The Genetec Channel Partner program has partnered with Credly to award verified digital badges to European channel partners who complete Genetec certification courses. Badges provide an easy way to share and validate the skills, experience and technical knowledge. Digital badges are the best tool to highlight Genetec certifications and achievements on the website, social media, profiles and more. Think of the badges as a bonus for the hard work—there's no extra cost involved. What is a d...
BIRD Aerosystems, globally renowned developer of Airborne Missile Protection Systems (AMPS) and Airborne Patrol Solutions (ASIO), will launch and present its new ASIO Protection of Critical National Infrastructure solution, which utilises state-of-the-art technologies and methodologies, and is uniquely designed for protection of critical infrastructures, such as oil, gas, electricity and utilities, at the IDEX (The International Defence Exhibition & Conference) event in Abu Dhabi. ASI...
Globally renowned sensor specialist, HENSOLDT has announced that they will modernise the artillery location radar, COBRA, which is in service with several NATO (North Atlantic Treaty Organisation) armies. Under a contract awarded by the multi-national procurement organisation, Organisation Conjointe de Cooperation en matière d’Armement (OCCAR) – Organisation for Joint Armament Co-operation, HENSOLDT will replace the Radar Target Generator (RTG), a core element for the test en...
BIRD Aerosystems, the pioneering developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information and Observation (ASIO) solutions, has received a follow-on contract to develop additional advanced capabilities for its Radar Control and Display (RCD) that controls HENSOLDT' PrecISR™ advanced multi-mode radar family. After successfully completing the first phase of development and customisation of the RCD to the PrecISR™ earlier, the next phase of develop...
HENSOLDT UK are pleased to announce the launch of SPEXER 600 multi-mission, X-Band ground-based surveillance radar utilising SharpEye solid-state transceiver technology. Building upon the excellent pedigree of well-established HENSOLDT products and technologies, SPEXER 600 complements the SPEXER family of Active Electronically Scanned Array or AESA radars, offering a cost-effective and truly crew portable field deployable solution. Design and function Designed to meet user requirements to det...
The COVID-19 pandemic has changed the way one lives their lives and the way one does business. Restrictions have been implemented to protect ones health, affecting one as individuals and the operations of the healthcare systems, companies, organisations and schools, as well as public and private institutions. Many new behaviours, such as physical distancing, virtual meetings and improved hygiene measures, will most likely linger as one gradually gets back to normal. With smart solutions, on...
The Qatar Emiri Air Force’s NH90 helicopter programme marked a major milestone last week with first flights performed in Italy and France. The first NH90 NATO frigate helicopter (NFH), assembled at Leonardo’s Venice Tessera facility, and the first tactical troop transport (TTH) over-land aircraft, assembled at Airbus Helicopters’ Marignane site, took to the air on 15th and 18th of December respectively. The flights allowed crews to evaluate general handling and basic systems and the helicopters performed as expected. NH90 helicopter programme Qatar’s NH90 programme includes 16 NH90 TTHs for land operations, 12 NH90 NFHs for naval missions, a comprehensive support, maintenance & training services package and associated infrastructure. The programme has the potential to be extended in the future with the addition of 6+6 units in a mixture of TTH and NFH variants. Leonardo is prime contractor for the overall programme and is also responsible for the final assembly and delivery of the 12 NH90 NFH helicopters from its Venice Tessera facility in Italy. The company is also supplying simulators, training aids and an extensive maintenance support and training services package for aircrews and maintenance technicians. Avionics and sensor payloads integration The NH90 is set to provide the Qatar Ministry of Defence an important and longstanding customer" Leonardo is providing, contributing to or supporting the integration of various avionics and sensor payloads, including the Leonardo LEOSS-T HD electro-optical system, HD Mission Video Recorder, Automatic Identification System, Tactical video link and Full HD display for cabin consoles. Airbus Helicopters is responsible for carrying out the final assembly of the 16 NH90 TTH aircraft. Acceptance of the first batch of NH90s by the Qatar Emiri Air Force is scheduled to start before the end of 2021, with the last helicopter planned to be delivered in 2025. Gian Piero Cutillo, Leonardo Helicopters MD, said “We’re extremely pleased to celebrate this important achievement as we continue to work to deliver this programme. The NH90 is set to provide the Qatar Ministry of Defence, an important and longstanding customer, with outstanding operational capabilities suitable for a range of missions.” Cutillo adds, “Together with our industrial partners, we’re committed to completing and introducing this essential defence and security enabler for our customer.” Design and integration of critical NH90 components Leonardo is responsible for, or contributes to, the design, production and integration of a wide range of critical NH90 components and systems. These include the rear fuselage, main gear box hydraulic system, upper modes of the Automatic Flight Control System (AFCS), plant management system, power plant integration, NFH mission system (integrating sonar, radar, electro-optics, tactical link, electronic warfare system, Identification Friend or Foe (IFF) interrogator, mission video recording and weapon systems management, including air-to-surface missiles and torpedoes for Anti-Surface Warfare (ASuW) and Anti-Submarine (ASW) missions. LOAM system and LEOSS-T electro-optical system Leonardo also integrates additional capabilities such as the LOAM system and LEOSS-T electro-optical system Leonardo also integrates additional capabilities such as the Laser Obstacle Avoidance Monitoring (LOAM) system and the LEOSS-T electro-optical system, as well as pintle-mounted gatling-type guns, for specific customers. The largest military helicopter programme in Europe, the NH90 is the optimal choice for modern operations thanks to its fully composite airframe with a large cabin, its excellent power-to-weight ratio and its wide range of role equipment. Quadruplex fly-by-wire flight control system It features a quadruplex fly-by-wire flight control system for reduced pilot workload and enhanced flight handling characteristics. The NH90 is available in two main variants: one specified for naval operations, the NH90 NFH (NATO Frigate Helicopter) and the TTH (Tactical Transport Helicopter) for land based operations. As of today, around 430 NH90 helicopters, a mixture of both variants, are in service worldwide. Aircraft on operations have logged over 270,000 flight hours in a wide range of weather and environmental conditions, over land and sea.
