit, and cloud-based Acuity software. The discrete LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process. Some hotels also use LinTRAK tags to manage staff uniforms and restaurant linens such as napkins and tablecloths. HID LinTRAK textile tags Around 40% of Royal Jersey Laundry hotel customers have transitioned to the HID linen management solution and connect via Acuity’s web portal. Once cleaned, the linen is packed into cages, and scanned in seconds through HID’s RFID cabin station. Items are automatically counted, with delivery notes generated including billing information. HID’s Acuity software integrates with the laundry’s Sage accounting software to generate invoices. Benefits of textile tags The implementation of HID LinTRAK textile tags, RFID stations, and the Acuity software platform has radically changed how Royal Jersey Laundry operates, delivering a range of benefits: Fast Return on Investment: Since the installation of the HID equipment in 2019, the system has already paid for itself given the efficiency and productivity gains. Better use of people resources: Laundry and housekeeping staff no longer waste time on dull and resource-intensive activities like manually counting linen. They have been redeployed to more productive work, generating 10-20% savings in labor costs. Better visibility of stock levels: As hotels know exactly the location and quantity of linen, they are better able to cater to peak demand, reducing linen expenditures by up to 30%. Improved responsiveness and customer satisfaction: Access to in-depth data generated by the Acuity platform means the laundry can quickly answer customer queries. “We give hotels complete transparency about where their linen is in the cleaning and delivery cycle. There are just no grey areas anymore,” says Lincoln. Increased security of expensive linen assets: While theft of linen at five-star hotels is rare, it does happen. RFID tagging enables better monitoring of expensive bedding and towel investments. Enhanced reliability and productivity: Operations are more efficient as RFID-enabled items can never be lost or misplaced. Furthermore, digital scanning results in faster processing of items. “We’re effectively two businesses: the laundry itself and a logistics operation. We run a mixed fleet of lorries and electric vans which nip in and out of London three times a day picking up and delivering garments for hotel customers using us for guest work,” adds Lincoln.
Riga Sports Arena is a municipal facility maintained by the city of Riga, Latvia. Covering a total area of 21,821 square metres, the arena accommodates 2,500 spectator seats. It houses several training halls, including a large athletics arena, a training and warm-up hall, a weightlifting hall, and a sports field. Challenge Enhance security by replacing inefficient guards with technical equipment Riga sports arena faced a significant security challenge, relying on two guards who worked only night shifts. Depending on just one person was insufficient to ensure the safety of the complex, given its substantial size. The guards struggled to effectively cover all areas, leaving the arena vulnerable to security risks. Moreover, the financial burden of employing guards strained the city’s budget. There was a need to enhance security while eliminating the human factor and optimising associated costs. Moreover, the financial burden of employing guards strained the city’s budget The client required a professional security system that could be implemented without extensive construction work or the need to lay a substantial number of cables throughout the building. They sought an effective and easily installable system that would enhance security without compromising the integrity of the facility. Solution Cost-effective wireless solution reinforcing security for a large municipal facility Considering the building’s size and recent reconstruction work, the installation of a traditional wired security solution was deemed impractical. This option would have required several months to complete and additional renovation work after installation. Moreover, the presence of many oversized windows, each requiring protection with detectors, made cable-based solutions even more impractical. GRIFS AG proposed an Ajax wireless solution that can be quickly installed without damaging the walls, allowing for complete control and management of the system through a mobile app. To streamline control without the need for multiple hubs, Hub 2 Plus Jeweller was selected In total, 115 devices were installed throughout the building to ensure comprehensive security coverage. To streamline