Retail security applications
Dutch franchisee Leussink Retail Groep operates 7 Jumbo supermarkets in its portfolio. They tackled the thorny issue of hygiene and social distancing with a solution made up of Hikvision cameras, SmartPole sanitizing stations, and the SmartPole platform for safe shopping. Hikvision’s comprehensive solution SmartPole Solutions, a Dutch member of Hikvision’s Technology Partner Program, stepped up to the plate, delivering a comprehensive solution based on Hikvision Dual-Lens People C...
The Palmetto Plaza Shopping Mall, an iconic shopping center located in Cali, Colombia, opened its doors in 2004 thanks to the support of a group of entrepreneurs from the region who dreamed of a place where local residents and tourists can find a wide range of commercial services and entertainment offerings. Need for a video surveillance solution To ensure a safe environment in the shopping center, mall officials sought a comprehensive video surveillance solution that can monitor the are...
Schools present unique challenges for security and access control. But what about a school that is also a heritage site of exceptional value? The Colegio Diocesano Santo Domingo in Orihuela, Spain, is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning — with a museum that requires the protection of the same access system. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: They mus...
Marriott International Inc. is a hospitality company and the Gaylord Opryland Resort and Convention Centre is a Marriott property in the world. Located in Nashville, Tennessee, Gaylord Opryland offers visitors the chance to experience Music City under a single roof. The resort has a hotel with over 3000 suites and rooms and a smaller adjacent hotel with more than 300. Risk assessment Ryman Hospitality, the organisation that owns Gaylord Brand Hotels, decided to embark on a risk assessment of t...
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to rec...
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations...
From asphalt to apps, Bosch has implemented a connected security solution for the Frechen truck stop near the A1 to protect people and freight from assaults. The modern parking area near Cologne now has around 40 parking spaces that meet the high-security standards of the Transported Asset Protection Association’s (TAPA) according to the Level 2 certificate and are therefore particularly secured. From now on, forwarding companies can book these via the Bosch Secure Truck Parking app. The fully connected solution ensures maximum security: more than 20 security cameras with intelligent video analytics by Bosch monitor the four-gated entrances and exits as well as the parking area. In addition, a pedestrian interlock ensures that only authorised persons can enter the area. The reason for this solution is a shortage of some 400.000 secured truck parking spaces in Europe. This has serious consequences for the safety of drivers, goods manufacturers, freight forwarders as well as other road users, as trucks often have to park in an unsafe manner contrary to traffic regulations. Secure truck parking "The truck parking shortage along German roads is, unfortunately, a daily occurrence. Everyone has seen the lines of unsafely parked trucks along the highways. The fact that thieves, in particular, take advantage of the precarious situation is felt by companies like us that transport goods throughout Europe," explains Rein de Vries, Senior Manager Security from Samsung SDS. In close coordination with Samsung SDS, Bosch has developed the solution that has now been implemented. "Secured truck parking lots, just like the one in Frechen, are important for our transport of goods. That's why we were happy to contribute with our know-how and experience to this project." A loss of 8.2 billion a year With AI-based video analytics, the security cameras immediately detect risks, unwanted movements and sound A recent study by TAPA illustrates the urgency of the situation: The organisation estimates the financial damage caused by stolen freight across Europe at around 8.2 billion euros annually. Alongside the United Kingdom, Germany is one of the countries most affected by cargo theft. Thieves usually take advantage of the situation at night, when the truck is parked unprotected and the driver is asleep. Consumer goods or car parts are among the most sought-after goods, as are jewelry, precious metals, or food products. Bundled know-how "On behalf of the site operator, we acted as general contractor to implement a certified complete solution for the Frechen truck stop that protects drivers and freight alike," explains Uwe B. Herrmann, project manager at Bosch Building Technologies. "The parking lot is now securely enclosed, gated, illuminated in a way that saves energy and equipped with intelligent technology." AI ensures safety and comfort With the help of AI-based video analytics, the security cameras immediately detect risks and unwanted movements and sound the alarm at the Bosch video control centre. Audio technology built-in video cameras allow control center staff to immediately contact people on the premises and notify security forces or police if necessary. Regular virtual guard tours round off the security concept. Booking parking spaces also work efficiently and digitally: Parking spaces can be booked via the Bosch Secure Truck Parking web portal or app. Truck drivers can pass through the barrier and drive onto the premises with digital license plate recognition.
Cyberint has launched the next-generation Digital Risk Protection platform, Argos Edge, a fully SaaS-based solution, to provide real-time responses to cyber threats coming from beyond the traditional security perimeters. All-in-one DRP platform Unlike other solutions, Cyberint's holistic and integrated approach combines external Attack Surface Monitoring (ASM), advanced threat intelligence, extensive phishing detection as well as social media and brand abuse monitoring. The different modules work together to infuse and enrich the Argos Edge platform, identifying and remediating weaknesses that other solutions cannot detect seamlessly and continuously. This unique capability makes Argos Edge the most comprehensive and effective all-in-one digital-risk-protection (DRP) platform on the market to date. Monitoring threat intelligence Argos Edge redefines the digital risk protection space by constantly collecting, analysing, and classifying threat intelligence from the widest variety of sources, tracking cybercriminals in the dark and deep web, criminal forums, market places, social media platforms, instant messaging, file sharing repositories and more. External Attack Surface Mapping Argos Edge reduces false positives by 99%, providing a combination of External Attack Surface Mapping Pin-pointed targeted alerts such as those provided by Argos Edge are known to reduce false positives by 99%, providing the optimum combination of External Attack Surface Mapping of Digital assets, including cloud assets and threat intelligence. Argos Edge focuses on generating proactive and targeted alerts allowing organisations to take immediate steps to mitigate those incoming threats which pose the greatest potential risk whilst also receiving up-to-date proactive information about global, regional, and vertical threats that may cause a potential breach. Alert integration Argos Edge includes one of the most extensive leaked credentials databases, which is comprised of: fusing breached databases, analysis of phishing kits, and highly effective InfoStealers malware's C&C, helping to reduce the risk from this most common attack vector. The leaked credentials database is also highly effective to B2C organisations helping to reduce account takeover of their customers. The new platform also enables users, via a state-of-the-art user interface, to immediately use the pin-pointed alerts as well as integrate them into SIEM, SOAR, and ticketing systems like IBM QRadar and Palo Alto's Cortex XSoar and others for swift dissemination and remediation. Forensic canvas Argos Edge's unique built-in investigation tool, Forensic Canvas can uncover the relationships between disparate data points, pivot on any IoC, and leverage the massive data lake that Cyberint collects 24/7 to build a quick and up-to-date picture of any threat. "Only by constant analysis of hundreds of millions of data points of threat intelligence and an ongoing monitoring of their external attack surface can organizations counter the threat actors' constantly evolving threat landscape," says Cyberint CEO Yochai Corem. Perimeter security features The Argos Edge platform protects companies from more than 75 different business risks lurking beyond the perimeter The Argos Edge platform also comprises numerous additional features that enable users to extend their security perimeters to include phishing, social media and fake application takedown support, external source code monitoring, and fraud detection capabilities. With this launch, organisations have the capabilities to protect themselves from more than seventy-five different business risks lurking beyond the perimeter, such as fraud, phishing, malware, data leakage, vulnerabilities, brand, social media risks, and more. Users now also have modular options allowing for full flexibility in licensing the platform. Cyber investigations Organisations can benefit from Cyberint's deep expertise in specialised services such as Virtual Humint, deep cyber investigations, and interaction with threat actors to identify possible weaknesses. "With Argos Edge, I have a level of assurance and trust that they are always there for me. The feeling that they always have my back is invaluable has given me the confidence that we have enough visibility and can be proactive in dealing with different cyberthreats," says Mark Frogoso, CISO at GCash.