Security breaches of borders, utility plants and airports can have catastrophic and devastating consequences, so protecting assets is vital. The global perimeter security market is expected to reach USD29.6 billion by 2025, driven by growing terrorist threats, increased awareness of illegal immigration, planned crimes, thefts and smuggling. Continuous monitoring system Existing perimeter intrusion detection technologies typically rely on point sensors such as cameras that are positioned along a perimeter or border at regular intervals. However, cameras have their limits. They can only provide line-of-sight coverage at specific points; they do not deliver continuous monitoring or provide full visibility of the entirety of the perimeter. Asset monitoring technology This is where LiveDETECT comes in. This real-time linear asset monitoring technology from Fotech, a bp Launchpad company, turns fibre optic cables along a border or perimeter into an entire, continuous length of sensors, monitoring the asset at all times. “The sheer distance of some borders and perimeters means it is impossible to achieve true round-the-clock monitoring of the perimeter length with physical patrols or CCTV.” “The solution of positioning cameras every few metres is not feasible from an economic point of view yet leaving gaps in coverage is an open invitation for threats and intrusions,” says Ken Crowe, Security Industry Sector Manager for Fotech. Distributed Acoustic Sensing (DAS) technology Helios DAS analyses the changes to identify and to categorise the disturbance event LiveDETECT uses Distributed Acoustic Sensing (DAS) technology, which sends thousands of pulses of light along with fibre optic cables every second and monitors the pattern of light reflected back. The fibre optic cable picks up any acoustic or vibrational energy, which changes the light pattern that is reflected back to the hardware, Helios DAS, indicating a disturbance of some kind. Thanks to advanced algorithms and processing techniques, Helios DAS analyses these changes to identify and to categorise the disturbance event, such as walking near or interfering with a boundary, placing a ladder on a fence, or digging near a perimeter. Each type of disturbance has its own signature, and the technology can tell an operator in real-time, what happened, exactly where it happened and when it happened. More importantly, it can also filter out background noise, adapting its response for high-risk or low-risk zones along the perimeter. Perimeter security “If a perimeter is near a frequently-used track for runners, we can ensure that the normal activity doesn’t set off alarms.” “However, a personnel signature at 3 am or one that stops near the fence perimeter would be viewed as unusual. Any deviations from a normal pattern of behaviour can be programmed and an alert raised,” says Crowe. If a security breach is detected and there is an attempted intrusion, the system alerts the Alarm Management Server and security personnel so they can take the most appropriate action. There are three levels of alert: green, amber and red. Red is the highest alert level, usually when someone or something could imminently breach the inside of the perimeter. Easily integrated LiveDETECT should be part of a foundational security strategy. It is easily integrated into existing security systems, working in conjunction with cameras, sentry posts and unmanned aerial vehicles (UAVs) also known as drones, to provide situational awareness and to enhance overall protection. “What LiveDETECT delivers is a perimeter with no security gaps. This increases the efficacy and accuracy of identifying potential breaches, as well as boosting the speed of response through the real-time detection of incidents anywhere on the perimeter,” Crowe adds. Active intrusion alert LiveDETECT is covert and intruders will be unaware of its existence With an active intrusion alert, LiveDETECT can provide information on where cameras should be pointing. Alternatively, LiveDETECT can send GPS coordinates of the on-going disturbance to a UAV, which automatically launches itself to investigate more fully. As fibre optic cables are typically buried in the ground, LiveDETECT is covert; intruders will be unaware of its existence. Furthermore, DAS is not affected by the weather, cameras would not be beneficial in a sandstorm or a snowstorm, whereas LiveDETECT can continue to operate reliably. Robust system “LiveDETECT is a robust system into which we can build extra safe-guards. The fibre optics can be configured in a dual-loop and run in parallel to provide redundancy, and maintain coverage if a sensing cable is maliciously or accidentally cut,” Crowe says. The monitoring system software can also be mirrored to a secondary site, so alerts are recorded in two locations, ensuring the responsibility does not lie with one person. Security for the future During the last decade, technological advances have helped increase the scope of perimeter security systems. Perimeter security systems have historically been used to detect and to deter intrusions in military facilities and critical infrastructure. Today, they are being adopted in commercial and transportation sites as well as residential gated communities in high-risk countries. LiveDETECT fills the gaps in the border and perimeter surveillance efforts, delivering continued monitoring compared to existing technologies, improved security, reduced human and drug trafficking and detection of tunnel digging. Crowe concludes, “LiveDETECT’s ability to provide continuous monitoring of an entire perimeter and to raise alerts in real-time, gives security teams the comprehensive overview they need to manage their operations and respond to threats effectively.”
Leonardo has recently proven the newly-expanded capabilities of its ULISSES acoustic anti-submarine warfare (ASW) system in a demonstration off the coast of Italy. During the demo, Leonardo showed how the Firefly, AQS-18, dipping sonar from L3Harris Technologies worked in concert with the ULISSES processor to automatically locate simulated enemy submarines and alert the crew to their presence. Firefly sonar integration with ULISSES system The demonstration follows the successful integration of the Firefly dipping sonar with the ULISSES system. Firefly has incorporated high-powered active sonar that can dive down up to 200 metres below the sea surface and detect targets as far away as 20 miles, while transmitting sonar and sonobuoy processing, audio and video to the shore via a wideband data link. For the demo, the ULISSES and Firefly equipment was installed on a naval vessel, while an Italian Navy NH-90 helicopter was supported by dispensing sonobuoys during the trial. ULISSES acoustic anti-submarine warfare system A key design feature of the ULISSES/Firefly system is its lightweight form factor A key design feature of the ULISSES/Firefly system is its lightweight form factor, which can also be fitted to small, light helicopters for littoral operations. The integrated capabilities shown in the demo represent a solution to the growing requirement from armed forces to conduct ASW operations in blue and shallow waters. Observers on-board the command ship were able to watch on an operator’s screen as ULISSES acoustic anti-submarine warfare (ASW) system combined inputs from the Firefly dipping sonar with data from active and passive sonobuoys to automatically locate potential contacts and raise alerts. Multi-static functionality The ULISSES and Firefly systems offer ‘multi-static’ functionality where the processors collect and exploit data from up to 64 distributed dipping sonar and sonobuoy sensors, using the multiple sources of information to accurately triangulate the location of enemy submarines. ULISSES was introduced to the market at Farnborough International Airshow in 2018 and was successfully demonstrated in a live sea trial in November 2019. The system is now fully developed and talks are on-going with a range of potential launch customers. Highly-advanced capabilities The successor to Leonardo’s well-regarded OTS-90 acoustic system for Italian and Dutch NH-90 helicopters, ULISSES provides highly-advanced capabilities in an even more lightweight package. This makes it ideally suited to smaller helicopters and is designed as a form-fit replacement for the OTS-90, making it an attractive proposition for the retrofit market. The system is also suitable for fixed-wing aircraft, naval vessels and, without the dipping sonar, drone aircraft.