control without the need for multiple hubs, Hub 2 Plus Jeweller was selected. This hub can control up to 200 devices, managing 25 security groups with a total of 200 users. This feature aligns with the client’s requirements, given the installation of many devices and the need to manage security modes for separate premises, all in the Ajax app. For example, it allows keeping employees’ offices in armed mode while conducting training sessions in the main hall. GRIFS AG installed DoorProtect Jeweller Given that the sports complex spans three floors and considering the need for the hub signal to pass through two reinforced concrete floors, the decision was made to enhance its communication range. To ensure stable communication between all 115 detectors and the hub, the ReX 2 Jeweller radio signal range extender was installed. This guarantees a reliable connection between all system components, ensuring seamless communication even in areas with challenging signal transmission conditions. For comprehensive security, GRIFS AG installed DoorProtect Jeweller opening detectors to oversee For comprehensive security coverage, GRIFS AG installed DoorProtect Jeweller opening detectors to oversee all doors. Additionally, MotionProtect Curtain Jeweller, with a narrow viewing angle and a maximum detection range of up to 15 metres, protects the large windows in corridors and sports halls. The challenge with large windows was that glass break detectors may be positioned far away from the hit spot, making it difficult to detect glass breakage. However, MotionProtect Curtain Jeweller, equipped with PIR sensors, instantly reacts to movement within its detection zone along the whole length of a window. Notably, the detector catches movement only if a person enters its field of view, allowing for protection even when a cleaner is working nearby, or a staff member is walking around. In addition, MotionProtect Jeweller detectors were installed throughout all entrance groups, major corridors, and stairwells to promptly notify the owner and the security company in case of any detected motion. Multiple HomeSiren Jeweller devices To facilitate arming and disarming of the security system for numerous employees in the sports complex, a wireless touch KeyPad Jeweller was installed. By entering a code, the device can activate the full security mode and automatically blocks itself if an incorrect code is entered multiple times. KeyPad Jeweller supports up to 99 codes, each corresponding to a separate user, making it suitable for enterprises with many employees. HomeSiren Jeweller devices were installed indoors throughout the skill to provide loud signs For rapid security response, the wireless alarm Button Jeweller was installed, enabling quick notification of the security company in case of intrusion. Furthermore, multiple HomeSiren Jeweller devices were installed indoors throughout the building to provide audible warnings in case of danger or deter potential intruders. These sirens emit loud sounds up to 105 dB to prominently signal a breach, effectively preventing unauthorised individuals and enhancing overall security. The arena management plans to automate evacuation doors using the Relay Jeweller system soon, enhancing safety and security by allowing remote door opening during emergencies. Why Ajax Cost-saving security solution. Customers can experience significant savings by opting for Ajax. The costs of the Ajax system installation were approximately equal to the expenses for security guards’ salaries per year. However, starting from the second year, the Municipality of Riga can achieve significant savings by paying only a low monthly fee for monitoring. Easily scalable future-proof system. With Ajax, the security system is easily scalable, allowing for future expansion and the implementation of additional functionality as needed. For instance, Hub 2 Plus Jeweller, already installed, supports the addition of up to 200 detectors, including MotionCam Jeweller detectors for photo verification of alarms, without requiring any system reorganisation. This enables seamless integration for enhanced security measures, ensuring the system can adapt and grow with changing security requirements and evolving customer needs. Effortless wireless installation. Ajax offers a wireless solution, eliminating the need to lay cables in walls or undergo extensive repairs. This allows for quick and efficient installation without the limitations of wired infrastructure. After implementing the Ajax security system at the sports arena, the center’s management noted its convenience and decided to install Ajax in their homes.
