Government & public services security applications
Roselle Catholic High School is a co-ed private high school founded 61 years ago in Roselle, New Jersey. Home to more than 400 students, Roselle Catholic is part of the Roman Catholic Archdiocese of Newark. In its community, Roselle Catholic is known for its core values promoting academic excellence, service, and tolerance. Like many high schools across the country, Roselle Catholic High School relied on outdated technology to communicate between the front office and classrooms. Outdated inter...
In a surveillance monitoring context, video metadata refers to the structured details that the user can extract from given video footage. It is data that provides information about other data – a “data about data” in short. Human-based video metadata, as its name suggests, are data derived from human targets in the monitored scene. It can be utilised based on user’s requirements to significantly enhance the management and operation of various application scenarios, while...
The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. Harba booking system There are 750 members with boats in the Vejle marina, and through the Harba booking system; they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into t...
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in...
Reiknistofa Bankanna (RB) is a provider of mission-critical IT systems for Icelandic financial institutions, responsible for the country’s central clearance and settlement system and several multi-tenant core banking solutions. It also operates an e-invoicing and e-payment system for corporates and consumers. It is jointly owned by the three main Icelandic banks, two saving banks, the Icelandic Savings Bank Association, and the three main payment card processors in Iceland. RB’s cli...
Traditional monitoring systems often face a myriad of challenges: excessive usage of white light just to capture colour images; ubiquitous background noise; complicated alarm accessories; and lack of integration with third-party alarm systems, just to name a few. In response to these issues, Dahua Technology, a world-leading video-centric smart IoT solution and service provider, has launched its upgraded Three-in-One Camera series – the TiOC 2.0. Aside from its Active Deterrence function,...
Scenario: One needs to install a camera in the lobby of a building to capture the entrance area. Problem: The area has a lot of windows which overexposes the image, making it difficult to capture the people coming in and out of the premises. Solution: A security camera with a good Wide Dynamic Range (WDR). What WDR does? Dynamic range refers to the ratio between the largest and smallest measurable quantities of something. In the case of video surveillance, the dynamic range measures the ratio between the lightest and darkest elements of the image. WDR technology is great for high contrast scenes, balancing the brightness and shaded areas simultaneously so an image neither appears blown out or too dark. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more Decibels (dB) are the value with which dynamic range is measured. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more. However, keep in mind that each manufacturer has its own method of determining a camera’s dB. Therefore, when comparing product datasheets, it is possible that a camera with a lower ratio outperforms a competitor with a higher dB ratio. How WDR works? Security cameras with WDR technology (e.g. Dahua HDCVI 6.0 PLUS) are using either Digital WDR (DWDR) or True WDR. True WDR uses image sensors and a Digital Signal Processor (DSP) to provide even illumination to all areas of an image. A True WDR-enabled video surveillance camera has sensors that take two scans of each video frame. The first, at low speed (to capture more light), shows the image in normal light conditions. The second scan is taken at high speed to capture less light overall and get an image with strong light in the background. The DSP combines the two scans to form a single, balanced, well-illuminated image. DWDR uses algorithms instead of sensors to digitally brighten too-dark areas and dim too-bright areas. DWDR relies on the DSP chip instead of the image sensor to provide WDR. It adjusts each individual pixel of the image and calculates exposure accordingly. This technique has some limitations: the intense manipulation of pixels leads to the overall image being grainier. On the other hand, DWDR doesn’t need costly image sensors, so DWDR can be a more economical option when WDR is a necessity. When one doesn’t have WDR? Backlight Compensation (BLC) brightens the image so one can see darker details better There are two options for improving the exposure of an image without using WDR. In a high-contrast scene with heavy, broad, backlighting, the camera will adjust to the average illumination, which will darken the image. If no WDR is available, Backlight Compensation (BLC) brightens the image so one can see darker details better. BLC is a legacy technique that uses DSPs to increase the level of exposure for the entire image. Rather than balancing brightness on overexposed and underexposed areas of an image like WDR does, it brightens the entire image. Highlight Compensation (HLC) is a technology where image sensors detect strong light within the image and reduce exposure on those areas to enhance the overall image quality. In a dimly lit scene with bright lighting caused by hot spots (e.g. headlights, street lights), the overall image may become too dark. If no WDR is available, use HLC. The camera automatically suppresses bright light sources, allowing proper exposure of adjacent areas. Conclusion Regardless of the dB value specified, image results will vary depending on the complexity and amount of movement in a scene. To determine the best camera for an application, it is always best to test that it meets the needs and expectations of the customer.
A time attendance system can help to keep a close eye on an employee’s working hours, prevent time theft by accurately tracking and recording employees’ time and attendance. A biometric time attendance system allows employees to clock in quickly and easier compare to the standard system and eliminate “buddy punching” in advance to the traditional time card system. A complete biometric time attendance system includes both hardware and software. Include the electronic divide that scans an employee’s fingerprint or iris and software that stores all the data about time and shifts. Hardware and software can be purchased separately, but it’s best to find a vendor that provides both of them as a complete package. Price of the biometric software Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500 Biometric time and attendance systems aren’t as expensive as one might think. Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500. Some companies' solution, which works for companies with up to 50 employees, retails for $995 to $1,300. The price includes one fingerprint scanner and software that tracks arrivals and departures, calculates hours for payroll, and tracks vacation time and sick days. Large corporations with many hundreds or thousands of employees should expect to spend at least $10,000 on a biometric time and attendance system. For a complex system serving thousands of employees and multiple locations, the cost could rise as high as $100,000. In addition to a basic software and hardware package, one may need to purchase additional features, services, or accessories. Additional biometric scanners begin at about $1,000 to $1,300 each. Training begins at about $300 to $500 for smaller businesses and can run thousands for larger companies. Accessories like scanner covers, which protect the equipment when it is not in use, begin at about $30 to $50 each. CrossChex Cloud CrossChex Cloud's features include face recognition attendance, temperature, and mask identification Because there are so many options, it helps to talk to vendors about the products they provide. Some will charge an upfront fee for a set number of traditional software licenses; others will charge a monthly fee for web-hosted software. Although the market and advanced technology decrease the price of time and attendance system, some small companies or workshops still can’t afford extra spend besides salaries. Anviz introduces a new solution for those business owners - CrossChex Cloud. One can set up a new account and get only one hardware connected to be a lifetime free subscriber of CrossChex Cloud. Start at $500 only, one can get hardware that is suitable for CrossChex Cloud with advanced features includes: face recognition attendance, temperature, and mask identification, and get records of almost everything one wants to take control of.