The video-based fire detection Aviotec IP starlight 8000 from Bosch can now be used in environments without visible light. With the help of newly developed AI algorithms for video analytics, Aviotec's firmware version 7.72 is now able to reliably detect smoke and flames even with pure infrared lighting. Up to now, it was already possible with Aviotec to reliably detect flames and smoke in difficult lighting conditions down to a minimum of 2 Lux. Expanded field of application There are many applications in dark environments in which the new version of Aviotec offers an optimal solution for customers. Wherever there is a high fire hazard or a high fire load, for example in logistics and production, Aviotec in combination with IR-lighting is a suitable fire protection system to detect fires as they occur. Operators of warehouses that contain packaging material and are not illuminated at night or warehouses that have no lighting at all can benefit from this, for example, so that the risk of fire is significantly reduced from the outset due to lack of electricity. Power-over-Ethernet (PoE) Power-over-Ethernet (PoE) does not require the installation of power lines for Aviotec. In conjunction with IR lighting, Aviotec's new firmware version also reduces the risk of fire in industries that work in two shifts and do not use conventional lighting at night. Aviotec also offers a reliable solution for aircraft hangars, where visible interior lighting has been deliberately omitted for reasons of burglary protection outside working hours. The same applies to archives with particularly valuable documents and correspondingly high fire load. In all these cases, Aviotec ensures a particularly fast and reliable fire detection, since fires can be detected directly at the source of the fire without the need for the smoke to reach a fire detector. Video-based fire detection Aviotec can be used in almost all areas of fire protection, whether in daylight or poor lighting conditions "From daylight to poor lighting conditions to situations where there is no visible light at all - since the market launch of Aviotec in 2016, we have continuously been setting new benchmarks in video-based fire detection,” comments Soeren Wittmann, Product Manager at Bosch Building Technologies. "This means that this promising technology can now be used in almost all areas of fire protection." Additional benefits of video surveillance and analysis The intelligent video analytics is directly integrated into Aviotec. In all environments, the installed cameras can be used simultaneously for fire detection and video surveillance, further reducing the installation and operating costs considerably. VdS and CSIRO TS010 certified solution As the first solution for video-based fire detection, Aviotec has already passed the demanding test procedure of VdS Schadenverhütung GmbH in 2018. Not only functionality and reliability were confirmed, but also the high immunity against false alarms. In addition, Aviotec IP starlight 8000 received certification according to the Australian standard CSIRO TS010 for video-based fire detection systems in April 2019. The firmware version 7.72 of Aviotec IP starlight 8000 is now available. Operators of existing Aviotec solutions can upgrade their system to the new version by a free firmware update.
Leonardo announces that WIKING Helikopter Service GmbH has taken delivery of a new AW139 7-tonne intermediate twin engine helicopter from Leonardo’s Vergiate facility, further expanding an existing fleet of three aircraft. The helicopter will be used to carry out offshore transport missions supporting energy industry operations in Northern Europe. WIKING has been an offshore transport specialist in the North and Baltic Sea areas for over 45 years. It has three bases in Germany and two in the UK. Unrivalled mission capabilities The Company also performs sea pilot transfer, a windmill engineer hoisting service, and emergency medical service operations with its fleet of seven helicopters of various types. “Our fleet standardisation and modernisation programme launched a few years ago is helping to meet the evolving requirements of our customers and the growth of our AW139 fleet is providing a valuable support for this goal.” “Our decision to leverage the unrivalled mission capabilities, operational efficiency and reliability in its category of the popular AW139 are testament to our commitment to delivering the best level of safety, quality, and service across the region,” said Ernst Nassl, CEO Wiking Helikopter Service GmbH. Law enforcement duties The global fleet of nearly 1,100 units has amassed over 2.9 million flight hours to date The AW139 has proven extremely popular in the region for offshore, search and rescue, passenger transport and law enforcement duties. The type set new standards in terms of flight and mission technology, cabin space and comfort, performance, safety and reliability as well as introducing advanced support, maintenance and training services. The AW139 is even exceeding the evolving energy market’s stringent requirements with unique features including a 60+ minutes run dry capable main gear box and full or limited ice protection system as an option to fly in known icing conditions for true all-weather operations. Nearly 1,200 AW139s have been ordered by more than 280 customers in over 70 nations to date for any kind of mission. The global fleet of nearly 1,100 units has amassed over 2.9 million flight hours to date.
Permanent video observation is in place at busy traffic junctions in many towns. With the Traffic Enforcement Module on the Dallmeier HEMISPHERE® software platform, public authorities can now capture traffic incidents or offences quickly and simply with an easy-to-use software tool. A precisely definable and adaptable process enables users to evaluate and follow up on incidents efficiently with digital tools – while adhering to the evaluation and data protection regulations. Capture traffic violations Live video surveillance is already performed or under consideration at many car parking facilities and traffic junctions. With the Dallmeier HEMISPHERE® Traffic Enforcement Module, local authorities now have the capability to capture traffic violations and file video sequences of the offences efficiently within these existing surveillance systems. Cloud capability and compatibility The solution provides operators with a user-friendly function set that enables them to perform all of these tasks quickly and intuitively. Local authorities can thus optimise the process of investigating and punishing traffic violations, and so generate additional revenue. Users can implement the system with both Dallmeier cameras or with third-party systems. The HEMISPHERE® SeMSy® components can be operated either on-premise or in public cloud environments such as Microsoft Azure, Amazon Web Services (AWS) or Google Cloud Platform. Accurate logging during capture If an operator observes a traffic offence, he can start the recording of the camera live stream immediately. For this purpose, the app features a control centre on a time bar for starting, stopping and cancelling recordings. Backup of the recording is made automatically in the background and can be cancelled if an offence has not taken place After a recording has been stopped again, a backup of the recording is made automatically in the background, and it is saved to an archive together with a timestamp, the name of the camera and the name of the operator. Recordings can be cancelled if an offence has not taken place. For this, the operator must provide a reason either from a dropdown list or in free text. Depending on the requirements applied to a system, selection options with subsequent text input fields can be configured individually. At the same time, all user actions are logged in full. Optimised workflows Besides the actual recording and saving routines, the system also maps the process for follow-up processing of incidents: First, all recorded offences are listed in the module in a chronological overview. Users can filter and search the list by ID, user, violation code, camera name, vehicle registration number, date and time, and processing status. In a processing mode, they can review the items and decide whether a traffic offence has been committed and should be reported. For this purpose, they are then able to access the recording or the offence, additional information or snapshots from the recording, and the exact location of the incident on a map section. Predefined justification If an item is not processed further, because it is evident that an offence has not taken place, this must be confirmed with a predefined justification. All offences which are reported must be collected in detail in a log for subsequent investigation and review. The list can be filtered by data and exported to a PDF file. Additional benefits "Many towns implement video observation systems at busy traffic junctions. With our solution, these systems are given very valuable additional benefits, whereby besides improving safety they also help to relieve the strain on municipal budgets," according to Dieter Dallmeier, Founder and CEO, Dallmeier electronic. "The Dallmeier solution enables the operators to secure evidence for traffic offences intuitively and with maximum efficiency with very low training costs. The subsequent evaluation and forwarding process guarantees compliance and data protection, and all processes are logged in detail."