Amthal has worked with Hertfordshire Garden Centre to install additional IP CCTV across its retail site and upgrade existing systems, including its intruder alarm solution, for the safety and security of staff and visitors. Based in Redbourn on the outskirts of St Albans, Hertfordshire Garden Centre is a small, independent retail premises, serving as a cherished hub for home and gardening enthusiasts. IP CCTV, intruder alarm system Amthal has worked closely with the team to ensure a secure operation, most recently adding IP CCTV and an updated intruder alarm system. Enabling staff to work in a safe environment and visitors to explore, learn, and purchase with complete peace of mind. Graham Armstrong, Owner of Hertfordshire Garden Centre, said “Faced with the cost of living crisis and a corresponding surge in shoplifting, security of our site is a top priority. But it’s not solely the Police’s job to look after us, we have to take proactive responsibility for our staff and our visitors, without compromising our friendly and welcoming environment." Real-time management and security Amthal has recently added over 20 IP cameras and upgraded the existing visual verification systems Graham Armstrong adds, “We have worked in partnership with Amthal, a local company that fully understands the brief. The team has consistently delivered great service and has shown to be knowledgeable and helpful at all times. Installations and upgrade work programmes have occurred with minimal disruption to the daily operations of our retail site. It all comes together for our staff and visitors to know they are in a secure garden centre world.” Amthal has recently added over 20 IP cameras and upgraded the existing visual verification systems, allowing management and security to review activity throughout the premises in real time and empowering personnel to respond promptly to any potential incidents. A monitored intruder alarm solution The addition of a new monitored intruder alarm solution is geared to quickly detect any breach and provide advanced security against unauthorised access attempts. Jacki Adams, Installation Supervisor at Amthal Fire & Security, said “In the current climate, retail crime has hit record levels, increasing by more than a third over the past year alone. What Hertfordshire Garden Centre demonstrates is by taking a proactive approach to enhancing the security infrastructure on-site, they are doing all they can to protect teams and visitors." Comprehensive surveillance and monitoring Jacki Adams adds, “What it also shows is the importance of reviewing security regularly with the help of a trusted partner such as Amthal. We can identify the opportunities for extended CCTV coverage and upgrade systems in place to ensure comprehensive surveillance and monitoring capability. Here, the move reflects a commitment to creating a safe and secure haven for all home and gardening enthusiasts.”
A large-scale sporting event in Chile expects a huge influx of people during their games, prompting the implementation of robust security measures in the venues. The organisers require an efficient and intelligent security system that can manage the entry and exit of spectators, prevent accidents, and detect and handle any abnormal situations in time to ensure the safety of all people during the event. Sporting event challenges The event organisers needed to ensure the safety of the people attending the event, as well as the security of the athletes and staff on the field. The following are the main challenges they encountered: Difficult management: There are several competition venues, which require monitoring of both internal and surrounding areas. The monitoring scope is massive and manual monitoring is inefficient, making it difficult to detect abnormalities and handle them in time. Preventing intrusion and entry of dangerous goods: It is extremely challenging to manually monitor each person entering the venue. The security staff cannot efficiently conduct manual inspections to check people’s items all the time. Challenging security deployment: Security personnel are scattered at various locations on the site. In the event of an emergency, they will not be able to respond in time. Dahua's solution Dahua, together with its local partner, took on the challenge of providing an effective monitoring solution tailored to the sporting event. HD PTZ Cameras: By using HD PTZ cameras (e.g. 2MP 25x Starlight IR WizSense Network PTZ Camera), a wide range of high-definition real-time images are provided via a small number of monitoring points, covering public areas of various venues and significantly improving system deployment efficiency. Security inspection equipment and various intelligent algorithm applications: Walk-through metal detectors were deployed at entrance and exit areas to help prevent people carrying dangerous items from entering the venues. Several cameras (e.g. 4MP IR Vari-focal Vandal-proof Dome WizMind Network Camera) equipped with intelligent functions such as perimeter protection, preset points tour, etc. were also utilised to help detect intrusions and suspicious individuals in time. Intelligent recognition and alarms help security personnel to detect high-risk individuals and respond accordingly. Fully functional Command Centre: All devices are connected to the DSS platform, achieving unified management across multiple venues and facilitating coordination of security personnel across different locations. The Command Centre is equipped with highly efficient monitoring screens, control keyboards, and decoding boxes. Efficient and intelligent security system Dahua's solution utilises intelligent and efficient scene-based devices to achieve full video surveillance Dahua and its local partner successfully deployed an efficient and intelligent security system for such a large-scale sporting event. Dahua's solution utilises intelligent and efficient scene-based devices such as PTZ cameras and intelligent recognition cameras to achieve full video surveillance coverage, significantly enhancing system deployment efficiency. Control Centre With the aid of the Control Centre and intelligent algorithms, abnormalities were accurately detected and the manual workload of security personnel was greatly reduced. The application of security inspection equipment prevents the entry of dangerous items and ensures safety and security in the game venues. This solution is a notable example of such a scenario and can be applied in other large-scale sports events. Enhancing security and safety “It has been a great honour to be part of this grand sporting event,” says Jason Jin, Project Team Member, and Product Manager at Dahua Technology. "Moving forward, we will continue to develop intelligent products and solutions that can be applied in various types of events to enhance their security and safety, enabling a smarter society and better living."