From asphalt to apps, Bosch has implemented a connected security solution for the Frechen truck stop near the A1 to protect people and freight from assaults. The modern parking area near Cologne now has around 40 parking spaces that meet the high-security standards of the Transported Asset Protection Association’s (TAPA) according to the Level 2 certificate and are therefore particularly secured. From now on, forwarding companies can book these via the Bosch Secure Truck Parking app. The fully connected solution ensures maximum security: more than 20 security cameras with intelligent video analytics by Bosch monitor the four-gated entrances and exits as well as the parking area. In addition, a pedestrian interlock ensures that only authorised persons can enter the area. The reason for this solution is a shortage of some 400.000 secured truck parking spaces in Europe. This has serious consequences for the safety of drivers, goods manufacturers, freight forwarders as well as other road users, as trucks often have to park in an unsafe manner contrary to traffic regulations. Secure truck parking "The truck parking shortage along German roads is, unfortunately, a daily occurrence. Everyone has seen the lines of unsafely parked trucks along the highways. The fact that thieves, in particular, take advantage of the precarious situation is felt by companies like us that transport goods throughout Europe," explains Rein de Vries, Senior Manager Security from Samsung SDS. In close coordination with Samsung SDS, Bosch has developed the solution that has now been implemented. "Secured truck parking lots, just like the one in Frechen, are important for our transport of goods. That's why we were happy to contribute with our know-how and experience to this project." A loss of 8.2 billion a year With AI-based video analytics, the security cameras immediately detect risks, unwanted movements and sound A recent study by TAPA illustrates the urgency of the situation: The organisation estimates the financial damage caused by stolen freight across Europe at around 8.2 billion euros annually. Alongside the United Kingdom, Germany is one of the countries most affected by cargo theft. Thieves usually take advantage of the situation at night, when the truck is parked unprotected and the driver is asleep. Consumer goods or car parts are among the most sought-after goods, as are jewelry, precious metals, or food products. Bundled know-how "On behalf of the site operator, we acted as general contractor to implement a certified complete solution for the Frechen truck stop that protects drivers and freight alike," explains Uwe B. Herrmann, project manager at Bosch Building Technologies. "The parking lot is now securely enclosed, gated, illuminated in a way that saves energy and equipped with intelligent technology." AI ensures safety and comfort With the help of AI-based video analytics, the security cameras immediately detect risks and unwanted movements and sound the alarm at the Bosch video control centre. Audio technology built-in video cameras allow control center staff to immediately contact people on the premises and notify security forces or police if necessary. Regular virtual guard tours round off the security concept. Booking parking spaces also work efficiently and digitally: Parking spaces can be booked via the Bosch Secure Truck Parking web portal or app. Truck drivers can pass through the barrier and drive onto the premises with digital license plate recognition.
Cyberint has launched the next-generation Digital Risk Protection platform, Argos Edge, a fully SaaS-based solution, to provide real-time responses to cyber threats coming from beyond the traditional security perimeters. All-in-one DRP platform Unlike other solutions, Cyberint's holistic and integrated approach combines external Attack Surface Monitoring (ASM), advanced threat intelligence, extensive phishing detection as well as social media and brand abuse monitoring. The different modules work together to infuse and enrich the Argos Edge platform, identifying and remediating weaknesses that other solutions cannot detect seamlessly and continuously. This unique capability makes Argos Edge the most comprehensive and effective all-in-one digital-risk-protection (DRP) platform on the market to date. Monitoring threat intelligence Argos Edge redefines the digital risk protection space by constantly collecting, analysing, and classifying threat intelligence from the widest variety of sources, tracking cybercriminals in the dark and deep web, criminal forums, market places, social media platforms, instant messaging, file sharing repositories and more. External Attack Surface Mapping Argos Edge reduces false positives by 99%, providing a combination of External Attack Surface Mapping Pin-pointed targeted alerts such as those provided by Argos Edge are known to reduce false positives by 99%, providing the optimum combination of External Attack Surface Mapping of Digital assets, including cloud assets and threat intelligence. Argos Edge focuses on generating proactive and targeted alerts allowing organisations to take immediate steps to mitigate those incoming threats which pose the greatest potential risk whilst also receiving up-to-date proactive information about global, regional, and vertical threats that may cause a potential breach. Alert integration Argos Edge includes one of the most extensive leaked credentials databases, which is comprised of: fusing breached databases, analysis of phishing kits, and highly effective InfoStealers malware's C&C, helping to reduce the risk from this most common attack vector. The leaked credentials database is also highly effective to B2C organisations helping to reduce account takeover of their customers. The new platform also enables users, via a state-of-the-art user interface, to immediately use the pin-pointed alerts as well as integrate them into SIEM, SOAR, and ticketing systems like IBM QRadar and Palo Alto's Cortex XSoar and others for swift dissemination and remediation. Forensic canvas Argos Edge's unique built-in investigation tool, Forensic Canvas can uncover the relationships between disparate data points, pivot on any IoC, and leverage the massive data lake that Cyberint collects 24/7 to build a quick and up-to-date picture of any threat. "Only by constant analysis of hundreds of millions of data points of threat intelligence and an ongoing monitoring of their external attack surface can organizations counter the threat actors' constantly evolving threat landscape," says Cyberint CEO Yochai Corem. Perimeter security features The Argos Edge platform protects companies from more than 75 different business risks lurking beyond the perimeter The Argos Edge platform also comprises numerous additional features that enable users to extend their security perimeters to include phishing, social media and fake application takedown support, external source code monitoring, and fraud detection capabilities. With this launch, organisations have the capabilities to protect themselves from more than seventy-five different business risks lurking beyond the perimeter, such as fraud, phishing, malware, data leakage, vulnerabilities, brand, social media risks, and more. Users now also have modular options allowing for full flexibility in licensing the platform. Cyber investigations Organisations can benefit from Cyberint's deep expertise in specialised services such as Virtual Humint, deep cyber investigations, and interaction with threat actors to identify possible weaknesses. "With Argos Edge, I have a level of assurance and trust that they are always there for me. The feeling that they always have my back is invaluable has given me the confidence that we have enough visibility and can be proactive in dealing with different cyberthreats," says Mark Frogoso, CISO at GCash.
Systems integrators who want to offer new and exciting services to their end-user customers can now deploy physical asset management location and tracking through the award-winning Connect ONE® cloud-hosted service. Designed for keys, laptops, tablets, electronics, and a wide array of other capital goods including equipment and tools, it’s easy to track assets to locations and users through the Connect ONE Asset Management Module. Asset management module Available as a standalone feature or combined with intrusion detection, access control, and video, the Asset Management Module presents a streamlined way to track equipment and goods to locations and/or users. Once an asset has been designated to a user, it automatically sends a customised authorisation template via email for the person to approve and sign. The completed form is converted to a pdf and recorded with their user account in Connect ONE for the archive. An asset that is not returned by the specified date will generate a notification to the user via email when overdue An asset that is not returned by the specified date will generate a notification to the assigned user via email when overdue. Asset tracking “While keys represent a common application, there are many other assets which can be tracked,” said Mike Simon, Managing Partner, Connected Technologies. “Users can eliminate time lost searching for equipment and other items, which are easily checked out and logged back seamlessly via the interface and tracked to their current location.” The Asset Management Module streamlines the return process with a template sign-off option generated to the user. Users can manage equipment in the field and track the asset for a quick check of their location. Assets are auto-populated into the Connect ONE interface from a CSV spreadsheet for a simple setup.
