FLIR Systems, Inc. announces the FLIR A400/A700 Thermal Smart Sensor and Thermal Image Streaming fixed camera solutions for monitoring equipment, production lines, critical infrastructure, and screening for elevated skin temperatures. These highly configurable smart camera systems provide accurate, non-contact temperature monitoring across a wide range of disciplines: manufacturing process control, product development, emissions monitoring, waste management, facilities maintenance, and Environm...
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data centre, the IT department has complete control over network acce...
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LEP-301M-KIT. Antaira Technologies’ LEP-301M-KIT was designed to overcome the 100meter limitation of Ethernet. This kit comes with both the near end (LEP-301M-TX) and the far end (LEP-301M-RX) for a complete set. The LEP-301M...
Pulse Secure, the provider of software-defined secure access solutions, announces a new distribution partnership with Inforte to grow and better support its channel community across Turkey, and to meet accelerating demand for Zero Trust access security. Inforte is a value-added distributor specialising in the new generation of information security solutions. Inforte provides innovative services to support its community of over 100+ partners with pre-sales and post-sales services, logistics, mar...
Abloy UK unveils its newest innovation in digital security, the Abloy BEAT. The new keyless solution combines three main components: a digital key, a mobile application and a heavy-duty, Bluetooth padlock, all managed with the visual Abloy OS user interface. Businesses across the UK have a growing need for the convenience and accessibility of highly secure keyless access solutions – either as an addition to existing workflows or as a standalone solution. This is particularly true in remot...
When one installs an XR Series alarm panel in a building that’s already wired for IP network, they’re in luck. DMP’s new 7463 Network Thinline Keypad gives them the advantage of saving money by easily plugging into the existing network. Perhaps they’re installing DMP in a remote building in which running new wire would be costly. Instead, install DMP’s new 7463 keypad and keep the job costs lower, all while they continue to get the same reliable functionality and p...
ASSA ABLOY publicly launches the RITE Slide, an integrated opening assembly where all individual door components are included to create a complete door system. RITE Slide is engineered for a wide array of applications and industries, specifically where sound control and space are critical to the design, such as medical exam rooms, patient rooms, offices and hotel meeting spaces. “Drawing on years of experience and expertise in building acoustically rated door systems, RITE Slide is an innovative opening solution that enhances privacy, saves space, and is aesthetically designed to meet the needs of a variety of customers and end-users,” said Stacey Callahan, ASSA ABLOY Door Group’s Vice President of Marketing and Innovation. Ensuring privacy and quiet operation RITE Slide’s unique, integrated assembly design includes all of the necessary door components RITE Slide ensures privacy and quiet operation with sound seals, automatic door bottom, and soft-close operation to minimise slamming, and wear and tear on the door and hardware. Offering both acoustically rated and non-acoustic options, the sliding door has a perimeter seal that blocks out light and sound, and operational door hardware for passage or privacy with locking applications. The acoustically rated series has been third-party tested to an STC 34 utilising a flush wood door as a complete assembly according to ASTM E90. A barn-style sliding door, RITE Slide’s unique, integrated assembly design includes all of the necessary door components including the frame, door, operating hardware, track hardware and accessories. Traditional swing doors RITE Slide’s design also saves space by occupying a fractional footprint compared to traditional swing doors. The aluminium frame and track has a narrow 1-1/2” face frame profile for a sleek aesthetic design. Adding to the modern design, RITE Slide comes in 11 veneer species, 5 door stain colors and 6 cut-out options as standard, with further custom capabilities available. The door also incorporates built-in three axis adjustability for ease of installation and operation.