AI has opened doors to many transformation opportunities and increasingly minimised many risks -- personal and economic -- that are alarming today. And illicit trade is one of those pains AI can offer a promising solution against. Illicit trade is a serious threat and problem that affects governments and societies on every level. While governments lose financial funds in tax revenues, thriving businesses are losing potential customers, and customers are getting tricked into purchasing counterfeit, low-quality products. Transnational organised crime generates revenue of $2.2 trillion through transnational criminal organisations, complicit corrupt facilitators, and other threat areas. The list of criminal activities is long and involves such horrific crimes as trafficking of narcotics, opioids, arms, humans, fake medicines and other counterfeit and pirated goods; illegal tobacco and alcohol; illegally-harvested timber, wildlife, and fish; pillaged oil, diamonds, gold, and other natural resources and precious minerals; stolen antiquities; and other contraband or valuable items sold across streets, social media, online marketplaces, and the dark web. In short, illicit trade is a contributing cause to large-scale insecurity and instability across markets. AI-driven technologies Here is where revolutionary AI-driven technologies come in, with their capability to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. There are a few ways that AI can support the ongoing fight against illicit trade on a global scale in a tangible way. Transnational organised crime generates revenue of $2.2 trillion For financial transactions at risk of fraud and money laundering, tracking has become an increasing headache if done manually. As a solution to this labour-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents -- often billions of pages of documents -- in a short period of time. Among these documents widely in circulation, most have an unstructured and inconsistent format -- from invoices to insurance documentation -- are a complex system to tackle; in this whirlwind of pages, the likelihood of non-compliant and misrepresented figures to go by unnoticed. But this is also where AI can thrive as solutions become a necessity, enhancing humans’ capabilities of identifying fraud risks in the early stages. Relying on natural language processing, the technology can begin interpreting the text from the scanned and digitised documents in order to process trade information at high speed. In this context, AI-powered solutions are capable of comparing, contrasting document information and identify anomalies worth looking into further. By automating a large portion of the process, AI-driven technology allows the staff to focus on more pressing, high-involvement issues that require human judgement while saving time on the time-consuming manual work of analysing documents by hand. Identifying covert interactions between criminals As criminal networks become increasingly intricate in their illegal operations, cutting-edge AI technology is crucial in the battle against it. In 2019, EU launched a project with the goal to deploy advanced AI technology and robots to identify smuggling across the borders of Portugal, Estonia, Italy, Greece, Bulgaria, Romania and Hungary. With the help of AI, it will be possible to send drones and autonomous vehicles to the most dubious border areas in order to enforce border control and detect smugglers quickly and efficiently. Illicit trade triggers a chain reaction of negative impact across industries, governments and individuals The issues the EU is trying to address through the project include drug and weapon smuggling, as well as human trafficking. From tight border control tracking crossings to communication monitoring to identify covert interactions between criminals on both sides of the border, the project is one among many that will expand the scope of solutions to the illicit trade problems today. AI’s contribution is significant on many levels: from predicting crime and threats to safeguarding public health and safety (in face of human trafficking, counterfeit medicines, and toxic products), these are simply inklings of major shifts that AI technology promises for the future of the battle against illicit trade. So why is fighting illicit trade so crucial? Here are a few reasons why AI’s role in fighting this global issue is crucial. In a world where customers run the risk of being deceived and tricked into buying counterfeit products, companies who provide the original products suffer through the loss of revenue and market share. The same companies are also robbed of their intellectual property and proprietary data. Furthermore, people who are employed in these companies run the risk of losing their jobs as a result of revenue and market share loss. And finally, the last straw is the loss of brand integrity and reputation to the need to compete with low-quality, sometimes even dangerous counterfeit products. Just like a domino effect, illicit trade triggers a chain reaction of negative impact across industries, governments and individuals. And it’s time for AI to step in and stop it.