Systems integrators who want to offer new and exciting services to their end-user customers can now deploy physical asset management location and tracking through the award-winning Connect ONE® cloud-hosted service. Designed for keys, laptops, tablets, electronics, and a wide array of other capital goods including equipment and tools, it’s easy to track assets to locations and users through the Connect ONE Asset Management Module. Asset management module Available as a standalone feature or combined with intrusion detection, access control, and video, the Asset Management Module presents a streamlined way to track equipment and goods to locations and/or users. Once an asset has been designated to a user, it automatically sends a customised authorisation template via email for the person to approve and sign. The completed form is converted to a pdf and recorded with their user account in Connect ONE for the archive. An asset that is not returned by the specified date will generate a notification to the user via email when overdue An asset that is not returned by the specified date will generate a notification to the assigned user via email when overdue. Asset tracking “While keys represent a common application, there are many other assets which can be tracked,” said Mike Simon, Managing Partner, Connected Technologies. “Users can eliminate time lost searching for equipment and other items, which are easily checked out and logged back seamlessly via the interface and tracked to their current location.” The Asset Management Module streamlines the return process with a template sign-off option generated to the user. Users can manage equipment in the field and track the asset for a quick check of their location. Assets are auto-populated into the Connect ONE interface from a CSV spreadsheet for a simple setup.
Videoloft’s cloud video surveillance platform provides users with a powerful yet highly cost-effective remote recording solution while providing resellers with a new potential revenue stream to add to their offering portfolio. For large surveillance system users, Videoloft’s cloud video surveillance solution provides affordable secure offsite video backup. For SMBs (small and medium businesses), Videoloft’s ability to record up to 8MP direct to the cloud provides a powerful remote standalone storage solution. Budget solution Both applications provide system integrators and resellers with a versatile VSaaS (video software as a solution) for virtually any size system or vertical application. A key benefit of VSaaS solutions is that they can be positioned as an operating expense (OPEX) versus a capital expense (CAPEX), making it easier for users to budget the solution as an ongoing expense for operations rather than a large single one-time investment. Versatile and cost-efficient Cloud video surveillance platform provides users and resellers alike with versatility and cost-efficiency “Our cloud video surveillance platform provides users and resellers alike with the ideal combination of features, versatility, and cost-efficiency,” said Joanna Santander, Director of Sales & Business Development, Videoloft. “As the need and demand for VSaaS cloud solutions with remote access capabilities continue to increase globally, the benefits across different vertical applications continue to become more evident.” Videoloft Use Cases Quick service restaurants (QSR) and retail chains are benefitting from Videoloft’s innovative cloud video surveillance platform as a secure, centralised, and long-term video storage solution. It allows them to easily consolidate video from multiple sites and add cloud storage, eliminating the risk of lost footage due to theft or tampering of onsite recorders. Videoloft also provides QSR and retail chains with a way to store video for up to 3+ years, much longer than is possible on conventional NVRs, to protect them from liabilities associated with injury and insurance claims, and shrinkage. Battery or solar-powered solution For locations that lack power and wired internet infrastructure, such as construction sites, vacant properties, and agricultural locations, traditional video surveillance often isn’t feasible, and guards are needed to ensure security. Videoloft provides an alternative solution that can be battery or solar-powered and connected via a 4G wireless router. Videoloft’s software constantly monitors the network conditions and deploys dynamic frame rate, bit rate, and resolution adjustment when necessary to ensure that footage is sent and recorded even in poor network conditions. Remote management The Videoloft solution provides site managers with the versatility to remotely manage employees, deliveries, and health and safety protocols. Videoloft’s timelapse feature makes it easy to track development over days, weeks, and months Videoloft's video analytics technology enables highly specific alerting options and smart video search, making it fast and easy to locate specific events. Videoloft’s timelapse feature also makes it easy to track development over days, weeks, and months, and to share this progress with customers. Audio and alarm features Videoloft is a great solution for education campuses. The platform provides campus security teams with the ability to easily monitor sites even when they are split across multiple locations. With features such as PTZ control, 2-way-audio, and alarm triggering there are many ways to detect, track and address unwanted visitors. Real-time monitoring Cannabis farms and dispensaries can leverage Videoloft’s cloud video surveillance solution to ensure they comply with regulatory requirements. In many states, it is mandatory to record 24/7 video both locally and offsite. Videoloft’s live camera health monitoring functionality ensures problems are spotted in real-time so they can be rapidly diagnosed and resolved, eliminating the possibility of lost video. User-friendly software solution Videoloft is also providing integrators and dealers with a new potential source of RMR. Videoloft’s simple setup, affordable cloud plans, and user-friendly software allow integrators to offer SMBs and the high-end residential market a highly cost-competitive product, even when compared to DIY solutions that typically employ Wi-Fi cameras that are inherently less secure. Users can set alerting and recording schedules and easily playback and download video through the Videoloft app, and assign multiple users with read-only or full admin access to all or specific cameras, depending on their requirements.