All of DMP’s Com Series™ Universal Communicators provide ECP communication with Honeywell VISTA® panels. DMP is excited to introduce a new member of the Com Series that’s not only compatible with VISTA panels, but DSC PowerSeries™ panels too. “The new DualComN communicator is UL 1610 Listed for commercial burglary applications, which creates some exciting upgrading opportunities for our dealers,” explains Aaron McGhee, product manager of Control Panels for DMP. “You’ll be able to connect to DSC PowerSeries panels through the DMP communicator to remotely manage all user codes and easily check zone status from the Virtual Keypad app.” Fully supervised alarm communication The new communicator nicely rounds out DMP’s DualCom line of commercial fire products with a commercial burglary listed unit. Like each of the communicators, the DualComN is designed with integrated primary and secondary communication in a single design. By using the network connectivity as the primary communication path, the system will receive the fast speeds of the IP connection whenever possible. The secondary cellular path picks up communication almost instantly However, if the primary IP path drops out for any reason, the secondary cellular path picks up communication almost instantly. Each Com Series module also has built-in LTE cellular backup that provides a fully supervised alarm communication path over AT&T’s or Verizon’s LTE networks. As with earlier-generation products, the LTE communicators are designed to work with digital cellular service from SecureCom Wireless™ — enabling dealers to get systems up and running quickly. DualCom Series models The DualCom Series models are: NEW DualComN-LV Alarm Communicator with Wi-Fi Network Primary and Cellular Backup (Verizon) DualComWZ-LV Alarm Communicator with Wi-Fi Network Primary and Cellular Backup (Verizon) DualComNF-LV Fire Alarm Communicator with Hardwired Network Primary and Cellular Backup (Verizon) NEW DualComN-LA Alarm Communicator with Wi-Fi Network Primary and Cellular Backup (AT&T) DualComWZ-LA Alarm Communicator with Wi-Fi Network Primary and Cellular Backup (AT&T) DualComNF-LA Fire Alarm Communicator with Hardwired Network Primary and Cellular Backup (AT&T)
Plymouth Rock, a pioneer in the development of cutting edge threat detection technologies, announces that it will be presenting their platform of technologies, that includes the PRT X1 Drone, a next level Unmanned Aerial System (UAS) and the SS1 Shoe-Scanner at the International Security Conference and Exposition (ISC West) at the Sands Expo Center in Las Vegas, Nevada. Built entirely from NATO-coalition sourced components, the PRT-X1 UAS platform will enable airborne visual weapon and object detection, facial recognition, with thermal and ultra-high-resolution capabilities and has been designed with the direct input of law enforcement, intelligence agencies, military, and rescue services. Millimetre-wave imaging techniques Plymouth Rock Technologies will take another step forward in becoming a pioneer in the global security market with the beta-release of its SS1 Shoe-Scanner. The Millimeter-Wave Shoe-Scanner is a floor-mounted 3D imaging system that uses harmless millimetre-wave imaging techniques to inspect footwear. With a screening time of 30 PPM (Persons/Minute), the Shoe Scanner is ideal for airport terminals The scanner is then able to identify if the footwear has been altered or is being used to transport concealed items, such as weaponry, substances, compounds, or electronic items. The PRT SS1 Shoe-Scanner allows for the rapid screening of footwear without necessitating removal of shoes. With a screening time of 30 PPM (Persons/Minute), the Shoe Scanner is ideal for airport terminals, prison/correctional facilities, public events and other high throughput, screening applications. Converged security industry trade show ISC West is a converged security industry trade show in the U.S. At ISC West, visitors will have the chance to network with over 30,000 security professionals through new products & technologies encompassing everything from access control to drones & robotics from over 1,000 exhibitors & brands. The combination of one-on-one conversations with the industry’s top innovators, special events, and cutting-edge education makes ISC West the security industry’s most comprehensive West Coast event. ICS West will be a key platform for PRT to showcase its broad range of threat detection product and platforms. Attendees include federal and local government agencies, corporate security directors and venue security personnel.
Cepton Technologies, Inc., a provider of state-of-the-art, intelligent, lidar-based solutions, has appointed Redtree Solutions as its technical sales representative in the UK and Europe. This announcement comes in response to growing demand for Cepton’s pioneering technology across the region and follows the expansion of its EMEA presence in the UK and Germany in 2019. With this collaboration, Redtree Solutions will serve as an extension to Cepton’s existing Marketing and Business Development teams in Europe, to significantly expand Cepton’s reach into a variety of markets and customers. Intelligent transportation systems Our lidar based solutions are revolutionary and have applications in many industries in Europe" Powered by Cepton’s patented Micro Motion Technology (MMT®) platform – a frictionless, mirrorless, rotation-free lidar architecture capable of high resolution and long range 3D imaging – Cepton’s lidar solutions are being shipped worldwide, serving a range of commercial applications. These include automotive (ADAS), autonomous vehicles (AV), intelligent transportation systems (ITS), security, crowd analytics, mapping/surveying and more – all areas of expertise served by Redtree’s pan-European team. “Our lidar based solutions are revolutionary and have applications in many industries in Europe. Combining our Vista™ and Sora™ lidar sensors with advanced Helius™ perception software running on edge computing in a single package, our solutions can be integrated with a host of other devices and software to deliver a wide range of functions,” explained Andy Nevill, Director of Customer Applications Engineering at Cepton. Generating greater awareness “We are still uncovering new and novel use cases for lidar, which is why we are so excited to announce our collaboration with Redtree Solutions. Working with the Redtree team, we can enhance our presence in the region and serve its growing demand for our lidar innovation.” Redtree Solutions will utilise its resources to support Cepton’s market growth in Europe Through this collaboration, Redtree Solutions will utilise its resources to support Cepton’s market growth in Europe. Covering 19 countries with more than 500 active customers, Redtree will help accelerate Cepton’s business penetration in the region by generating greater awareness of the company’s innovative solutions and providing on-the-ground support to expand Cepton’s customer base. Unique and highly differentiated technology Steve Judge, Redtree Solutions’ Managing Director added: “We are very pleased to be working with Cepton to bring its unique and highly differentiated technology to Europe’s leading industries. This is an agile, intelligent solution that’s very easy to implement and offers significant value to customers across numerous disciplines.” Founded by Dr. Jun Pei and Dr. Mark McCord in 2016, Cepton uses a patented beam-steering MMT® that is unique in the industry and enables the achievement of an optimal balance of performance, reliability and cost for mass market lidars.