Though they may sometimes elicit a hectic and fast-paced experience, airports are a necessary cornerstone of traveling for many people around the world. Whether they represent the ability to see family, the need to attend a business event, or the chance to get away on a relaxing vacation, airports are central to allowing travelers to get from one destination to the next. In 2019, more than four billion scheduled travellers passed through the world’s airports, and that number is projected to grow. As the flow of travellers increases, airports are facing many new challenges. Passengers, by nature, are highly diverse, transient and in continual motion. As a result, airports are taking on greater responsibility of ensuring that people arrive and depart in a timely — and safe — manner. Effective security operations Effective security operations are therefore critically important to allowing these entities to protect what matters most. Unfortunately, this is not an easy task, as airports have evolved from traditional ports-of-call to highly complex environments. With the introduction of shopping, dining, interconnected rail and more amenities, they are seeing many of the same challenges facing cities. That includes theft, fraud, medical concerns and even domestic violence spilling over into facilities that are already popular targets for bad actors. They are seeing many of the same challenges facing cities The various threats that airports face on a daily basis present the potential for extreme damage. Any type of incident can carry significant risk to people, assets, passenger traffic, and brand reputation. Traditional security risks in the airport ecosystem, such as theft, violence, terrorism, and insider threats, continue to evolve, while overarching cyber attacks targeting physical security systems have also become more prevalent. Airport industry demands Aside from the constantly shifting risk landscape airports face, they also maintain a unique set of needs due to the high-level nature of the overall operation, such as: Constant surveillance. Airports, like many other transit hubs, utilise systems and technologies that must function constantly in order to keep passengers, employees, and environments safe 24 hours a day, 7 days a week, and 365 days a year. The ability to monitor device health is instrumental in preventing equipment failures as well as ensuring that no suspicious behavior goes unnoticed. As airports grow and change with the addition of new shops, terminals, or runways, they also need a set of security solutions that can easily adapt and incorporate new protective infrastructures. Coordinated security. The societal growth of at-your-fingertips accessibility and mobile capabilities increases convenience, but with this connectivity comes an expanded risk for threats and breaches. Security is no longer limited to just physical assets; network elements must also be considered to ensure comprehensive coverage throughout an airport’s infrastructure. Data collection. Data that is derived from internal and external threat intelligence efforts plays a significant role in mitigating threats, but the sheer amount of data far outweighs the ability of many airports to organise what’s collected and make it actionable. The answer: intelligence-powered solutions The complex risks, demands, and challenges that airports must contend with call for exceptionally sophisticated and coordinated security strategies that leverage intelligence-based solutions. A traditional security system is not enough for such a high-leverage atmosphere; airport security operators require the greatest level of insight and information possible to ensure protection for travelers and staff at all times. Airport security operators require the greatest level of insight and information At the core of an intelligent airport security system must exist a video-based security operations center (SOC). Operators need to be able to track incoming data and identify relevant information on a daily basis, but this can become challenging given the number of security systems and sensors that are typically integrated within an SOC, such as video surveillance, access control, perimeter detection, PSIM software, and more. Operators require solutions that integrate the existing controls of a security operation into a single view, assimilate analytical data, and provide critical insights to empower personnel to manage and respond to situations efficiently and effectively. This can be achieved through an intelligent SOC, giving operators real-time visibility into security system information and analytics that facilitates a proactive approach to security rather than reacting after the fact. Operators therefore benefit greatly from increased insight and the ability to see both the security and business sides of airport operations, from passenger and employee identification to cargo handling and flight coordination. Essential intelligent SOC components Because airports are such vast, fast-paced environments with several elements to consider when it comes to safety, an intelligent SOC in these facilities must incorporate various levels of intelligent technology, such as: Video management software (VMS). A data-driven security management and response system that leverages advanced artificial intelligence (AI) and predictive analytics is critical for viewing airport operations and investigating potential vulnerabilities or threats. When integrated with components such as dynamic GIS maps and event management, airport security teams can gain full situational awareness and control with the intelligence to act as needed. Emergency dispatch and response. In the event of a security incident, airports need to share insights in real time between dispatchers, first responders, and other aligned stakeholders. Next-generation mobile technologies within an intelligent SOC can enable operators to see the full picture of both the situation and the organisation’s response team, helping to facilitate immediate action and informed decisions. Integrated security operations. As mentioned previously, today’s airports are forced to look beyond the traditional physical security threats of the past and incorporate the element of cyber risk. This means that an intelligent SOC must also consider web-based vulnerabilities, such as through social media monitoring and geo-fenced surveillance and integrate this information within the guidelines and techniques that are being used to secure the airport in a physical sense. The deployment of intelligent security solutions in airport environments helps streamline all aspects of security management while enabling data analysis to ensure day-to-day airport operations run smoothly. In the end, these facilities become more prepared to deal with incidents proactively while providing a positive experience for travellers. As airports look to draw more passenger traffic and expand in scale, selecting security solutions powered by sophisticated intelligence and analytics helps protect what matters most: people, property, and the continuity of operations.
A person infected with the Coronavirus (COVID-19) infects an average of 2.5 other people within five days. You do not need to be a mathematician to realise that early detection of infected people is key to successful pandemic containment. The aim of effective containment strategies is therefore not so much to reduce the number of absolute cases as it is to extend the time frame within which they occur. Without effective containment measures, the virus spreads rapidly and is beyond the capacity of the health care system. However, if infection rates can be minimised through early detection and rapid, targeted identification of further infections, cases will continue to occur over a longer period of time and remain within the capacity of the health care system. Identifying, testing and results For example, the goal of many countries is to carry out as many Corona tests as possible to quickly identify infected people. It is then necessary to identify and reach potentially-infected people and isolate them in quarantine. This is a tried and tested procedure. But this method also costs valuable time in the fight against the virus and has many unknowns. The determination of a concrete test result alone sometimes takes up to 48 hours due to limited laboratory capacity. Added to this is the imprecise and slow procedure for determining contact persons. Or do you still remember exactly who and where you shook hands with in the last ten days - and could you provide information on this? Security technology to the rescue When it comes to the time factor, security technology can be a great help. Thermal imaging cameras and temperature sensors, for example, can help to detect a person with elevated body temperatures. Fever can also be one of the symptoms in those infected with the Coronavirus. At neuralgic points such as airports and train stations, or at entrances to hospitals, thermal imaging cameras can quickly reveal which people have fever. Presumably infected people can be easily separated and asked about other symptoms. Physical security technology can make a great contribution here. Dr. Frank Gillert, a professor at the University of Applied Sciences in Wildau, Germany states, however, as one of the leading scientists for logistics-centric security research, he demands "rapid innovation in dealing with situations like COVID-19 should be a priority". He sees enormous potential in the possibilities of IT and artificial intelligence; "We should use the disruptive changes that are currently taking place and that are challenging global orders to strengthen the significance in IT infrastructure development and also in security technology development.