STARC Systems, a manufacturer of temporary modular wall containment solutions used for occupied renovations and infection isolation unveiled FireblockWall™, the first modular reusable one-hour fire-rated temporary containment system. STARC will begin taking orders in June with deliveries starting in early summer. Product innovations to solve challenges "Our customers have been requesting a one-hour fire-rated containment solution," said Bruce Bickford, VP of Product Development at STARC Systems. "Facility managers have a tremendous responsibility during an occupied healthcare renovation project. If something goes wrong and the Joint Commission, State Inspector or Fire Marshal investigates, it falls on the facility manager to explain every detail. STARC uses customer feedback to inform our product innovations and solve their most challenging needs. FireblockWall™ relieves our customers from wondering if they're meeting the proper safety requirements." Benefits of FireblockWall™ Stops fires, keeping patients, staff, and visitors safe in healthcare environments. Fast installation with minimal labour, two labourers can install a 10' x 15' corner room in 90 minutes, which is an estimated 4 times faster than traditional drywall, plus no taping, mudding, sanding, painting or clean up. Designed to meet NFPA 101 or IBC code, a fire-rated wall must be constructed from the floor to the deck above. With its perimeter tracks, specially designed panels including pre-designed negative air panels and doors, and supporting components, FireblockWall meets the requirements of a one-hour fire-rated listed assembly when installed to spec. Superior noise-blocking, with an STC rating of 40, is 65% quieter than any other temporary containment system. Exceeds ICRA Class IV (infection control),ASTM E119 and ASTM E84 requirements. Cost-effective, the panels are durable and can be used job after job, it typically pays for itself after just 3-5 uses and generates ongoing cost savings. Lower carbon footprint, the sleek, reusable walls save on the waste and debris normally created by building and tearing down drywall. Easy air management, includes a negative air panel to discharge air keeping dangerous dust off the ground, and automatically closes the damper when temperatures exceed 165 degrees. Also includes an air monitor panel that's compatible with all common manometers and has a 2" rated pass-through for wiring. Durable, reusable containment solution These panels offer a safer, more secure worksite, but they also provide us with a professional-looking solution "After making the switch from traditional containment methods such as poly and sheetrock to STARC's FireblockWall™ panels, our team noticed a drastic difference in the time we spend setting up containment in the field," said Adam Bouffard, Construction Supervisor, Hebert Construction. "Not only do these panels offer a safer, more secure worksite, but they also provide us with a professional-looking, durable, reusable containment solution for use on future projects." How it works With FireblockWall™ a one-hour fire-rated solution can be quickly installed in 4 easy steps: Step 1: Mark a centerline and mount the pre-drilled telescoping perimeter tracks. Tracks can easily be customized to length. Step 2: Place the FireblockWall™ panels using a lift & drop connection (no tools required). Step 3: Fill track to panel gaps with fire-rated insulation. Step 4: Place track covers to finish. Fire-rated corners, doors, and accessories are available when the project requires it, including handle sets with multiple lock options depending on the level of security needed. First reusable one-hour fire-rated solution "STARC is committed to delivering value beyond our customers' expectations while addressing long-standing containment challenges in the most sensitive of occupied healthcare environments," said Chris Vickers, President, and CEO of STARC Systems. "We set the standard for temporary modular containment with RealWall™and LiteBarrier™ and now we're thrilled to raise the bar again by introducing FireblockWall™, the first and only reusable one-hour fire-rated solution."
With a length of only 127 mm and a diameter of 48 mm, these ultra-compact cameras complement the current product portfolio of explosion-proof cameras, and cannot only be installed easily but are also cost-effective – making SAMCON a full-stack supplier. Due to the easy integration into existing video management systems and the fact that cameras can be combined flexibly, Samcon's portfolio virtually covers all CCTV applications for hazardous areas. Whether an only 700g weighing thermal camera, a high-speed system with electronic zoom and focus lens, or a high-speed dome camera is required – Samcon offers secure surveillance for all applications and areas. Benefits of the ExCam ultra-compact systems The new camera line is suitable for temporary and semi-fixed applications, too. The waterproof IP68 housing is resistant to chemicals as well as to oil and can be installed in locations where larger equipment does not fit or an installation is difficult due to restricted space. Compact design with sensors The HDTV resolution and the high-performance varifocal lens master all surveillance tasks and create safe areas The ExCam IPP1275 can easily keep up with larger models regarding performance and resolution, even exceeding competitor models in certain functional areas. For example, the camera's progressive scan allows providing high-resolution pictures of moving objects without motion blur. The HDTV resolution (1920 x 1080) and the high-performance varifocal lens master all surveillance tasks and reliably create safe areas. The ExCam IPP1275 is a modularly designed ATEX network camera and consists of an ultra-compact sensor unit for image capturing as well as the main unit, processing the image. Integrated into the main unit are the network as well as power connection and a storage card slot. Thermal camera with night vision Apart from the ExCam IPP1275, Samcon also presents with the ExCam IPP1280 its first own thermal camera. Its most outstanding feature is that even in complete darkness, it can still deliver pictures so that no external light sources are necessary. Just as the ExCam IPP1275, also the ExCam IPP1280 consists of an ultra-compact sensor unit for capturing the thermal image as well as the main unit for processing it. Multi signal camera In addition to that, an analog AHD camera completes the portfolio: The ExCam miniTube is an analog multi-signal camera with very high light sensitivity in combination with an ultra-compact housing and a fixed focal length. This camera also is designed for applications in hazardous areas, meeting the requirements of guideline 14/34/EU ATEX and IECEx. Due to its ultra-compact size, it is particularly suitable for process observations. Just as all models of the ExCam Series, also the ultra-compact cameras have been certified according to the European (ATEX) and international guidelines (IECEx). Suitable for difficult to access areas The ExCam IPP1275 as well as the ExCam IPP1280 and the ExCam miniTube are real lightweights and so easy to handle that they can be installed by a single person. This is, for example, an advantage in the chemical industry or on oil rigs with confined spaces and not much freedom of movement. The easy power supply via PoE makes a separate power line superfluous and contributes, apart from the low weight, to an easy installation. Close to processes or mounted to very small sight glasses, not only the ExCam IPP1275 always finds its place, for example: At sight glasses located between pipe installations for monitoring the flow rate Small mixing containers (e.g. for colors or chemical substances) A small laboratory size reactors and freeze-driers and in compact industrial machines Enables surveillance and efficient monitoring They help to detect problems, can be used for surveilling machines and production runs The compact design and its low weight minimize vibrations and allow sufficient space to even place an additional light next to the camera. The cameras are of a rather inconspicuous design and allow, for example, reliable surveillance of plant filling stations, general plant areas, or vehicles such as tank and lift trucks or cranes. They help to detect problems, can be used for surveilling machines and production runs, and secure the functionality of components by monitoring them. Just like all other cameras of the ExCam Series, also the ultra-compact cameras are certified according to ATEX and IECEx to guarantee extensive explosion protection. The ex-protected housing covers ATEX groups II and can be used in zones 1, 2, 21, and 22 including the explosion groups IIC / IIIC.