Redvision has confirmed that it is still making its highly successful, analogue, X-SERIES™, rugged PTZ dome camera. What’s more, the camera now uses Sony’s next-generation, 2MP, STARVIS sensor, improving its performance still further and enhancing Redvision’s reputation as the industry-benchmark in rugged CCTV cameras. Will Hucker, General Manager of Redvision, said, “Installers will be pleased to know that our analogue X-SERIES™ cameras are still in production and available to order. However, we have phased in the Sony STARVIS camera block to deliver even better performance. Its low-light capability is now an exceptional, 0.0015 Lux at night and its Infra-Red illumination distance is 150m, or 120m using white light.” Ensuring optimal visibility The X-SERIES™ camera can be configured as a dome or PTZ using a removable cover" “The X-SERIES™ camera can be configured as a dome or PTZ using a removable cover. The camera has an optically correct, flat window to protect the camera block and has an optional, silicone, long-life wiper to remove rain and dirt. This ensures optimal visibility outside, all year round, come rain or shine!” The RVX30™ series has 100 programmable pre-sets, 8 tours, 24 programmable privacy zones and multiple alarm options. Advanced pre-set and tour technologies ensure the camera reaches pre-set positions correctly focused, with ideal light settings, following an alarm or during a tour. Rapid deployment systems The RVX30™ has an operating temperature range of -25º up to +60ºC. Mount options include pedestal, swan, wall and pendant, to suit all applications. The cameras are anodised before being finished in light grey or black powder-coat paint for exceptional toughness. They can also be ordered in any matt or gloss RAL colour as a cost-option. The X-SERIES™ is successfully used in many applications including public space, local authority, hazardous, marine, defence, high security, town centre and rapid deployment systems.
Pulse Secure, the provider of software defined Secure Access solutions, announces that growing demand for hybrid IT and Zero Trust resulted in over 110% annual increase in sales of its Advanced Access Suites. Additionally, the company announces continued achievements in new business, product offerings, customer service and corporate growth. Enterprises are taking advantage of workforce mobility and Internet of Everything connectivity while managing rising security risks and data protection obligations. According to a 2020 Zero Trust Progress Report, 40% of IT organisations surveyed will increase their access management budgets through 2020, with more than half planning to move Zero Trust access capabilities to a hybrid IT (on-premises and cloud) implementation. Delivering continuous user and device authentication “Growth in our secure access suites validates that organisations see value in consolidating disjointed tools and disparate policies in favour of more integrated platforms designed for hybrid IT. The results of which fortify their security posture and deliver demonstrable productivity, visibility and compliance benefits,” said Sudhakar Ramakrishna, CEO of Pulse Secure. Pulse Secure’s Zero Trust value proposition is realised through its award-winning Access Suites “We remain focused on providing the easiest, most comprehensive portfolio of secure access solutions that allow enterprises and service providers the greatest flexibility, efficacy and scale as they advance their digital transformation and cloud computing interests.” Pulse Secure’s Zero Trust value proposition is realised through its award-winning Access Suites. The Suites deliver continuous user and device authentication, protected connectivity, and extensive visibility and threat response across mobile, network and cloud environments. Single-pane-of-glass management The integrated Suite provides easy access for end users and single-pane-of-glass management for administrators. Organisations can centrally orchestrate Zero Trust policy to enable compliant access to applications, resources and services no matter where they reside; on-premises, in private cloud and public cloud environments. Key annual milestones of the company’s outstanding growth in Secure Access include: Access Suites sales grew by 43% and account for half of all sales Access Suite, Advanced edition sales grew by 112%, aligned to increased multi-cloud IT adoption New customer acquisition grew by 67% with subscription sales growing by more than 20% Managed Service Provider (MSP) sales grew by 42% as MSPs leverage new program benefits Activating software defined perimeter Pulse SDP is an access suite add-on which activates software defined perimeter (SDP) featuresPulse Secure is uniquely positioned to bring together core secure access functions with required interoperability for hybrid IT and multi-cloud. Purchased separately or as part of a Suite, the company’s portfolio includes remote access, Mobile Device Management (MDM), Multi-factor Authentication (MFA), Single Sign-on (SSO), endpoint and IOT device security, Network Access Control (NAC) and virtual Application Delivery Controller (ADC) solutions. Introduced last year, Pulse SDP is an access suite add-on which activates software defined perimeter (SDP) features within existing suite components to provide direct device-to-application trusted connectivity only after successful user, device and security state verification. Security posture validation Pulse Secure continues to invest in its Secure Access portfolio and customer service initiatives. The company delivered hundreds of new and enhanced features in 2019, including: Enriched user experience with always-on and per-app multiple L3 tunnelling and intelligent load balancing Enhanced user and device security posture validation via native agent