“ The goal in a global crisis And he is right: In global crises such as the Corona pandemic, security-related deficits become apparent and space is created for technical innovations. The goal of governments and companies is to restore security and save human lives as quickly as possible. The German data analytics powerhouse G2K, for example, has developed a Corona Detection & Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. When developing the system, the focus was on two questions: How do I detect a suspected infected person in crowded environments and even more importantly, how do I quickly and comprehensively determine the person's contacts and previous whereabouts, and find correlations and patterns in this information? The data experts of the Berlin-based company found the answer in the combination of physical security technology and their existing data analytics platform. The G2K system The system is based on G2K's scalable IoT platform "Situational Awareness Builder" (SAB), which is already in use in several projects worldwide and sets standards in process automation and process optimisation, including security management. As soon as a person with fever is detected by the system, he or she can be immediately screened to avoid contact with other people and thus prevent possible new infections, i.e. to interrupt the chain of infection. For this purpose, stationary thermal imaging cameras or smartphones equipped with a temperature sensor accessory can be used. The potentially infected person must now be registered and referred to a doctor or hospital for further specific diagnostic measures. The entire process is covered by a mobile G2K application. A combination of security and medicine The platform can bring together available hospital capacity, infection reports, movement and contact profiles and provide an excellent picture of the source of infection. Thus, medically necessary isolations can be implemented quickly. At the same time, infected patients can use the app to document their recovery and become actively involved. All this data is centrally managed and analysed, using deep learning methods. This provides crisis managers with a single monitoring, control and resource management tool that enables immediate action to be taken to combat the spread of the virus and gives officials full transparency on the status of the pandemic. Karsten Neugebauer, founder and CEO of the company behind the solution, explains his commitment as follows "A few weeks ago we too were faced with increasing difficulties due to the Corona crisis. As we have a strong presence in Europe in particular, we had to struggle with postponed project starts and limited resources". But instead of burying their heads in the sand, G2K's dedicated team decided to declare war on the virus." "In our entrepreneurial duty, we, therefore, decided to use our available technology and equip it to fight COVID-19. Our team has been working day and night over the last few weeks to expand our software platform to enable us to contain the pandemic quickly and effectively. Politicians must now immediately push ahead with the unbureaucratic implementation of prevention and control measures such as our CDCS to ensure the stability of our public systems," demands Karsten Neugebauer. The pandemic continues As the COVID-19 pandemic spreads from continent to continent, researchers around the world are working to develop antidotes to the virus. As long as this has not been found, the spread of the virus must be slowed down internationally. Only by this can system-relevant infrastructure be held consistently. Combining modern physical security technology with platform technology and artificial intelligence provides an excellent possibility to slow down the current and for sure, future pandemics.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defence to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximise the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot programme is the 250,000-square-foot HID Global facility in Austin. For the pilot programme, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 white papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Combining artificial intelligence (AI) with cloud video creates systems that are smarter, safer and more cost-effective. Furthermore, adding AI capabilities can widen the advantage gap of cloud video systems compared to on-premise systems, especially for cost-conscious end users. “We strongly believe the total cost of ownership (TCO) for cloud systems is more affordable,” says Ken Francis, President of cloud video surveillance company Eagle Eye Networks. “And introducing really powerful AI will expand the cost differences.” Combining AI and cloud video To finance realisation of their vision to combine AI and cloud video, Eagle Eye Networks has raised $40 million of Series E funding from venture capital firm Accel. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end users,” says Francis. In effect, end users have maximum flexibility to manage and analyse their video data however they wish The system sends captured video to the cloud, where a variety of AI or video analytics systems can extract valuable data from the captured video. Eagle Eye offers an application programming interface (API) to enable integration of best-in-breed third-party AI and analytics systems to leverage the video. In effect, end users have maximum flexibility to manage and analyse their video data however they wish. Delivering lower costs In addition to offering integration with third-party systems, Eagle Eye is investing in its own AI development, and hiring additional development and customer service personnel. As new technologies become part of the Eagle Eye platform, customers benefit from lower costs because of economies of scale. Keeping the emphasis on development of cloud systems, Eagle Eye also offers customers maximum flexibility in choosing their cameras. Eagle Eye’s on-premise cyber-hardened “bridge” can connect to almost any camera from thousands of manufacturers, including those connecting with HD-over-coax. The COVID-19 pandemic has expanded the need for end users to view their premises remotely, and in the process has highlighted shortcomings of their existing video systems. As a result, video manufacturers - including Eagle Eye Networks - are seeing a surge in end users updating their systems. Cloud video surveillance Given the costs of installing and maintaining hard drives for local storage (and additional challenges during a pandemic lockdown), more end users are opting to use cloud systems. In effect, the COVID-19 pandemic is accelerating installation of cloud video surveillance. “Our industry is the most resilient in the world,” says Francis. Eagle Eye Networks was on track to double their growth in the first quarter, and then COVID slowed everything down As a whole, 2020 has been a successful year for the cloud system provider. Eagle Eye Networks was on track to double their growth in the first quarter, and then the COVID lockdown slowed everything down. During the second quarter, their revenue from setup fees and appliances fell by 35% or so, but subscriptions increased slightly including customers looking to keep watch over their shuttered businesses. Temperature alerting solutions The third quarter saw another big uptick in business; August and September were booming, and not just from projects that were delayed from Q2. There has also been a spike in customers looking to apply temperature alerting solutions, says Francis. In uncertain economic times, cloud systems require around 40% less up-front costs, and provide flexibility to eliminate the system (and the expense) at any time without losing a large financial investment. Cloud video has reached a tipping point in the United States, Mexico, and the United Kingdom, among other locales, but the technology lags in some other geographic areas such as France. Driving adoption is availability and cost of sufficient upload speed and bandwidth. In addition to Eagle Eye’s branded growth, the company also provides the OEM engine behind a half dozen or so cloud systems offered by other manufacturers. Backing multi-site enteprises About eight years old, Eagle Eye Networks has focused squarely on the small- and middle-sized business (SMB) market, especially multi-site businesses such as retail, banking and healthcare. They also work with local governments and K-12 schools. Moving forward, the company will seek to expand more into multi-site enterprise customers, some of which have 1,000 locations around the world and need to store their video locally to meet regulatory requirements. Multi-site businesses, benefit from the cloud by eliminating the need for local IT equipment and expensive staff Multi-site businesses, especially, benefit from the cloud by eliminating the need for local IT equipment and expensive staff. As internet connectivity becomes less expensive than installing new cable infrastructure, cloud systems will become more attractive to large campus environments such as colleges and airports, says Francis. The advent of 5G connectivity will also be a plus. All Eagle Eye products are NDAA compliant. Premium support services Further expanding its services, Eagle Eye Networks is poised to launch “Premium Support Services,” in which the cloud provider’s employees will proactively monitor and service customer sites for a minimum additional monthly fee. The cloud structure enables most problems to be addressed and solved remotely without needing to send personnel to a site. The new investment from Accel, a funding partner of top-tier tech companies such as Facebook, Dropbox and Spotify, is Accel's first investment in the security industry. In addition to investing in AI, Eagle Eye also plans to leverage the funding to expand into new regional markets with new data centres and additional staff in business development, sales and support roles.