Heras, an end-to-end supplier of permanent and mobile perimeter protection solutions – has launched Saros, a new electro-mechanical traffic barrier. Reliable and affordable barrier Suitable for sites with controlled vehicle entry (such as commercial car parks and industrial site entrances), Saros is a best-in-class product that has been designed and developed by Heras to meet all market-led functionality and safety requirements and thus offers a highly functional, reliable, and affordable barrier option. Suitable for harsh conditions Saros can withstand harsh external conditions, making it especially suitable for coastal regions or prone to strong winds Saros can withstand harsh external conditions, making it especially suitable for areas such as coastal regions or other places that are prone to strong winds, as rigorous testing, analysis, and calculations have confirmed. The 4m model - even with the arm in a raised position - can withstand wind class 3, which is categorised as a violent storm with wind speeds more than 70mph. And, the 6m version can withstand wind class 2, which is categorised as a storm with wind speeds approaching 60mph. Fast and efficient barrier Saros is an electro-mechanical barrier with a fast and efficient operation, making it a great addition to the current offering of electro-hydraulic traffic barriers B411, B420, and 94x Series. This further adds to the portfolio of entrance control products manufactured and produced by Heras, which has its UK head office in Doncaster. Plug and play solution Heras Product Manager Jonathan Broughton said that the Saros traffic control system has demonstrable longevity, operating reliably over long periods, meaning there is no limitation to the number of operations it can perform. This makes it an ideal barrier for busy locations. Also complying with the latest safety standards, the barrier can provide a plug-and-play solution that is safe, robust, and reliable. Integrated systems “Saros is a unique product to Heras and was developed after extensive research, investigation, design, development, and testing. The product came alive because of the work of Heras’ own Product and Development department.” The introduction of Saros further strengthens the company’s product offering across its five core areas of expertise: demarcation products, entrance control products, detection products, integrated systems, and service and maintenance. Perimeter protection solutions Heras is constantly innovating – both in terms of its existing product ranges and also bringing new developments to market to provide a holistic portfolio of perimeter protection solutions, and Saros marks another step forward for the company and comes hot on the heels of its launch of the next generation of perimeter intrusion detection systems (PIDs). Simplified portfolio Heras has built on the first generation of PIDs with significant innovations that have resulted in a new, simplified portfolio Heras has built on the first generation of PIDs with significant innovations that have resulted in a new, simplified portfolio with next-generation capabilities to provide even greater levels of perimeter protection. They can be used on sites with specific security and perimeter protection requirements – such as warehouses and distribution centres with high-value stockholding. Increases effectiveness Its new GeoMic and GeoPoint systems, which both have pro versions are designed to complement and greatly increase the overall effectiveness of both existing and newly specified perimeter protection fence and gate lines.
Metal theft is nothing new, but the impact of the pandemic has left many in financial uncertainty, couple this with the rising price of metal, and one result is an increase in the level of acquisitive crime. It seems there is no limit to the types of materials stolen. Just recently, lead stolen from church roofs has caught the media’s attention again, but this type of theft reaches to more commonplace materials too, including steel, cast iron, and aluminium, and even items like street signs and fencing panels. As such, publically accessible infrastructure could be left vulnerable if measures aren’t taken to properly protect them. Perimeter fencing solution Begin this process by thoroughly checking and assessing the perimeter fencing of the site. Here, you’re looking for any signs of tampering or wear and tear, and checking if the fencing is still robust. If the fixings in fencing systems can be removed easily, the entire perimeter fencing solution risks being compromised with little effort. Both the fixings themselves, and the metal fence panels they secure can be targets for theft, and if stolen would significantly reduce the security on and around the site. The connectors, fittings, and fixings are arguably the most integral part of any security fencing installation The connectors, fittings, and fixings are arguably the most integral part of any security fencing installation. They’re responsible for holding the fencing and gates together and keeping them in place. Remember, fencing solutions will only be as robust as the components used to hold them together, if these have inherent flaws, the fencing and gates in question will be more vulnerable to attack. Equal level of protection This is because poor quality fixings can often be easily broken or removed by their design or placement, so it’s best to steer clear. Further, while fencing labelled as ‘quick and easy installation’ may sound cost effective, if it takes no time to install, it’s likely it will also be quick to take down, defeating the purpose of perimeter fencing. There’s a multitude of varying types of fixings available on the market, and it’s important to remember that not all fencing and gates provide an equal level of protection. Below we take a closer look at fixings that should be avoided where possible. Standard head screws Standard head screws and bolts. This can be extended to anything that looks like it can be easily removed with a screwdriver or drill. Security Torx or ‘Star’ screws. These were once an effective tamper-proof fixing, however, in more recent times the driver bits have become more readily available in most DIY toolkits, and as such these fixings are now far from secure. Installing screws on the outside of the fence line. Leaving the fixings accessible from the outside of the fence ultimately means you’re exposing them to anyone and everyone, authorised or not. This enables them to attempt to remove the fixings without the added deterrent of having to climb the fence and risking being caught. Low quality fixings. All fixings should be galvanised or stainless steel to ensure they don’t rust away. Tamper-proof fixings Vertical bar fencing and metal railings have concealed bolts and screws So now we know what not to specify, let’s take this one step further and discuss some of the most effective design components found in fencing systems. Look for security fencing with ‘tamper-proof fixings’. We believe this is so essential, that all Jacksons metal fencing is produced using these in one form or another. Vertical bar fencing and metal railings have concealed bolts and screws, while the welded mesh panels have tamper-proof screws with unique heads that can’t be loosened or fastened with normal tools. Be wary when specifying fencing types such as steel palisade fencing; not only does this type of fencing hinder surveillance and provide an unattractive aesthetic, but the bolts and rivets are also very easily accessible meaning it isn’t very secure. Twin wire panels V mesh and twin wire panels can be attached to posts in different ways. Most commonly this will be via the use of clips. These vary in the level of security they provide, for example, generic mesh clips secured with generic Torx screws can be easily removed using a standard toolkit. However, there are other products on the market which make use of anti-vandal connectors and tamper-proof fixings. Once tightened, the hexagonal part of the nut breaks off, leaving a smooth dome These fixings can only be accessed from the secure side of the fence, significantly improving the level of security. Shear nuts are arguably one of the most secure fixings which should ideally be used on gate hinges. They are a type of breakaway nut which are almost impossible to remove once installed. Once tightened, the hexagonal part of the nut breaks off, leaving a smooth dome that is hard to grip with normal tools. Knit mesh fencing With tightly knit mesh fencing such as 358 mesh, panels can be fixed to the posts in different ways, but again not all ways are secure. Some manufacturers use smaller clips and screws/bolts, however, the clips are susceptible to damage – being so small, and it also leaves the edge of the panels exposed to tools that could prise the panel away from the posts. Close-knit mesh panels with clamp bars and tamper proof bolts are highly secure. Concealed panel to post connectors and tamper proof bolts help to further enhance the security of the fencing, these are commonly used in vertical bar and metal railings. Highly secure finish Here rails are sleeved onto the pales and welded for a seamless, highly secure finish. There are no bolts or rivets that could be removed to enable swing pales to be set aside and gain access. The role that fixings and connectors play is absolutely crucial to the level of security of the perimeter fencing. This article touches on the myriad of different options available on the market, but if in doubt, don’t hesitate to consult an expert on what type of components should be used when specifying fencing and gate solutions for your specific project.