and agentless Client Provisioning automation via DHCP and OpenStack support and extended CLI and REST-API functions New Entity and User Behaviour Analytics (EUBA) leveraging machine learning (ML) Broader conditional access controls and third-party integrations across NGFW, SIEM, MFA, SSO, endpoint security, and Industrial Control System (ICS)/IoT connectivity Offering remote access software To complement solution innovations, Pulse Secure also rolled out new training and certification programs through its global network of authorised training partners. To date, hundreds of customers and partners have attended the company’s training programs and more than 350 professionals have achieved certification. Pulse Secure wants to help businesses continue to run while keeping employees, friends, and family safe Additionally, the company recently announced offering remote access software to organisations as they support employees working from home during the Coronavirus health crisis. In a world where natural and man-made disasters occur, Pulse Secure wants to help businesses continue to run while keeping employees, friends, and family safe. Institutionalised professional development Pulse Secure’s attention to employee empowerment, engagement and corporate culture continues to attract top talent globally. Pulse Secure increased its global workforce by 6% in 2019 across support, engineering, sales and marketing, and institutionalised professional development for all departments. Pulse Secure was distinguished as a ‘Great Place to Work Certified Company’ this past fall. The certification was based on independent survey results of employee experience and culture measured against global benchmark data. The company was also recognised among the top Workplaces by the Bay Area News Group for the second year in a row.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorised activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioural understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioural understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognised a growing global need for intelligence to make physical and virtual public areas safer – and realised the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioural recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognise behavioural events in a video such as people fighting or a car collision because such behaviours can’t accurately be concluded in large scale from analysing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognising a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security “Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behaviour inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimised for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviours can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behaviour recognition, behaviour events many times are not clearly defined, which is very different from object classification. Behaviours can have many variations and they can be very diverse.” An example is a simple behaviour like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviours that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control centre that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualisation tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focussing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customisation of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organised to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyse data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
It used to be that when senior Chicagoans could no longer age in place at home, or when they were ready to live in a more social environment, they had to look for options in the suburbs. Today, the majority of Chicago’s high-end senior living communities are in or near Lincoln Park, a picturesque neighborhood, just one mile from downtown Chicago, with manicured gardens and an expansive lakefront green space with sweeping city views. This quaint neighborhood is also home to one of the country’s oldest free zoos and a host of amazing restaurants. Belmont Village Senior Living Belmont Village offers assisted living and memory care, so that as the residents’ needs change, the care can too In 2017, Harrison Street Real Estate Capital bought a building on the former Children’s Memorial Hospital campus (the Nellie Black Building). Harrison Street and Belmont Village Senior Living partnered to tear down the seven-story structure and replace it with a similar brick building, also standing seven stories. Houston, TX based Belmont Village Senior Living is a developer, owner, and operator of 29 properties in seven states. As seniors make the decision to move out of their home and into a community, full continuum of care is an important factor to consider. Belmont Village offers assisted living and memory care, so that as the residents’ needs change, the care can too. 24/7 on-site staff and security The mid-rise building was built to closely resemble the Nellie Black Building with a similar architectural style. Residents don’t want for much in this community, as they have everything they need at their fingertips. The long list of amenities includes elegantly designed common areas for gatherings, a technology center to help stay connected, a professionally managed fitness center with on-site therapy services, a licensed nurse and well-trained staff on-site 24/7, award-winning memory enrichment programs, a full social activity calendar, and a full-service salon. The dining is served restaurant-style with chef-prepared meals and a concierge is on staff to schedule complimentary transportation for personal excursions or appointments. Amenities like these used to be considered over-the-top, but today’s seniors