Governments around the world use facial recognition for applications such as identifying persons on public video feeds. The technology is also used by police for internal databases and as a component of ID verification for elections and/or airport security. In fact, the use of facial recognition technology is increasing globally. Surfshark, provider of virtual private networks (VPNs), collated the latest data on face surveillance around the world and distilled it into a map that shows which countries currently use facial recognition, which have approved it but have not yet implemented its use, countries that are considering the technology, and countries that have banned it. Only one country, Palestine – where the government of Israel is using facial recognition technology to monitor Palestinians in the West Bank – did not fit these categories. Facial recognition for surveillance purposes There are 109 countries today that are either using or have approved the use of facial recognition technology for surveillance purposes. Surfshark’s main data sources for this project were the Carnegie Endowment for International Peace, Electronic Frontier Foundation and AlgorithmWatch. Some 26% of Americans believe the government should restrict the use of facial recognition technology. In 2019, San Francisco became the first U.S. city to ban the police use of facial recognition. The U.S. Department of Homeland Security expects to conduct facial recognition scans on 97% of all air travellers by 2023. More than 50% of all Americans are currently in police facial recognition databases. Humanising protection tools Belgium is so far the only country to find facial recognition in breach of national law. Moscow used facial recognition technology to monitor whether potential carriers of coronavirus were obeying the rules of their quarantines. One study found that the facial recognition technology used by London police was inaccurate in 96% of cases. The first arrest to result from facial recognition CCTV in the UK took place on February 27, 2020. Surfshark’s mission is to humanise protection tools so that everyone can be in control of their privacy and security. NeoMam Studios created the map. The studio seeks to create digital content that online audiences will want to share for months and years to come.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc. (Genetec), a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. Genetec Security Center The three-year project, which is expected to be completed by the end of 2023, will see Genetec Security Center, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract for Changi Airport Group was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights that Genetec Security Center is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Centre, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights Security Centre is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
Since the beginning of the Corona pandemic, MOBOTIX thermal cameras have been increasingly used in the healthcare sector, as well as airports, train stations, public authorities, and companies, to detect temperature anomalies in people without contact and thus contain the spread of the virus. However, this aspect is only one area for which MOBOTIX technology is currently providing special services. The MOBOTIX 7 Platform, with its intelligent and cyber secure camera systems M73 and S74, predestined MOBOTIX video technology even before the pandemic to ensure comprehensive, digital support in healthcare clinics and the care of the elderly and disabled. The reliable, high-quality video systems made in Germany reduce hospital and nursing staff's workload, provide digital care for patients and residents, and optimise care and workflow processes. Parking lot management Basic safety and pandemic protection in healthcare Also, during the pandemic, a special duty of care applies to employees, patients, and residents as a risk or high-risk group. MOBOTIX video technology is used in numerous clinics, retirement, and care facilities worldwide to ensure that patients, residents, and employees have a carefree stay and can work safely. Dangers and sources of risk are detected, and the intelligent systems warn, report, or directly initiate assistance and rescue measures. With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities This allows staff to concentrate on their work, while hospital patients and nursing home residents can recover more quickly and get the rest they need. MOBOTIX video technology is also used for early fire detection and access control, mainly to protect sensitive areas such as sterile rooms, operating theatres, or medication depots. MOBOTIX also offers the right solutions for intrusion and theft protection, securing outdoor spaces, or access monitoring and parking lot management. With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities: Temperature-sensitive people are detected as soon as they enter the facility and can be immediately sent for further examination. Crowding is avoided, and social distancing can be supported. MOBOTIX video systems detect when no mask is being worn and trigger an alarm or an information announcement. Cyber security and data protection Cyber security and data protection "Made in Germany” Particularly in the healthcare sector, cyber security and data protection must be given the highest priority. After all, it is a matter of protecting lives. But it is also about sensitive, personal data that must not fall into the wrong hands under any circumstances. MOBOTIX video systems consist of high-quality components. Developed, produced, and comprehensively tested at the company's German headquarters in Langmeil/Rhineland-Palatinate, the company creates products and solutions that are impressive not only because of their outstanding image quality - even in the most challenging lighting conditions. One hundred percent DSGV-compliant, the decentralised MOBOTIX systems stand for the highest possible cyber security and comprehensive data protection. Unauthorised persons cannot read the stored data. Intelligent video technology Relieving the workload of hospital and nursing staff with "digital care” Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload Hospital and nursing staff often work at the breaking point. Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload. For example, adequate video support can be used to carry out control rounds digitally. On the one hand, this creates free space that can be used for personal care and nursing, while on the other hand, emergencies are reported directly at the time they occur - and thus, the staff does not lose critical time. Effective signaling and calling systems targeted alarm differentiation, and the avoidance of false alarms keep staff motivation high and reduce alarm fatigue. Incorporating audio systems Digital and discreet care for patients and those in need of care MOBOTIX provides discreet video support for round-the-clock security without anyone feeling they are being watched. The video surveillance systems in healthcare facilities are discreetly and unobtrusively installed; they also detect and alert only when defined events occur to keep recordings to a minimum. At the same time, patients and residents can be sure that help will arrive quickly in an emergency. Even at night, helpless individuals are detected immediately, ensuring their safety and preserving their independence. By incorporating audio systems, MOBOTIX video solutions for healthcare also enable patients to be addressed and communicated directly with. Licence plate recognition Optimise hospital and care processes Smooth organisation of routines helps hospitals and retirement and care facilities be efficient and profitable Smooth organisation of important routines helps hospitals and retirement and care facilities be efficient and profitable. Numerous processes can be automated and optimised with MOBOTIX video technology, from the facility's journey to check-out. For example, professional parking management with licence plate recognition can ensure that only authorised vehicles can access specified areas. In this way, ambulance access routes can be kept free, or parking fees can be billed in a straightforward, fast, and accurate manner. Queues in registration or examination areas can be avoided, and smooth administration and medical and care areas can be enabled. University hospitals or teaching institutions can use high-resolution camera systems, e.g., in operating theaters, to fulfill their teaching and training mission without disruptions. Customers can develop further apps that enable completely individual solutions themselves or have them created by MOBOTIX and its technology partners and certified concerning cyber security. Advanced video technology Comprehensive solutions with the best return on investment Healthcare is a market that is extremely important to MOBOTIX. The high level of solution expertise digitises processes and work steps in everyday hospital and home life, using intelligent and future-proof video technology. Thus, simplifying work and making it safer also relieves the healthcare budgets' pressure and increases profitability (ROI).