More than a year and a half after the COVID-19 pandemic began, countless workers are still doing their jobs remotely rather than from their offices. While there are many positives to working from home, there can also be some negatives at play like nefarious actors taking advantage of the tools and connections that employees use in work from home environments. Insider threats, a security risk that comes from within the organisation, are posing a major security problem for businesses. This is partially due to the widespread use of social media, encrypted communication platforms, and other tools. Now more than ever insider threats need to be identified, thwarted, and prevented. Social distancing policies When social distancing policies and mandates began keeping people apart, many turned to social media to stay connected. While social networking tools have provided a positive outlet and a way for people to feel more connected, these platforms have also become a hotspot for insider targeting because they provide a way to propagate disinformation and target individuals likely to be receptive to it. The ideal mark for an insider threat is someone who is active on social media Even more so, they have provided a means to develop relationships with organisational insiders and socialise with them. The ideal mark for an insider threat is someone who is active on social media, has sufficient access to sensitive information, lacks supervision in their day-to-day work, and works remotely. As the relationship develops, through the process of grooming, an employee can become more likely to disregard company policies and commitments. Disregarding company policies One reason insiders might act against their own organisation involves monetary gain. The pressures of the pandemic have led to record levels of unemployment and financial strain for millions of Americans. Financial issues can include struggling to pay for childcare, supporting family obligations, paying rent and more. Those who find themselves in a financial bind might not just act against their own company but could also more easily fall victim to a threat. Another reason that insiders act is that they may be disgruntled. Insiders may hold a grudge because they were passed over for promotion, were given an unsatisfactory performance rating, or they may be facing termination. While just one of these factors may not be a trigger to involve the company’s security team, any combination of these factors along with a change in the employee’s demeanour or behaviour should serve as a red flag to pay closer attention to the situation. Potentially malicious insiders Sending confidential information to an unsecured location in the cloud exposes the organisation to risk Another challenge employers face directly relates to the somewhat limited supervision of employees who work remotely. In this situation, identifying potentially malicious insiders is more difficult, largely because face-to-face interactions are limited. When the pandemic began, many companies shifted their primary areas of focus to keeping the business viable, which is understandable. However, with this shift of focus, less attention may have been paid to security issues. The proactive company will have ensured their employees are aware of the following: Steps they should take to ensure their devices -- both company-issued and personal -- are secured at all times. Sending confidential information to an unsecured location in the cloud exposes the organisation to risk. Breaking security policies to simplify tasks is prohibited. Ensuring their devices are updated with the latest security patches. A failure in any of these areas can produce an environment ripe for malicious insider activity. Cyber security teams This multidisciplinary group can lead the initiatives that are paramount to keeping the company secure The insider threat is an organisational threat and so it is most effectively addressed from a holistic perspective. Stakeholders from different parts of the organisation need to be at the table to understand and address such threats. An effective team includes personnel from the legal, human resources, communications, and physical and cyber security teams. This multidisciplinary group can lead the initiatives that are paramount to keeping the company and its employees secure. Conduct a risk assessment of the company’s security processes or a threat assessment to the company’s people or assets. No organisation is without some level of vulnerability, so identify the most critical assets, information, and systems; identify those who have access to these critical assets; and build controls around them to provide extra security. Delivering refresher training Build a training program to help employees and management identify concerning behaviours. Educate staff about insider threat indicators and provide instructions for how to report concerns. Require employees to complete training and deliver refresher training and updates throughout the year. Training on this matter is not a one-and-done situation. Ensure there is an impartial and confidential process in place for employees to report possible insider threats. Employees need to trust that if they report concerns about behaviours or actions on the part of a fellow employee, their information will be handled discreetly and if warranted, acted upon. Write a communications strategy clearly defining the process for relaying insider threat incidents. An effective plan lays out what information and when this information should be shared with specific individuals and to the broader community, who has authority to communicate sensitive information, and how the information should be disseminated. Remote working challenges Establish a check-in process for managers and their direct reports to enable a means for employees to share concerns and for managers to identify challenges or opportunities to assist employees working in the virtual environment. Make an EAP (employee assistance program) readily available to employees. Ensure they understand how to access their EAP and assure them that contacting the EAP will not have a negative impact on their career or growth potential. Providing venues for employees to share their concerns and talk with trained staff can greatly help organisations navigate insider threats and general remote working challenges. Security risk environment The virtual workplace has created a serious security risk environment for companies in which employees who would not normally engage in insider threats become more vulnerable to them. Through new technologies and possibly due to new financial hardships, those looking to harm an organisation are out there, searching for opportunities to strike. It is leadership’s responsibility to take proactive action to ensure their employees are aware of the possibility of insider threats, the seriousness with which management views them, and the resources available should someone fall victim. It is everyone’s responsibility to remain vigilant.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximise convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organisations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimise the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually. Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India. Expensive AI resources Cloud systems empower customers to leverage AI without having to install and program complicated and expensive hardware, in effect stripping away the barriers to entry that customers face when seeking to embrace AI. The cloud also enables customers to share expensive AI resources. One of the key components is ease of deployment – click, click and turn on the AI for any camera" Simplicity of implementation is crucial to the combined value proposition of Eagle Eye Networks and Uncanny Vision. “One of the key components is ease of deployment – click, click and turn on the AI for any camera (in a cloud system),” says Dean Drako, Eagle Eye Networks CEO. There is also a benefit of having AI systems networked, enabling 25 banks to perform facial recognition of customers from a single cloud-based system, he adds. A transition is also under way in the perception of AI. Video surveillance applications While previously it was seen as an add-on to surveillance systems, now it is seen as a very desirable feature on any system. “Centralised management of the cloud benefits the AI database,” says Drako. “In a project built around licence plate recognition (LPR), for example, all the data goes up to the cloud into a single database, and the customer can get a mobile view of everything going on across the world. You can’t do that without the cloud. And AI for LPR is more accurate.” Uncanny Vision’s targeted focus on AI for video surveillance applications was one factor that attracted Eagle Eye Networks to make the acquisition, says Drako. In contrast, some other companies have embraced broader applications of video AI. Uncanny Vision also has more customers using their system in real-world applications than competitors. Finally, the acquisition will help to expand Eagle Eye Networks’ presence in the LPR market, where Uncanny Vision is especially strong. Improving business operations The 60 employees at Uncanny Vision are mostly engineers and programmers Uncanny Vision’s deep learning algorithms enable recognition, identification, and prediction, improving business operations, customer service, and site safety. Applications include smart parking, retail, smart cities, ATM monitoring, worker safety and perimeter security. The 60 employees at Uncanny Vision are mostly engineers and programmers. “These guys understand how to translate AI algorithms to run very efficiently on various types of hardware,” says Drako. “They optimise how they get the code to run so we can implement in the cloud cost-effectively. They do it at a modest cost to make it more accessible. They understand how to deploy software for high performance on low-cost hardware.” For Uncanny Vision, the new ownership provides more reach. “We have a huge channel and a huge brand,” says Drako. “They are strong technical guys who need a sales and solution channel.” Video analytics solutions Even in light of the acquisition, Eagle Eye Networks will continue to provide a selection of third-party AI and video analytics solutions to customers. Use of AI and video analytics is specific to the application and business needs of each customer. Use of AI and video analytics is specific to the application and business needs of each customer In addition to AI functionality, systems need a ‘business logic’ component that drives how that capability is integrated into a system. System needs vary widely by vertical market, and many third-party vendors are focused on a specific vertical and how AI can benefit that market. Recurring monthly revenue “Third parties can provide analytics and the business logic, which is different for a factory, an office building or for a drive-thru restaurant,” says Drako. “The market is looking for many solutions, and one company couldn’t own a majority of them.” To ensure flexibility, Eagle Eye Networks will accommodate third party solutions, deploy their own analytics, or leverage analytics embedded in cameras. For Eagle Eye Networks’ dealer and integrator customers, the expansion into AI presents a new opportunity for recurring monthly revenue (RMR) and provides greater value to customers. Drako says the impact of the acquisition will be global as AI applications grow in popularity worldwide.
Video is an enormous wellspring of unstructured data in the enterprise environment. Finding new ways to use video data requires easy access for analysis. Gone are the days when video was recorded just to be played back later. New computer capabilities can analyse video to provide business intelligence and trends, all of which requires that a lot of unstructured data be captured, stored and kept immediately accessible. It's a driving force for companies specialising in video storage such as Quantum, which is focused on storing and managing unstructured data, including video, photos, music and sound. Managing various analytics “Unstructured data is driving the massive growth in storage today, and video surveillance fits right in there,” says Jamie Lerner, CEO and President, Quantum. As data multiplies in business, matters of storing and accessing the data take on a larger profile. Especially challenging is meeting the need to store and access expanding amounts of unstructured data, such as video. Video is also part of a changing end-to-end architecture in the enterpriseWhereas 10 years ago, video surveillance was all about recording and playback, now the emphasis is much more on an end-to-end approach. In addition to capturing and playing back video, systems have to manage various analytics, archival and data retention aspects as well as recording. Video is also part of a changing end-to-end architecture in the enterprise, including hybrid, cloud and on-premise storage. Video surveillance industry Historically, structured data, such as financial information, was stored to allow future analytics. The same trend extends to unstructured data, such as video analytics. Quantum has expanded its video storage capabilities with acquisition this year of the video surveillance business of Pivot3, provider of a hyperconverged system that provides recording, analysis and seamlessly archives data on a converged platform that is less expensive and easier to manage. In acquiring Pivot3, Quantum is refocusing the smaller company on the video surveillance industry. “We are now focused 100% on surveillance and having the highest quality while being very cost-effective,” says Lerner. “The industry is ready for an IT-forward solution that is totally focused on surveillance. You can’t make a platform all things to all people.” Traditional security customers There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand Pivot3 will also help to expand Quantum’s customer base. The larger company has a history of serving customers in entertainment, movies, television and sports production. The addition of Pivot3’s 500 new customers in large surveillance, transportation and critical infrastructure markets will expand the mix. There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand. Pivot3 also helps to bridge the gap between traditional security customers and the information technology (IT) department. “Pivot3 has a reputation as simple to use,” says Lerner. “My belief is that physical security can run separately [from IT] until you reach a certain size, then IT has to be involved. Pivot3 gives IT people in the security space a product that is well formed and fits into an IT strategy. They are not undertaking a piece of equipment that will be a burden.” Physical security presence Customers expect their infrastructure vendors to provide systems that allow them to “Set it and forget it,” says Lerner. It’s one of the big advantages of cloud computing and also central to Quantum’s approach with their traditional products. “At the end of the day, you want to run a hospital, for example, so you want your systems to be easy to use,” says Lerner. The Pivot3 acquisition will also allow Quantum to expand their physical security presence more broadly and globally. Previously, the geographic reach of Pivot3 was limited by the high cost of placing personnel in diverse locations. Under Quantum, which has been serving global companies for 40 years, the problem disappears. “Quantum has global support on all continents and in more countries,” says Lerner. “It’s a higher level of support, given size and legacy of our organisation.”