CityFitness is one of the largest fitness gym chains in New Zealand. With almost 50 gyms across the country (average area: 5,000 square metres), each facility is open 24/7 and accommodates a huge number of people daily. A tailored automatic speedgate solution that is secure, reliable, and efficient is imperative to ensure quick access to their facilities and prevent unauthorised individuals from entering the gyms. Integration with a third-party platform CityFitness has an existing access control system from a third-party supplier. Integrating Dahua turnstiles with this system was not a simple task. Nevertheless, working together with a local partner installer, the local Dahua team was able to successfully integrate the Dahua turnstile gates with the existing third-party platform. Solution: Intelligent access control Dahua’s turnstile gates were successfully deployed in 10 gym facilities of CityFitness across the country. These swing turnstiles include DHI-ASGB610X-L (left side), Dahua DHI-ASGB620X-D (centre of dual lanes), and DHI-ASGB610X-R (right side). This solution provides an automatic access control management specifically tailored to City Fitness’ actual requirements for security, reliability, and efficiency. It is equipped with a built-in accurate people-counting function and infrared anti-tailgating sensors to prevent unauthorised access. Flexible integration It can be easily configured for single and multi-entry setups, making it suitable for a wide range of applications An alarm will sound if someone follows an entering person without swiping. It can be flexibly integrated with third-party platforms, with several access methods available such as RFID, facial recognition, and QR code scanning. Also, it can be easily configured for single and multi-entry setups, making it suitable for a wide range of applications. Results: Safe, reliable, and efficient access control This automatic speed gate solution developed by Dahua significantly transformed the access control management in CityFitness facilities, enabling quick access to their gyms while ensuring the safety of their members. The local Dahua team also provides unwavering service and support that significantly contributed to the overall success of the project. Anti-tailgating technology “CityFitness chose Dahua because their speed gate exceeded our expectations. It enhances our access control, and its anti-tailgating technology ensures a safe environment,” says Clint Paul, National Security Manager at CityFitness. "The integration options and configurability make it perfect for our needs."
Round table discussion
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how well do security integrators provide end users with what they need? We asked this week’s Expert Panel Roundtable: What are the biggest challenges that end users face when working with integrators?
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimises risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security?
Products
White papers
A step-by-step checklist for choosing an intercom system
DownloadSafeguard Students With New Techniques And Technology
DownloadHow to implement a physical security strategy with privacy in mind
Download5 ways to strengthen physical security with an integrated system
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadCreating a secure and positive healthcare experience
DownloadIntegrated access control: reap the benefits of connected security
DownloadConnected video technology for safe cities
Download10 step guide to staying ahead of emerging security threats
DownloadVideos
Security monitoring system: Manufacturers & Suppliers
- Dahua Technology Security monitoring system
- Vicon Security monitoring system
- Bolide Security monitoring system
- Hikvision Security monitoring system
- Seagate Security monitoring system
- BCDVideo Security monitoring system
- Pelco Security monitoring system
- LILIN Security monitoring system
- MobileView Security monitoring system
- AV Costar Security monitoring system
- Hanwha Vision Security monitoring system
- Vanderbilt Security monitoring system
- TESA Security monitoring system
- CEM Security monitoring system
- VIVOTEK Security monitoring system
- Sony Security monitoring system
- DSC Security monitoring system
- OPTEX Security monitoring system
- Parabit Security monitoring system
- Messoa Security monitoring system