Leonardo delivered the first two M-345 jet trainer aircraft to the Italian Air Force, which to-date has ordered 18 units from a total requirement for up to 45 aircraft. The new type of jet trainer aircraft, designated T-345A by the Italian Air Force, will gradually replace the 137 MB-339s which have been in service since 1982. M-345 jet trainer aircraft Marco Zoff, Leonardo Aircraft Managing Director, said “Building on our heritage and expertise in jet trainers, the M-345 will allow our customers to achieve a significant improvement in training effectiveness while at the same time reducing operating costs. This first delivery to the Italian Air Force is a key milestone, the result of a longstanding and productive team working closely together with the operator.” The new M-345 jet trainer aircraft, designed to meet basic and basic-advanced training requirements, will complement the in-service M-346, which is used for advanced pilot training. Integrated training system Leonardo’s integrated training system developed around the M-345 platform is representative of the company’s technological leadership in training pilots to fly current and future generation aircraft. The system benefits from experience with, and technology developed for, the M-346, which includes a ‘Live Virtual Constructive’ capability. This allows aircraft which are flying live training missions to incorporate simulated ‘friend’ or ‘foe’ elements into scenarios, allowing the pilot to be exposed to the full range of possible operational situations. M-345 HET (High Efficiency Trainer) The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots The M-345 is a high-performance aircraft which supports a pilot’s transition from basic trainers to latest-generation fighters. The Italian Air Force’s acquisition of the new aircraft is an important step forward in the modernisation of its fleet, with the M-345 replacing the MB-339A in Air Force’s second and third military pilot training phases. The M-345 has also been chosen as the new aircraft of the Italian Air Force’s acrobatic team, the ‘Frecce Tricolori’. The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots. It also gives trainees the chance to fly an aircraft that features higher performance characteristics than other basic/advanced trainer aircraft currently in service around the world. Delivering high quality training at low cost The performance of the M-345 allows it to carry out the most demanding mission types found in a training syllabus, delivering high quality training at significantly lower cost. The M-345 cockpit architecture is the same as that of frontline fighters. The aircraft is also able to perform operational roles, thanks to an extended flight envelope, with a high-speed maneuvering capability even at high altitudes, modern avionics systems, high load capacity and performance. Health and Monitoring Usage System The M-345 is designed with a long life-cycle and a two-level approach to maintenance The M-345 is designed with a long life-cycle and a two-level approach to maintenance, eliminating the need for expensive general overhauls. The aircraft’s Health and Monitoring Usage System (HUMS) also contributes to a lower cost of ownership. A sophisticated on-board training simulator confers a number of benefits. For instance, M-345 pilots are able to plan maneuvers before live training, allowing for higher efficiency during flight. Mission Planning and Debriefing Station Trainees are also able to fly in formation with other pilots in the air and those training on the ground in simulators, via a real-time data-link. The aircraft’s Mission Planning and Debriefing Station (MPDS) allow trainees to analyse the missions they have just flown. The M-345’s engine is a Williams FJ44-4M-34 turbo fan optimised for military and aerobatic use. The cockpit is based on HOTAS (Hands-On-Throttle-And-Stick) controls and features a glass cockpit with a three-colour MFD (Multi-function Display) touch screen. The aircraft’s heads-up display is mirrored on a fourth screen in the rear seat.
HID Global, a pioneer in trusted identity solutions, announces that aerospace company Avolon has selected the HID Mobile Access® solution for physical access at its headquarters in Dublin and other locations worldwide. Powered by HID’s award-winning Seos® credential technology, the solution enables Avolon to issue staff Mobile IDs to smartphones for building access and provides an efficient management platform for its global network of offices. Maintaining secure perimeter Avolon is one of the aircraft leasing companies servicing many of the world’s major airlines. HID partnered with Ireland-based systems integrator Summit Security Systems Ltd to deploy the HID Mobile Access solution and HID® readers throughout Avolon’s Dublin campus. Mobile IDs are sent to Avolon staff via an app on a user’s Android or iOS mobile device so they can quickly and easily use their phones to gain access to Avolon facilities. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility" “We needed to maintain a secure perimeter, but we did not want the security to be a barrier. Using a mobile phone is much more convenient than an access card and phones tend not to get left behind,” said Allan Dawson, facilities project manager at Avolon. “We were looking for a system that was highly flexible, highly mobile and highly secure. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility.” Touchless access control The HID Mobile Access solution facilitates around-the-clock office access for staff members and equips administrators to manage access rights from a centralised, cloud-based portal. Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency. “Avolon’s use of HID Mobile Access makes touchless access control possible for a more seamless user experience, which is appealing to many organisations in today’s new normal,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control with HID Global. “The scalability of our solution also lays the groundwork for Avolon to easily extend mobile access across more of its facilities.” Following the successful deployment of mobile access at its Dublin headquarters, Avolon has also launched the HID Mobile Access solution at its New York, Florida and Hong Kong offices, with plans underway for its Singapore campus.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorised access onto the airfield, either runways or where aircrafts are being loaded or refuelled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fibre optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilise OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fibre optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fibre technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent tracking and event categorisation This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorisation, making it a very precise security system for airports.
Round table discussion
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?
The high cost of thermal imaging cameras historically made their use more likely in specialised law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Higher pixel count is better. It’s a basic tenet of the video surveillance market, or at least it is the implication as manufacturers continue to tout their latest products offering ever-higher pixel counts. But the reality is more nuanced, as our Expert Panel Roundtable panelists explain this week. Pixel count shouldn’t be seen as an end unto itself, but rather as a factor in determining what camera is applicable to which application. Pixel count is just one factor of several to consider, and the needs of the application must rule all decisions. We asked this week’s panel: How many megapixels are enough? At what point does additional resolution not matter, or not make economic sense?
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download