As the COVID-19 pandemic wanes and sporting venues open-up to full capacity, a new disturbing trend has hit the headlines - poor fan behaviour. Five NBA teams have issued indefinite bans on fans, who crossed the line of unacceptable behaviour, during the NBA playoffs. Major League Baseball stadiums have a recurring problem with divisive political banners being strewn over walls, as part of an organised campaign, requiring fan ejections. There was a brawl between Clippers and Suns fans after Game 1 of their playoff series. And, the U.S. vs. Mexico Nations League soccer game over the Fourth of July weekend had to be halted, due to fans throwing objects at players and screaming offensive chants. Cracking down on poor fan behaviour Security directors are consistently reporting a disturbing uptick in poor fan attitude and behaviour With players across all major sports leagues commanding more power than ever before, they are demanding that sports venues crack down on poor fan behaviour, particularly when they are the targets of that behaviour. Whether it’s an extension of the social-media divisiveness that’s gripped society, or people unleashing pent up negative energy, following 15 months of social isolation, during the COVID-19 global pandemic, security directors are consistently reporting a disturbing uptick in poor fan attitude and behaviour. They’re also reporting a chronic security guard shortage, like many businesses that rely on relatively low-cost labour, finding candidates to fill open positions has been incredibly difficult. Low police morale To add the third component to this perfect storm, many police departments are struggling with morale issues and officers are less likely to put themselves into positions, where they could wind up in a viral video. According to the Police Executive Research Forum, police officer retirements in the U.S. were up 45% in the April 2020 - April 2021 period, when compared to the previous year. Resignations were up 18%. In this environment, officers may be less likely to undertake fan intervention unless it’s absolutely necessary. This can seem like the worst of times for venue security directors, as they need more staff to handle increasingly unruly patrons, but that staff simply isn’t available. And, because the security guard staffing industry is a commoditised business, companies compete almost solely on price, which requires that they keep salaries as low as possible, which perpetuates the lack of interest in people participating in the profession. Digital Transformation There is only one way out of this conundrum and that is to make security personnel more efficient and effective. Other industries have solved similar staffing and cost challenges through digital transformation. For example, only a small percentage of the total population of restaurants in the U.S. used to offer home delivery, due to cost and staffing challenges of hiring dedicated delivery personnel. Advent of digital efficiency tools But with the advent of digital efficiency tools, now virtually all restaurants can offer delivery But with the advent of digital efficiency tools, such as UberEATS and DoorDash, now virtually all restaurants can offer delivery. Likewise, field-service personnel are digitally connected, so when new jobs arise, they can be notified and routed to the location. Compare this to the old paper-based days, when they wouldn’t know about any new jobs until they picked up their work schedule at the office, the next day and you can see how digital transformation makes each worker significantly more efficient. Security guards and manned guarding The security guard business has never undergone this kind of digital transformation. The state-of-the-art ‘technology’ has never changed - human eyes and ears. Yes, there are video cameras all over stadiums and other venues, but behind the scenes is a guard staring at a bunch of monitors, hoping to identify incidents that need attention. Meanwhile, there are other guards stationed around the stadium, spending most of their time watching people who are doing nothing wrong. Think about all the wasted time involved with these activities – not to mention the relentless boredom and ‘alert fatigue’ from false-positive incident reporting and you understand the fundamental inefficiencies of this labour-based approach to security. Now think about a world where there’s ubiquitous video surveillance and guards are automatically and pre-emptively notified and briefed, when situations arise. The fundamental nature of the security guards profession changes. Instead of being low paid ‘watchers’, they instead become digitally-empowered preventers. AI-based screening and monitoring technology This world is happening today, through Artificial Intelligence-based screening and monitoring technology. AI-powered weapons-detection gateways inform guards, when a patron entering the venue is carrying a gun, knife or other forbidden item. Instead of patting down every patron with metal in their pockets, which has been the standard practice since walk-through metal detectors were mandated by sports leagues following 9/11, guards can now target only those who are carrying these specific items. Video surveillance and AI-based analytics integration Combining surveillance video with AI-based advanced analytics can automatically identify fan disturbances Combining surveillance video with AI-based advanced analytics can automatically identify fan disturbances or other operational issues, and notify guards in real time, eliminating the need to have large numbers of guards monitoring video feeds and patrons. The business benefits of digitally transformed guards are compelling. A National Hockey League security director says he used to have 300 guards manning 100 walk-through metal detectors. By moving to AI solutions, he can significantly reduce the number of scanning portals and guards, and most importantly redeploy and gain further operational efficiencies with his overall operational strategy. Changing staffing strategy This changes the staffing strategy significantly and elevates the roles of guards. Suddenly, a US$ 20-per-hour ‘job’ becomes a US$ 40-per-hour profession, with guards transformed into digital knowledge workers delivering better outcomes with digitally enabled staffs. Beyond that, these digitally transformed guards can spend a much higher percentage of their time focused on tasks that impact the fan experience – whether it’s keeping weapons out of the building, pro-actively dealing with unruly fans before a broader disruption occurs, or managing business operations that positively impact fan patron experience. Digitally transforming security guards Perhaps most important, digitally transforming security guards elevates the profession to a more strategic level, which means better pay for the guards, better service for clients of guard services, and an overall better experience for fans. That’s a perfect storm of goodness for everyone.
In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximise benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realise the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronised to the management terminal. Remote authorised unlocking With the key-centric access management system, remote authorised unlocking can be realised Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorised unlocking can be realised. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.