Founded in 2010, Avolon is the third-largest aircraft leasing company in the world with 824 aircraft and 145 customers in 62 countries. Its new global headquarters in Dublin is comprised of 6,967 sq m (75,000 sq ft) of secure office space across six floors that houses its IT, catering, legal, and communications departments. Need for a centralised monitoring solution Avolon’s new premises in the upmarket Ballsbridge area of Dublin provided an opportunity for the company to rethink its approach to building security. Avolon was looking for an innovative, flexible solution that could be personalised to individuals, easily accessed, and managed remotely. Additional requirements included: the need to provide different levels of security clearance in different areas of the building, the ability to manage individual security clearances, the facilitation of access outside of the usual workday, and secure parking lot access for employees and visitors. As a global company, Avolon wanted a solution that could be deployed worldwide to provide a consistent experience for its employees, regardless of their location. HID’s flexible access control solution Powered by Seos® technology, the solution uses BLE and iCLASS® readers to create a secure access control solution Avolon partnered with systems integrator Summit Security Systems Ltd and deployed HID Mobile Access at its Dublin headquarters. Powered by Seos® technology, the solution uses Bluetooth Low Energy (BLE) and iCLASS® readers to create a secure, convenient, and flexible access control solution for its headquarters. The building’s security system enables credentials on smartphones via an app rather than on physical access cards and uses iCLASS SE® mobile-enabled readers installed at points of access. Key benefits of a mobile access system include: Employees are less likely to forget smartphones, which they always carry than an access badge Security clearances are more efficient and easily changed because security status is provisioned to an app A cloud-based central control system provides security administrators with easy oversight, access to a complete set of metrics, and the ability to manage a network of premises around the globe Employing various access control measures Avolon has implemented a range of different solutions for different parts of its premises that can vary by time of day. For example, elevators utilise access control measures to ease the flow of people within the building during work hours, while assuring that after-hours access is more controlled. Employees simply twist their iOS or Android™ phones when they approach the parking readers to gain entry The ease-of-use and security also extend to the parking lot, which benefits from HID’s “Twist and Goes” feature. Employees simply twist their iOS or Android™ phones when they approach the parking readers to gain entry. Avolon encourages its employees to cycle to work and has extended mobile access to a secure employee bike parking area that links directly into the shower and changing facilities. Advantages of mobile access solution The HID Mobile Access Solution provides many advantages over the previous card-based system including after-hours access (vital to a 24/7 business like Avolon), ready access to secure rooms, and easy management of security clearances. With HID Mobile Access, fine-grained security access for a global network of offices is controlled centrally through a cloud-based portal. Access levels can be set on an individual basis so they are very flexible and can be modified as needed. “Using a mobile phone is much more convenient than access cards. People forget their access cards, but their mobile phone is with them all the time,” said Allan Dawson, facilities project manager at Avolon. “It’s much more efficient. For example, we now have much lower instances of people leaving the perimeter and having to ask for re-entry because they’ve left their pass in the office.” Worldwide installation of physical access solution In the future, Avolon anticipates expanding its new physical access solution across its global campuses. “As well as deploying in our Dublin head office we have also deployed in our New York, Florida, and Hong Kong offices,” said Dawson. “The benefit of using a global platform means our people can travel between offices with their security status intact and ready to go for each location.”
As the need for counter terrorist devices grew, Delta Scientific Corporation (Delta Scientific) answered the call and began building and crash testing barriers that would stop an attacking vehicle, allowing no infiltration to the premises. Over the years, Delta Scientific has designed, patented and crash tested numerous barriers, to meet the needs of specific government agencies and facilities. Collaboration with US agencies Over the last few decades, Delta Scientific has worked with many branches of the government, including all branches of the US Military, Department of Defense (DOD), Department of Homeland Security (DHS), Department of State (DOS), Department of Overseas Building Operations, Pentagon Force Protection Agency, Federal Bureau of Investigation (FBI), Department of Water and Power, Department of Veteran Affairs and the US Center for Disease Control (US CDC), along with municipal, county and state government agencies. The United States of America has repeatedly entrusted Delta Scientific to build the right crash rated barrier solution for critical infrastructure and to protect the nation’s citizens, in the service of their country. DSC633 and DSC635 single shallow foundation bollards DSC633 and DSC635 single shallow foundation bollards provide the highest level of protection against a vehicle attack Delta Scientific’s new patent pending DSC633 and DSC635 single shallow foundation bollards provide the highest level of protection against a vehicle attack. Tested to the new F2656-20 ASTM M30 and M50 standards, these new bollards provide the stopping power needed for modern threats. With a shallow foundation of only 24 inches (60.96 cm) and the ability to have single units, both bollards offer the flexibility and ease of installation, so as to cater to perimeter security needs. DSC630 Series bollards Quite often, just stopping the bomb-laden truck is not enough. If the explosives in the truck detonate, all can be lost, irrespective of whether the truck was brought to a halt or not. The Delta DSC630 Series bollards feature static and dynamic penetration levels that hinder bomb loads to be moved, while still stopping the threats that they pose. Tested and proven to not only stop but also destroy the vehicle, Delta’s DSC630 Series bollards will keep a vehicle from repeatedly trying to breach the perimeter. The DSC635 bollard has a height of 44 inches (111 cm) and a diameter of 15.75 inches (40 cm) with a cover. Furnished with an array of decorative covers The DSC633 bollard has a height of 44 inches (111 cm) and a diameter of 13.75 in (35 cm) with a cover. Delta Scientific’s bollards can be furnished with an array of decorative covers, in order to enhance the look and match the aesthetic of the surrounding structures. These covers include stainless steel, powder coated aluminum, and fiberglass, with custom styling and painting also available. Lights, beacons, and audible devices can be added to the bollards for additional safety protocols. Shallow foundation bollards Delta’s shallow foundation bollards are often used to protect building perimeters and sports stadiums Delta Scientific has been manufacturing shallow foundation bollards and barricades in 24 inches (60.96 cm) or less height for decades. Shallow foundation bollards are the perfect solution for sidewalks, campuses, parking structures and government buildings, and corporate facility perimeters, where underground utilities and space limitations pose a problem for traditional deep foundation bollards. Delta’s shallow foundation bollards are often used to protect building perimeters and sports stadiums, as static arrays and used in conjunction with Delta’s active bollards and vehicle barricades, at entrances and exits. Delta Scientific Corporation is a worldwide renowned manufacturer of vehicle access control equipment, with over 260,000 square feet of production facilities in Palmdale, California. Delta’s three product lines consist of high-security vehicle barricade systems, parking control equipment, and guard booths.