are coming to expect this kind of daily living. The building has no similarities to a retirement home, but rather looks like a luxury condominium. The residents are city-savvy and happy to be near downtown Chicago. Schlage NDE wireless locks The Schlage NDE wireless locks are activated by a fob that each resident is given W.E. O’Neil Construction provided general contracting services for this project. They partnered with American Direct to provide 300 pre-hung doors, 210 bifold doors in residential units, 4 exterior stile and rail doors, 325 hollow metal doors, 90 hollow metal frames, and 215 knock down frames. Locks included Schlage NDE80 wireless intelligent locks for resident entry and common area openings and wall-mounted Mercury readers for the entire exterior area, elevator, and stairwell locks. The Schlage NDE wireless locks are activated by a fob that each resident is given. That fob is unique to the resident’s apartment entry. These locks report back to the main system every 12 hours. If credentials in the system are edited in any way, when the lock checks in with the system every 12 hours, the lock is automatically updated with the most current information. The lock can also report important information, such as who may have requested access, what access was granted, and what access was denied. A benefit to these wireless locks is the minimal installation cost. Basically it is just a matter of mounting the lock with four AA batteries. The battery lifespan is about 1 year. Intelligent electronic locks Belmont Village had already purchased some intelligent locks for the back of house and the general contractor was going to use an electrical contractor for those locks. American Direct Division 8 salesperson, Eric Van Scoy reached out to AccessNsite Security Sales Representative, Heather Rolli for counsel on how to best integrate the pre-purchased locks for back of house and the additional locks American Direct was providing for the resident entries. The AccessNsite Allegion driver is integrated to the WiFi solution that allows communication" Heather Rolli said, “I took off my sales hat, so to speak, and put on my coaching hat to guide the general contractor and owner. I explained that Schlage NDE locks can communicate in a few different ways, one of which is through the lock’s WiFi antenna that goes across the building’s WiFi network. The AccessNsite Allegion driver is integrated to the WiFi solution that allows communication with back of house locks, the resident entry locks, and the Mercury panel common area readers. The original electrical contractor’s solution could not do that integration. If they had continued with their original plan, they would have had to utilise a gateway for every 10 locks for a Bluetooth connection”. AccessNsite integrated access control She stated that continuing on that path would have been very expensive. By using AccessNsite for all of the locks, it eliminated two different layers of physical equipment. With AccessNsite, all the locks communicate via the building’s WiFi network and then information is exchanged as the locks check into the system. “This is part of the service we provide — engineering and consulting to provide the best solution/ service we can,” says Rolli. Rolli was able to consult and guide the general contractor and owner. She further said, “American Direct and AccessNsite were asked to provide not only the Schlage NDE locks for resident entries and back of house, but also wall mounted Mercury readers and intercoms as well. The scope of the project became much larger once the general contractor learned how powerful AccessNsite software actually is. We were able to provide each aspect of the access control without the owner having to use multiple manufacturers. We provided an elegant solution that enabled huge cost savings to the owner on product and labor. I always look for the end user to have a simplified way to manage the facility”. Integrated with AIPHONE security video intercom system Integrated parking for Belmont Village is underground because of lack of space in Lincoln Park. The loading dock is actually across the street with tunnel access. AccessNsite integrated access control with the facility’s AIPHONE (security video intercom system) allowing employees to push a button to unlock the door via a video component. It is critical to know who is gaining access to entry points and AccessNsite will allow them to track that" The Concierge Desk, the Main Desk, and the Head Chef all have AIPHONE access that allows remote opening of garage and overhead doors. When there is a delivery at the loading dock, for example, the person making the delivery pushes the access control button and the Chef, located in the building at the other end of the tunnel access, can see who is at the dock and can grant access if desired. Advanced access control technology W.E. O’Neil’s Project Manager, Brad Garlick stated, “We made great strides with access control on this project that will benefit Belmont Village in the long run. This was their first time to utilise this kind of access control technology and it will provide them with information they have never had before. In today’s world, it is critical to know who is gaining access to entry points and AccessNsite will allow them to track that and so much more.” Belmont Village is a perfect example of how American Direct and AccessNsite not only sell product alongside one another, but also effectively collaborate with each other, the general contractor, and the project owner in order to provide them with the single, most effective, cost efficient openings solution. Belmont Village opened in 2019 and has made great strides in building an impressive reputation for the classy age in place retirement community near downtown Chicago.