Ask anyone how they are, and you will probably get the default response: “Fine.” Ask again and you will get a more truthful response. This could be anything from how things are going well, through grumbling around sports results, or more serious statements about pressure and mental health. Getting that real response is essential if you are going to make a difference in the future. For those of us involved in security and access management, pressure is almost a default state. Managing risk and preventing theft or data loss involves being right all the time, minimising the windows of opportunity for attackers, and keeping users productive. The last year has involved supporting remote work, managing access and identities, and keeping things working when faced with restrictions and problems on a daily basis. According to research, managing remote workers has been the biggest challenge to IT teams since the start of the pandemic. The impact of this is high, too - nearly two-thirds (66.3 percent) of IT professionals agree that they feel overwhelmed by trying to manage remote work. Of those surveyed, 55.9 percent plan to spend more on security during the next twelve months. At the same time, more than half (55.7 percent) of IT professionals feel like they are spending too much to secure and enable remote work, and (61.6 percent) believe that their company pays far more for tooling to manage users’ identities and devices than they need (or use). Looking ahead, fingerprint readers could be used as part of user authentication to grant logical and physical access So what can we learn from these findings? The first thing is that the hybrid workspace is here to stay, and these trends aren’t going away as we emerge from the pandemic. Managing access - whether it is to cloud assets, on-premise, or to accounts on remote devices - will therefore be important in the future. The second is that improving the impact of any spend around identity should be on the roadmap for any business, but particularly at smaller companies. Implementing multi-factor authentication (MFA) is one step that everyone should take as it prevents unauthorised access to devices, applications and data. Alongside this, companies can look at how to integrate authentication into their wider working processes through risk-based conditional access and expanding mobile authentication factors. For example, many smartphones today have fingerprint readers included, and these readers can unlock devices and authorise purchases. Looking ahead, those fingerprint readers could be used as part of user authentication to grant logical and physical access, based on integrating those devices into the wider authentication and access control strategy. For many SMBs, the cost to manage access can be high when it involves implementing a traditional directory to control who has access to what. These directories involve hardware and software assets that are costly to run, so cloud-based services can offer a better approach. By removing the hardware side, and by cutting the software cost, more small businesses can improve their approach to identity and access management. Supporting a hybrid world of a physical office and remote access will put more emphasis on identity management Alongside the cost, getting people with the right skills is essential. For example, the ISC2 has estimated that there are around 3.12 million open roles for IT security professionals worldwide. Similarly, according to research by the London School of Economics, the amount of training available is reducing with expenditure per trainee falling by 17 percent. With so many open roles unfilled - and with lower budgets to train them - simplifying the overall process around access control and security is a must. This makes life easier for IT admins that are in place, and helps to free up time. The good news is that budgets have gone up for many IT admins - nearly three-quarters (74.8 percent) of small companies’ IT budgets increased during 2020, and nearly half (49.6 percent) increased by at least 10 percent. While this increase in spending was not matched by higher wages, it seems as though the majority of IT admins have actually seen their satisfaction levels increase. What can we take away from all this? Firstly, the importance of feeling like you are making a difference to your organisation is critical. As companies moved everything online and had to support remote working, the IT admin had to step up. Secondly, supporting a hybrid world of physical office and remote access will put more emphasis on identity management. This environment is one that all companies will have to embrace, even as the world looks to get back to normal. And it will be one that we can all make more than just “fine.” Instead, we can make this hybrid environment more secure and more productive for everyone.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalisation in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialogue over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritisation to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customised accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”
For more than 22 years, Open Options, Addison, Texas, has developed access control solutions that connect to leading security technologies to deliver a full-scale solution based on each customer’s unique needs. In 2018, Open Options was acquired by ACRE, which already owned the Vanderbilt and ComNet brands. To find out the latest, we interviewed Chuck O’Leary, President of Open Options. Q: It has been two and a half years since Open Options was acquired by ACRE. Briefly describe that transition and how the company is stronger today because of it. O’Leary: The ACRE transition really focused on integrating our access control solution, DNA Fusion, with Vanderbilt Industries technologies in order to further our reach in the market and enhance our portfolios. With their support, we have been able to accelerate innovations and expand our global reach. Overall, it has been a great experience to be a part of the ACRE organisation, and it has opened the doors to new opportunities for us both here in the states and globally. Q: What is "Connect Care" and how does it benefit integrators and/or end user customers? O’Leary: For those unfamiliar with the world of access control, it can often be a little overwhelming when first introduced; however, we strive to make our products as easy to use and intuitive as possible, with Connect Care being no different.Connect Care is a system that has been specifically designed to create the most connected experience in the security market Connect Care is a system that has been specifically designed to create the most connected experience in the security market. It serves as a 24/7 bridge from our customers to services like technical support, platform support, professional services, and training. By providing these options for our customers, we can better empower them with the knowledge and expertise of our DNA Fusion access control system and ensure their success with the product. Q: Who are the new customers entering the market for access control systems in the wake of the pandemic, and how should they be approached/managed differently? O’Leary: Over the last year, there has been a huge demand for access control systems as remote work increased due to COVID-19, and even now, as employees and students are heading back into the offices and schools. Organisations are realising that having an outdated security system is no longer robust enough for the rapid advancement of technology that we witnessed over the course of the pandemic, and really the past few years. For those who are just dipping their toe into a new access control deployment, the most important thing they can do is to search for a provider who has a solution that is easily integrated, scalable, and provides excellent training and resources. Q: Define the term "touchless access control" and explain why it is gaining a higher profile in the post-pandemic world. O’Leary: The interesting thing about access control is that it has almost always been touchless. Many organisations are looking for robust solutions that are touchless and can be utilised remotely, and it's fairly easy to understand why a solution like this would become widely popular because of COVID-19.Integrators are searching for access control systems that will serve as a proper solution for organizations The process of using access control to streamline security infrastructures is not a new concept by any means, but due to the rapid development in technology over the past few years, more integrators are searching for access control systems that will serve as a proper solution for organisations, while still supplying the touchless and remote-based features. Q: What do you see as the future course of the changing technology trends we see in today's market (such as mobile credentials, cloud-based systems, cybersecurity, etc.)? O’Leary: As we continue to tread through the different technological developments in the market today, we are noticing that mobile credentials and biometrics are becoming increasingly popular. As cybersecurity and mobility continue to become more important, we are also seeing the rapid jump to the cloud. By utilising cloud-based systems, an organisation is not hindered by a lack of storage or old software and gains the flexibility to scale their security system as their business grows. Q: How will the access control market look different five years from now versus today? What about 10 years from now? O’Leary: Within the next five years, I suspect that access control will continue to make the move towards cloud-based systems and utilise mobile credentials and biometrics. In 10 years, I think all access control will be open platform and many more organisations will embrace cloud solutions for increased functionality. Also, innovations will continue to be the drivers behind new deployments with some installations being biometrics only and include recognising fingerprints, retina scans, facial recognition, and voice. Q: What is the biggest challenge currently facing the access control market, and how should manufacturers (including Open Options) be addressing the challenge? O’Leary: One of the biggest challenges facing the physical access control market is organisations actually making the shift to more up-to-date access control systems. Organisations are looking to adopt more digital-focused access control experiencesOrganisations are looking to adopt more digital-focused access control experiences — ones that are focused on integration, newer features, cybersecurity, and ease of monitoring. Access control manufacturers should be addressing this challenge by creating integratable, scalable systems that are easily managed and provide a structured, streamlined approach for an organisation’s security infrastructure. Q: What is the biggest misconception about access control? O’Leary: Access control is not a one-size-fits-all solution, and some organisations might have different standards or assets that need protection. This is why it's vital to know the risks your organisation faces when speaking with access control providers — to ensure the best possible outcome for your specific needs. It's important to remember that whatever access control system is chosen should proactively mitigate any risks, be easily taught to and successfully used by employees, and be scalable with your organisation. No matter the line of work, a proper access control system should streamline the security infrastructure and lessen stress on the security team and employees.