The Groupama Stadium — also known as the Grand Stade de Lyon— is a sports and recreation complex and soccer stadium that is located in the eastern metropolitan area of Lyon, France. With a maximum capacity of 59,186 seats, the venue hosts approximately 30 events per year such as sports games, concerts, and performances. The stadium is the third-largest stadium in France and the twenty-seventh in Europe. Situated in a town with only 25,000 residents, the stadium hosts twice as many spectators at its events. Efficiently managing crowds Under the leadership of Xavier Pierrot, Stadium Manager at Groupama Stadium, the team pays particular attention to the safety and well-being of community members as well as business owners, fans, players, journalists and staff. Their mission is to ensure the highest levels of safety while maintaining impeccable service. The stadium’s security team wanted a security system that would help them efficiently to manage crowds To achieve these goals, the stadium’s security team wanted a security system that would help them efficiently manage crowds and ensure the safest experience for guests. The stadium also needed an effective security system to help them identify threats and pull evidence for law enforcement agencies following any incidents. Groupama Stadium entrusted the IT and security solutions selection to Orange Business Services, who recommended the Genetec™ Security Center with the Omnicast™ video surveillance solution. Unified security platform Security Center is the unified security platform that combines video surveillance, access control and licence plate recognition systems into one intuitive solution. Prosegur, a specialist in security solutions integration, handled the system installation. The Omnicast video surveillance system met the complex’s specifications and budget. The security system is both reliable and easy to use for operators who can act quickly and discreetly in the event of an incident. “We followed the theme park model. Why? Quite simply because security is of the utmost importance but it must not be intrusive or become a source of anxiety. For families with children that are attending games, for example, this experience must be one of leisure. So, we needed a solid and reliable system. The Security Center platform had all the requirements to ensure the surveillance of the stadium in this particular context,” explained Xavier Pierrot. Remotely access video Operators use the Omnicast system to monitor over 260 Axis Communications cameras Thanks to the Federation™ feature of Security Center, operators centrally monitor video from all sites in the complex, including the training centre and practice facility. The security team can view live video or remotely access video any time of the day. They can also easily go back and search through archived video, if necessary. Operators use the Omnicast system to monitor over 260 Axis Communications cameras. The system provides coverage of all entrances, concession stands, 7,000 parking spaces and traffic routes around the site. Operators can easily find the cameras using the map interface of Security Center, Plan Manager. The map module provides a comprehensive view of any area of the site in one single click. Video surveillance solution “Since its installation, the Genetec Omnicast video surveillance solution has enabled us to resolve 100% of minor incidents; the vast majority of which were cases of theft or dropping of smoke bombs, and has helped us resolve major incidents that required the involvement of law enforcement,” says Xavier Pierrot. The entire security system is fully redundant, providing the highest levels of protection in this modern complex. All monitoring is now carried out from a central control room at the stadium, helping operators save time In case servers, PCs or power supplies malfunction, the failover and redundancy features of Security Center ensure that the system continues to run smoothly. All monitoring is now carried out from a central control room at the stadium, helping operators save time and become more efficient when responding to events. Teams never have to leave the control room for intervention because all decision makers including law enforcement, the organiser, first responders, firefighters, and security operators have access to the system. Retrieve video recordings With the Security Center Omnicast system, users can easily view video, retrieve video recordings, zoom into precise details, print photos, save specific bookmarks, or manage alarms to secure various zones of the stadium environment and its perimeter. Using the Genetec Software Development Kit (SDK), the team at the POL has been able to integrate the IP video system with another third-party system to facilitate the transfer of evidence. The integration allows for secure gateways to be set up with certain public partners such as the police headquarters or the Interior Ministry, enabling the transfer of information during large-scale events such as Euro 2016. Facial recognition system Groupama Stadium would like to integrate a facial recognition system within the unified platform In accordance with privacy laws, and as a next step, Groupama Stadium would like to integrate a facial recognition system within the unified platform, so its team can automatically be alerted to banned persons as they enter the stadium. “Since Security Center is flexible and scalable, we plan to continue evolving the platform and taking full advantage of its potential in order to better protect our guests, community members, and staff,” concluded Xavier Pierrot. The Omnicast system of Security Center manages 262 Axis Communications network cameras, including various models and a few 360° domes. All seats are monitored by three different cameras, two fixed and one dome to ensure several viewpoints. The cameras record continuously.
The Spitalfields Estate in East London uses Genetec Security Centre to modernise CCTV security and build a platform for future service innovation. Business challenge The Spitalfields Estate is a 1.9m ft2, mixed-use development in East London managed by CBRE. It includes corporate offices, retail and residential units, public spaces, and a market independent of its famous neighbour, the Old Spitalfields market. The estate has 16,000 tenants and runs several cultural and entertainment events to foster a local community environment. Recently visitor numbers have increased from 165,000 to between 400,000 and 500,000 a week. Effective security management and caring for tenants and visitors is a key part of the estate’s job. The existing CCTV system was an old analogue application on a PC connected to a network of outdated cameras. Although functional, the system was difficult and costly to maintain. Image quality and storage capabilities were poor. But it could not support some of the future services and applications that the estate wanted to deliver. The Spitalfields Estate is a showcase site and the CCTV system did not fit with its image of a modern, efficient location. Addressing CCTV system challenges The aim was a dedicated CCTV system capable of supporting modern equipment for deploying new services in future The estate planned to upgrade the cameras and cabling but soon realised the whole system needed replacing. The aim was a dedicated CCTV system capable of supporting modern equipment and a springboard for deploying new services and capabilities in the future. After a detailed tendering process, the estate decided to work with Genetec and its business partner, Custom Intelligent Security. According to Justin Morgan, from CIS Security and Head of Security at The Spitalfields Estate, “The presentation and sales process by Genetec and Custom was very impressive. There was no hard sell and it felt like a breath of fresh air. All the top CCTV suppliers offer high-quality solutions, but it was a feeling of reassurance that we got from the Genetec team." "The solution suited our needs because it offered the support, training, information, and knowledge sharing to make the system professional and easy to use.” Security Centre modernises security The estate deployed a new CCTV system based on the unified IP security platform, Genetec Security Centre. It is hosted on an all-in-one Genetec Streamvault 300 Series server. Analogue feeds from the existing camera network are converted into digital data and sent to Security Centre for staff to monitor and manipulate. Genetec Clearance is a digital evidence management solution. It improves GDPR (General Data Protection Regulation) compliance by using intelligent identity-redaction features and removing the need to share image data via hard media. If there is a subject access request, staff use clearance to select relevant images, annotate, mask individuals not involved, and create a link to share the material. Data is deleted automatically after 31 days. The next phase of the solution will be a cable network survey and rolling out new cameras when old ones reach the end of life and cannot be repaired cost-effectively. Protecting existing investments and controlling future spend CCTV system delivers clear, clean images even from old cameras, and is easy to manage and use “To go from old, hard-to-use equipment to a professional, modern, and fit-for-purpose solution is a huge improvement for security management at The Spitalfields Estate. It’s an investment in technology and operations, but it’s also an investment in the team, the tenants, and the whole estate,” explained Morgan. The Spitalfields Estate now has a CCTV system that ensures the safety and security of visitors and staff professionally and efficiently. It delivers clear, clean images even from old cameras, and is easy to manage and use. Significantly, it enhances the estate’s brand reputation for providing modern, professional services backed up by an excellent delivery service from Custom. “The global security manager from one of our biggest business tenants came to see the new CCTV system and was very impressed. It proves that we are running a highly professional operation using the latest technology,” said Morgan. Morgan describes the change as going “from level 1 to level 10 without touching level 5”. Despite the major transformation, the solution has been designed and managed in phases so the estate can protect existing investment and control future spending. Scalable, modern, and efficient CCTV system One main objective was a system that could be developed to meet future needs and support more services and capabilities such as using analytics to improve security management. For example, Morgan and his team plan to use Security Centre to set up automatic detection alerts when someone enters a sensitive area, when large groups form, or suspect objects are left unattended. The estate and the new CCTV system are used as a training centre for CIS Security staff from other locations This will help to make security operations more efficient and means the staff won’t have to monitor every camera feed. The estate is also looking at how to integrate its existing, but standalone entrance access system with Security Center. “These are the kind of scalable and operational enhancements that the modern and efficient Genetec system is delivering to The Spitalfields Estate,” said Morgan. Security training The estate and the new CCTV system are used as a training centre for CIS Security staff from other locations. The site has several different security environments such as private buildings and public spaces to test skills. The Genetec system is also easy for students to set up and use. “To go from old, hard-to-use equipment to a professional, modern, and fit-for-purpose solution is a huge improvement for security management at The Spitalfields Estate. It’s an investment in technology and operations, but it’s also an investment in the team, the tenants, and the whole estate.”
Dutch franchisee Leussink Retail Groep operates 7 Jumbo supermarkets in its portfolio. They tackled the thorny issue of hygiene and social distancing with a solution made up of Hikvision cameras, SmartPole sanitizing stations, and the SmartPole platform for safe shopping. Hikvision’s comprehensive solution SmartPole Solutions, a Dutch member of Hikvision’s Technology Partner Program, stepped up to the plate, delivering a comprehensive solution based on Hikvision Dual-Lens People Counting Network Cameras (DS-2CD6825G0/C-IS), their SmartPole Sanitizers, and LeftClick software. The solution operates based on a calculation that no more than a certain number should be in a shop, depending on its size. This means that there are few enough people inside to make social distancing possible. In this way, everyone can shop for their essentials more safely.
The Palmetto Plaza Shopping Mall, an iconic shopping center located in Cali, Colombia, opened its doors in 2004 thanks to the support of a group of entrepreneurs from the region who dreamed of a place where local residents and tourists can find a wide range of commercial services and entertainment offerings. Need for a video surveillance solution To ensure a safe environment in the shopping center, mall officials sought a comprehensive video surveillance solution that can monitor the areas in and around the mall, including its square, corridors, parking lots, and the surrounding roads. Dahua Technology, in cooperation with its partner in Colombia - Fortox Security Group - a security consultant with a nationwide presence, jointly designed an AI-enabled Smart Retail Solution that replaced the shopping mall’s old CCTV analog system. Addressing the challenges The migration project from the analog CCTV to a networked system began with the design and implementation of structured cabling – using both fiber optics and copper – until the right and suitable CCTV solution is determined. The Palmetto Plaza Shopping Mall entrusted Fortox as its security consultant tasked to search for a technology that can facilitate the important steps toward the optimization and operation of the mall in the service of the city. Dahua’s AI-based portfolio Dahua offers AI applications within its portfolio, which allowed to transcend to a system dedicated to security & control " "When conducting the evaluation of the solutions offered in the market, we decided to work with Dahua because the company offers artificial intelligence applications within its portfolio, which allowed us to transcend from a system dedicated solely to security and control, to a system which will also contribute to other areas of the shopping center, integrating the Smart Retail solution into the circuit, and offering BI statistics to the mall for further analysis.” “In addition, we integrated the temperature monitoring solution and visualisation control into the system using a Dahua video wall,” explains Mr. Efren Mauricio Matabanchoy Romo, Project Engineer at Fortox Security Group. IP, dome, and PTZ cameras Dahua Technology provided 111 pcs of high-resolution IP cameras, panoramic cameras, dome cameras, and pan-tilt-zoom (PTZ) cameras with 30x optical zoom capability for the project. The Dahua cameras were installed in strategic locations to provide comprehensive security for employees and customers. The video feed, which is transmitted to the central monitoring stations inside the mall through a private network, can assist the security personnel in identifying emergencies, vandalism, and other situations where a quick response from the security team is necessary. Real-time monitoring solution The video surveillance system was designed to capture high-quality HD images, combined with advanced technologies to support embedded intelligence functions, such as sending an alert to the monitoring center when it detects abandoned or missing objects, unauthorised entry into a prohibited area, as well as facial recognition and other defined activities. The cameras support multi-streaming that allows images to be recorded and monitored with real-time high resolution The cameras also support multi-streaming that allows images to be recorded and monitored with real-time high resolution so that operators can have a clear and well-defined view of both live and recorded footage. IP video surveillance system Dahua Technology and its dedicated engineering team carried out the construction of this design by utilising its high-quality hardware and software products, with a great focus on solving the pain points of the shopping center and generating an added value to its visitors and internal customers. Mr. Chao Wu, General Manager of Dahua Technology Colombia, said, "As a result of excellent teamwork, we were able to implement more than an IP video surveillance system. We designed a solution with the latest technology and artificial intelligence unique in the city of Cali, which allows the Palmetto Plaza to provide greater security to its visitors and trade merchants.” 24/7 monitoring features In terms of security, through the Dahua equipment installed by Fortox, the Palmetto Plaza is now able to perform 24/7 monitoring and intelligent data analysis. "Likewise, through the Dahua Smart Retail Solution unique in the city of Cali, we generate added value to the merchants who have placed their trust in Palmetto Plaza. Smart Retail is not only a solution that guarantees maximum security for customers in the shopping centre.” “It is also a revolutionary new tool for Big Data statistics that is suitable for the mall´s management, allowing them to make efficient and correct decisions depending on the situation”, Mr. Wu added. Security management The Dahua Smart Retail Solution has significantly improved the security management of the Palmetto Plaza Shopping Mall. By increasing the resolution of the cameras, the visual records of the CCTV system are now optimised and strengthened. By increasing the resolution of the cameras, the visual records of the CCTV system are optimised & strengthened The updated network system provides video recordings with HD resolution, allowing operators to better control and manage the entire system. It also offers artificial intelligence analytics such as face recognition focused on security, business intelligence focused on real-time statistics of the number of shoppers in the mall, and monitoring of behavior within its facilities. CCTV network system In addition to its video surveillance products, Dahua Technology also contributed to the system migration project of the Palmetto Plaza, transforming its analog CCTV system to a CCTV network system with higher resolution cameras, 360-degree views, and artificial intelligence analytics. Dahua Technology also provided complete technical support and commercial services that include training operators and managing configuration settings. “We had devices that already completed their useful life. These devices did not meet our security needs due to their low resolution and constant failures,” says Mr. Juan Diego Guzman, Security Director of Palmetto Plaza Shopping Mall. Surveillance capability For Sandra M. Navas P, General Manager of the Palmetto Plaza Shopping Mall, this technology has generated more confidence among visitors and merchants. "The beginning of this system implementation has put us at the forefront of Colombian retail in terms of video surveillance capability, and has also allowed us to achieve a level of satisfaction in terms of security higher than 92%." Furthermore, this system has allowed Fortox as a security company to integrate into a single technology the requirements requested by the client, successfully delivering the required services needed in the shopping centre.
Round table discussion
Diversity in a company’s workforce is arguably more important now than ever. Societal awareness of the importance of diversity has grown, and many people see diversity as an important factor that reflects positively (or negatively) on a company’s culture and image in the marketplace. We asked this week’s Expert Panel Roundtable: What should the security industry do to promote workplace diversity?
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward?
Many of the threats facing the energy and utility sector are related to cybersecurity, as recent incidents have confirmed. Another problem is that operating systems for utilities tend to be outdated, which presents extra challenges in a connected world. There are also physical security demands, not to mention regulatory and social issues. We asked this week’s Expert Panel Roundtable: What are the security trends in energy and utilities?