Installation company Nessence recently integrated Vanderbilt’s ACT365 cloud-based access control and video management system with Mobile BankID in Sweden. Mobile BankID is a citizen identification solution that allows companies, banks, and government agencies to authenticate and conclude agreements with individuals over the internet. The integration with ACT365 comes together to solve a brief put forward by the supermarket chain, ICA Sweden. Web API for integration Tobias Olofsson, Project Sales Manager at Vanderbilt, explains that ICA Sweden is a retailer with a focus on food and health, and they wanted to be open earlier in the morning and later in the evening. “It would be too expensive to hire staff to stay open during these times in smaller locations. This is because the number of customers shopping early in the morning or late at night is minimal. But the store wants to be able to provide its customers with this value-added service,” says Olofsson. ACT365 was the perfect solution for this project due to its easy deployment, easy operation To solve this, the supermarket wanted to open unmanned and needed a solution to allow customers to enter the store in a functioning and approved manner by the insurance company. In Olofsson’s opinion, ACT365 was the perfect solution for this project due to its easy deployment, easy operation, and a smooth web API for integration. Increased accessibility and convenience “The success of this project means it is now possible for shoppers to open the supermarket’s entrance door by digitally signing into the Mobile BankID on their phone and presenting it to the ACT365 reader located on the outside of the door,” states Olofsson. Moreover, good accessibility is maintained as all customers do not need to have specific cards or tags for the access system to be able to enter the supermarket. “A new modern solution has been developed to facilitate trade for private individuals, especially in smaller towns where food stores do not tend to stay open for as long as in the big cities. This project has resulted in increased profits for the supermarket, as well as increased accessibility and convenience for its customers,” concludes Olofsson.
Retailers face complex challenges that range from loss prevention and maintaining a safe environment for both customers and staff to improving customer experience and operational productivity. Choose Ava Unified Security (formerly Vaion) to ensure security operators can tap into advanced analytics to detect and react to anomalies in real-time. Additionally, store managers can use Ava’s customer intelligence insights to increase profits and meet the customers’ needs. Leverage Ava’s machine learning anomaly detection to get alerts on people and vehicles loitering or cars present out of hours. Facilitating advanced analysis Get a clear understanding of activity at rear entrances, aisles, or end-caps by counting people who congregate in certain areas. Track cash register points to minimise thefts and identify return frauds. Authorised users can share links of recorded video securely with team members, claim investigators, and law enforcement. Monitor queues and the number of employees behind counters to ensure minimal waiting time Use counting of people and vehicles entering and exiting to analyse store performance, footfall, queues, and allocate more staff during busy periods. Download and share historical data of occupancy information with store managers to facilitate advanced analysis. Improve store safety by detecting verbal aggression, robberies, and vandalism, and empower security operators to act before incidents escalate. Track goods and control access as vehicles are entering your warehouses. Get notifications in real-time when trucks are approaching loading docks and prevent the damage of fleet and storage areas. Monitor queues and the number of employees behind counters to ensure minimal waiting time. Use Ava’s powerful search features to investigate across all stores, warehouses, and distribution centres and identify repeat offenders or suspects. Enhanced overview of operational insights Increase operational productivity and reduce store and warehouse costs Distribute air efficiently to match economics and customer comfort Use people flow insights to manage queues efficiently Understand the customers’ in-store activity and which are the least and most visited areas Enhanced customer experience Get insights on the customers’ in-store traffic patterns Instant notification when queues are detected to allocate staff according to the busiest business hours Find out which of the locations perform the best and why Saving storage and money Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimisation Pay for what is needed, when it is needed, without the hassle of complicated licensing Up to 200 cameras per Ava vserver appliance—small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons With a simple licencing model, Ava always includes services and software upgrades. One no longer has to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorised from unauthorised people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. Everyone treasures their leisure. The right access solution can help one do it safely without putting a burden on those responsible for one’s security. We treasure our leisure. The right access solution can help us do it safely without putting a burden on those responsible for our security. Controlling access to outdoor sites and visitor attractions Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote - far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software one can access from anywhere, matches or exceeds the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within one’s system exactly like standard interior locks. Intelligent electronic key systems are also budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems let one roll out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Centre in Wales attracts tens of thousands of tourists every year. Both mechanical and electromechanical locking protect a site which houses critical infrastructure and watersports facilities - with disparate security needs. Here electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed when keys are lost. Permissions are simply deleted from the system software. In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labour-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. Carrying one programmable key able to open doors, windows and padlocks makes the security team’s rounds easier It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours - for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector When Edvard Munch’s painting “The Scream” was stolen from an Oslo museum in 1994, thieves left a note which read: “Thanks for the poor security”. Securing museums - open spaces with priceless contents - presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction - and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimises the number of keys in circulation - with obvious security benefits. Companion software makes key tracking straightforward: one always knows who exactly is carrying credentials, can refine or amend those permissions quickly and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Museum access control in action London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries Electromechanical locks now control access through 56 doors, forming part of a security ecosystem which incorporates traditional mechanical locks, too. Using intuitive management software, security managers ensure every staff member accesses only the right areas. Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose - CLIQ® from ASSA ABLOY - also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be “subtle, but ever present,” according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. This was the checklist facing France’s Musée Maurice Denis: the museum is inside a listed 17th-century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside and outside the main building; waterproof padlocks protect CCTV camera housing on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th-century warship Vasa demand Sweden’s highest level of locking: Class 3. Yet the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity According to one study completed two decades ago, one spends 87% of one’s time indoors. The number is probably higher now - and includes a huge chunk of one’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here over 170 shops, a cinema, sports centre and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Yet a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorise and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail - who accessed which lock, and when - takes a couple of mouse clicks. CLIQ also cuts Festival Place operational costs. The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever one gathers to enjoy leisure - indoors or outside - CLIQ enables easy access control for all openings with just a simple, single, programmable key. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Resilience and efficiency have become watchwords for the public institutions, before, during and after the ongoing health crisis. In delivering services fit for the modern world, these institutions need more than just innovation and accountability. They require flexibility and agility, too, including in how they approach security. The lock and key have enjoyed public trust for a long time. Keys were used in Ancient Egypt and Assyria, and warrant a mention in the Christian Old Testament. As a technology the key is familiar and proven, user-friendly and dependable. It can also be inflexible and time-consuming to manage. The security challenges of delivering public services do not stand still, but standard mechanical keys cannot move with oneself. Filtering access intelligently and dynamically has become part of security’s job description. Yet there is no need to dispose of the key altogether. One can adapt it, rather than throw it out. Intelligent, programmable keys combine the powerful features of electronic access control with the convenience of a mechanical key. They are keys, familiar and user-friendly… but evolved. When the key has a brain, one can do more with less. These efficiencies are critical in a world where demands on the public institutions are at levels not seen in generations. Cut workload and solve the problem of lost keys One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys" Lost keys present mechanical security with its most intractable problem. When a key goes missing, time and budget are expended to remedy the situation. Extensive rekeying and reissuing to relevant keyholders are complex and expensive. Programmable keys, however, solve the problem quickly. The French town of Villiers-le-Bel, north of Paris, faced these familiar key management challenges. Each person in their Municipal Technical Centre carried approximately 40 physical keys. If one was lost or stolen, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced, too, at great expense. Key duplication costs were mounting. “One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys,” explains Fabrice Girard, Territorial Technician at the town’s Municipal Technical Centre. To fix this expensive lost key problem, Villiers-le-Bel city administrators chose to combine trusted mechanical security with new electromechanical key-operated locking, all managed within the same flexible, wireless access control system. Now lost or stolen electronic keys are cancelled instantly using secure cloud software which works inside a standard browser, no software installation required. Administrators can program access rights for any key, padlock or cylinder. They filtre access to specific sites and doors according to the precise requirements of every municipal employee. Keep residents safe in their homes In Aalborg, Denmark, around 3,000 citizens in home care have programmable locking cylinders installed at their front door. This replaces a cumbersome mechanical master-key system. Aalborg’s installation was tailored to meet the needs of this vulnerable group of city residents. Certified technicians simply replaced each old cylinder with a programmable cylinder If a home care resident loses their key, its access rights can be deleted from the system without the need for a lock replacement — keeping the keyholder’s home safe and saving the city time and money on rekeying. Managing Aalborg’s system is straightforward. Lock installation was quick and easy: certified technicians simply replaced each old cylinder with a programmable cylinder — with no wiring and no major alterations to the door. Aalborg’s fire brigade quickly took over the maintenance process. Brigade staff now grant or revoke access, and tailor permissions for different users or locations according to defined needs. In Skellefteå, Sweden, electromechanical locking has given local firefighters faster, safer access to any building. To speed up emergency response times and improve firefighter safety, the local service fitted houses with secure façade key cabinets.More rapid response means a better chance to prevent a fire spreading Property keys are stored inside the cabinets, so authorised firefighters get rapid building access if there is a fire. When the emergency call comes, firefighters update their individual, programmable key at the station or while on the move, using a remote key updater kept in the fire engine. There’s no longer any need for fire stations to hold multiple sets of keys or for off-site firefighters to divert to the station to collect the right key. More rapid response means a better chance to prevent a fire spreading. Safety is improved for everyone, Skellefteå residents at home and firefighters at work. Clear workflow bottlenecks in public housing With crime against empty properties on the rise, public authorities in the English city of Rotherham aimed to minimise the time a council house stands vacant. However, workers from multiple departments require access to prepare a property for a new tenant. Passing keys securely between all relevant staff members was a major cause of delay. Security managers issue the precise permissions which every staff member needs At Rotherham Metropolitan Borough Council (RMBC), intelligent key technology helped streamline these workflows, upgrading security and saving money at the same time. RMBC identified physical key handover as a major bottleneck in their workflow. They needed a solution to speed up the process. Now, each relevant RMBC staff member is issued with their own programmable key. Using simple online software, security managers issue the precise permissions which every staff member needs. The access rights of any key can be amended or revoked at any time. Physical handover of mechanical keys, and the time and money spent coordinating this process, has been eliminated. Preserve the fabric of historic buildings, and the design integrity of new spaces Building type can make a big difference to the access control one chooses. Public spaces inside protected heritage buildings often cannot opt for card- and reader-based access control. Here, wireless electronic cylinders which simply replace existing mechanical locks solve the problem, preserving doors which may be centuries old. Intelligent key security is hardly noticeable for the library’s many visitors The issue of aesthetics also affects modern public spaces, albeit differently. In Stuttgart, innovative design was a key element of the city’s new library building. Door security should be discreet and not disrupt the vision of Korean architect, Eun Young Yi. This was the first public building in Stuttgart’s Europaviertel, a unique creation with a double façade with glass bricks, a brightly lit atrium four storeys high, and public entrances on all four sides. Almost as soon as it opened, the building was declared an architectural icon — “instantly one of the world’s most beautiful libraries.” Intelligent key security is hardly noticeable for the library’s many visitors, yet critical for protecting Stuttgart’s precious public heritage Save time and money managing keys for a mobile workforce Many public services involve managing and directing a mobile or contractor workforce. Mileage expense mounts up when workers must return to base to collect keys or update their access rights. With a Bluetooth-powered solution, everyone carries their own programmable key Mobile workers use more fuel and increase a carbon footprint. One makes a business more sustainable quickly if one reduces the mileage one travels. Reducing miles while maintaining security is not easy, if one relies on mechanical keys to secure remote or dispersed sites. Bluetooth-enabled intelligent keys eliminate the need for workers to return to headquarters to collect or return a mechanical key. With a Bluetooth-powered solution, everyone carries their own programmable key and keeps its access rights up to date on the move, simply by making an encrypted connection to a secure smartphone app — meaning fewer miles driven and less money wasted on unnecessary fuel. One technology powers all the solutions All the installations referenced above — and many, many more across the full spectrum of public services — run on the same technology: CLIQ® from ASSA ABLOY. CLIQ combines electronic and mechanical security in a range of wireless cylinder applications, including a full range of mechatronic and electronic cylinders and padlocks. CLIQ locks are installed without wires: every cylinder’s power is supplied by a battery inside the CLIQ key. These keys are physically identical and programmable by a system administrator using a desktop updater; by keyholders with a portable programmer; or in the case of CLIQ Connect Bluetooth-enabled keys, via an encrypted connection to a secure smartphone app, minimising both wasted journeys and unnecessary social contact between workers and office staff. Intuitive software makes it simple to manage access rights, enable and disable keys and customise access schedules, on site or on the go. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Protecting assets and people has always been a top priority for Kirkland’s, a global home décor retailer. With over 400 stores in 37 states, Kirkland’s is a go-to spot for a broad selection of distinctive merchandise: art, mirrors, candles, lamps, frames, accent rugs, furniture and more. When they evaluated their security solutions in 2016, they determined they needed to upgrade the analog video surveillance systems in use at their existing locations and plan for new stores. Saraya Charlton, Kirkland’s Loss Prevention Investigator, said the analog video surveillance cameras they had in place were acceptable, but they desired cameras with wider coverage and better resolution. The department was also frustrated with the amount of time it took to investigate incidents for loss prevention and personal injury claims. Each time they were called to investigate an incident – vandalism, theft, employee misconduct, a slip and fall, or a cut from broken merchandise – each individual store had to extract the footage from the analog DVR at that location and send it to loss prevention at Kirkland’s headquarters. IP-based video surveillance system Charlton said Kirkland’s sought an IP-based solution that could be accessed remotely Charlton said Kirkland’s sought an IP-based solution that could be accessed remotely, that would make the loss prevention investigation process more efficient, and would provide additional benefits. Management wanted a camera that provided a clear picture, while minimising bandwidth usage and had analytics capability. Working with several systems integrators, Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by salient enterprise Video Management Software (VMS). Wisenet X series XNV-6011 2MP HD dome cameras The first phase of the security upgrade has included the deployment of 1,800 Hanwha Wisenet X series XNV-6011 2 megapixel HD dome cameras and Wisenet Lite vandal-resistant dome cameras at 200 Kirkland’s locations, as well as the distribution center and the e-commerce building. As new stores are built by this growing retailer, they will also include the Hanwha-Salient security solution. They expect to have a full migration to IP at all locations by 2021. Each Kirkland’s location is outfitted with approximately eight cameras that are positioned to capture the entrance, the sales floor and the back of house operations. Charlton said Hanwha’s cameras provide the most comprehensive view of the store possible. Retail security “The wide-angle capability – as well as the quality of the camera – is really what sold us on Hanwha,” said Charlton, adding “We are getting the best views possible and they are allowing us to see the entire sales floor which is exactly what we wanted and needed.” Hanwha’s Wisenet X series of cameras is a perfect fit for the retail environment. The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less. Hanwha’s Wisenet X series of cameras is a perfect fit for the retail environment Video analytics, DVR and VMS Charlton said the Hanwha cameras are particularly useful at store entrances because, thanks to the WDR feature, video images are not affected by the bright sunlight that often shines through the windows and they can still see faces clearly. And because many of Hanwha’s cameras offer license free analytics, Kirkland’s will begin exploring that capability in the future to gain information on people counting, heat mapping and dwell time. The Hanwha-Salient solution has improved Kirkland’s loss prevention investigation efficiency since the team is able to pull recorded video from any camera via the Salient VMS rather than wait for information to be extracted from an analog DVR. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot and resolve any camera issues remotely first rather than unnecessarily sending out a service technician. WiseStream II compression technology In addition to offering quality images, improved field of view and more efficient operations, the Hanwha solution has also helped Kirkland’s conserve valuable bandwidth with Hanwha WiseStream II compression technology, said Charlton. WiseStream II dynamically controls encoding, balancing quality and compression according to movement of the image. Combined with H.265 compression, bandwidth efficiency can be improved by up to 75 percent compared to current H.264 technology. “We share our video surveillance and security bandwidth with our Point of Sale system and we don’t ever want to take away from the bandwidth of POS transactions or impact the speed at which they go through,” said Charlton. “Hanwha’s Wisestream compression technology fits our business model and along with Salient helps preserve and efficiently manage bandwidth. It’s really helpful to have a camera that’s smart enough to be able to tweak and regulate itself.”
Car theft is a concern for many people, so imagine if one person was responsible for a whole load of them. Car dealer P. Christensen in Denmark knows this headache from personal experience, suffering a number of thefts from their fenced area. It was time to ramp up security, so they turned to Telesikring, the largest private-owned security company in Denmark, for a perimeter detection solution. Telesikring upgraded security with a solution using Hikvision surveillance cameras. Despite existing security measures like electric fences and burglar alarms, the car dealership was still experiencing thefts. Thieves were managing to come up with increasingly imaginative ways to beat the system – like crawling over fences and even digging underneath them. Perimeter detection solution They stole all sorts of items, including wheels and catalysts from the cars and vans exhibited at the site. These represent quite some value, and the cost of these losses was mounting up. They needed a solution which could work for them in all sorts of weather conditions and in the dead of night – the most vulnerable time. The premises have some quite remote outlying areas, which were also particularly at risk. The car dealership is now monitored using a perimeter detection solution made up of both conventional and thermal cameras. These cameras are connected to a Milestone VMS with analysis software. In turn, this has a direct connection to the Jutland Control Center, a local Alarm Receiving Center that monitors the property 24/7. Thermal Network Bullet Camera These cameras provide excellent images even in the lowest of light levels, making the ideal for remote verification Now it’s not possible to enter the property outside of opening hours - day or night, without this being registered by the control center. The information they receive from the analysis software enables them to make an informed decision on their response, for example sending a guard patrol. Thermal cameras were chosen because of the reliability in all weather conditions. This solution specifically used the Thermal Network Bullet Camera (DS-2TD2136-10). Once the thermal camera detects a break-in, it sends an alarm to the ARC and the operator there can use the low-light clarity delivered by the DarkFighter cameras (DS-2CD4B26FWD-IZS) also present to verify the alarm. These cameras provide excellent images even in the lowest of light levels, making the ideal for remote verification. Effectively prevented burglary Henrik Finn Sanderlund, Quality Manager at P. Christensen, says: “Yes, we are very satisfied! Since the deployment of the system, this has effectively prevented burglary and theft. The solution was deployed on a Thursday and on Friday the solution caught the first break in, effectively preventing it.” Managers at P. Christensen can now rest at night, safe in the knowledge that security innovation is keeping an eye on the property.
Round table discussion
The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why?
Adoption of General Data Protection Regulation (GDPR) by the European Union in 2016 set a new standard for data privacy. But adherence to GDPR is only one element, among many privacy concerns sweeping the global security community and leaving almost no product category untouched, from access control to video to biometrics. Because privacy concerns are more prevalent than ever, we asked this week’s Expert Panel Roundtable: What is the impact on the physical security market?
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?