The city of Bologna has chosen Wisenet video surveillance cameras to help it create a smart traffic management system. Bologna is the seventh most populous city in Italy. It is at the centre of a metropolitan area of approximately one million people with a diverse range of travelling requirements within a very large area. The City has always invested in traffic control and monitoring systems with the aim to make travel easier and faster for its citizens. An example of this is a centralised traffic light management system which has been in operation since 2013 and has helped reduce travel times within the urban area. Video surveillance solution The purpose was to provide a tool to allow authorities to take strategic planning measures The City wanted to invest in a video surveillance solution which would allow the monitoring of 12 vehicle access gates to the city in order to provide authorities with reliable real-time information about urban mobility. The purpose was to provide a tool to allow authorities to take strategic planning measures and optimally redistribute the traffic load on the road network. After extensive research, which included the evaluation of a wide range of possible solutions, a decision was made to procure a total of 89 Wisenet cameras manufactured by Hanwha Techwin. The implemented solution consists of cameras dedicated to vehicle counting and classification, and ANPR cameras which have been installed on strategic gates. The cameras monitor both directions of travel to allow local authorities to study the most important and strategic vehicle access flows to the city. Detecting illegally parked vehicles This is made possible thanks to the latest generation of Wisenet cameras. By integrating high image quality and advanced video algorithms, Wisenet ‘intelligent’ cameras are able to enhance the value of video surveillance by supporting mobility and security in Smart Cities. 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data, an edge based application developed in cooperation with Sprinx Technologies which facilitates the collection of statistical data about vehicle flow. By tracking the vehicles moving in a camera field of view, the application is able to provide information on vehicle counts, classification and average speed. 24 of the other cameras installed are Wisenet XNO-6120R/FNPs. These feature Roadway Licence Plate Recognition application which is able to help the local authority’s control room operators detect illegally parked vehicles and other traffic infringements. Built-in IR illumination Effective with all European number plate formats, the application has more than a 95% recognition accuracy whatever the environmental conditions, even when vehicles are moving at speeds of up to 150 km/h. The Wisenet XNO-6120R is a 2 megapixel bullet camera which is able to capture high definition images with the help of a 12x optical zoom, digital image stabilisation with built-in Gyro sensor, a Defog feature and built-in IR illumination. Part of the Wisenet X camera series, the XNO-6120R features the World’s best Wide Dynamic Range (WDR), which performs at up to 150dB to produce clear images from scenes that contain a challenging mix of bright and dark areas and normally result in overexposed or underexposed images. Real time automatic incident detection The Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins The processing power of the Wisenet 5 chipset incorporated into the Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins for different applications, such as number plate recognition, vehicle counting/classification and real time automatic incident detection. Completing the camera line-up are 41 Wisenet SNP-L6233RH 2 megapixel 23x IR PTZ dome cameras which have been carefully located at major road junctions throughout the city, in order to allow control room operators to zoom in to see close up detail of any incidents. Traffic management solution “We are delighted with how easy it has been to successfully integrate the Wisenet cameras with our existing video management platform and our other supervision monitoring systems,” said Alberto Nuzzo, Head of Office 'Digital Infrastructure and Telecommunications', at Comune di Bologna, when commenting on the success of the traffic management solution. “The data captured by the Traffic Data and ANPR applications running onboard the cameras, is allowing us to far better manage the existing levels of traffic, whilst also helping us capture and store valuable data which we will be able to analyse to assist us to plan for the future. Our control room operators have been particularly impressed with the exceptional clarity of the images captured by the cameras and the data analytics capabilities of the system, which are enabling them to accurately visually verify what may be occurring and quickly take appropriate action.”
ANSecurity, a specialist in advanced network and data security, announces the successful delivery of a project with New College Oxford to streamline its network architecture and strengthen its security by moving to a Zero Trust model. Founded in 1379, New College is one of the largest Oxford colleges, with some 430 undergraduates and 360 graduates. The college, together with 37 other academic institutions across Oxford, uses the University’s switched Gigabit backbone along with some centralised services, such as e-mail for students, backup, remote access, VPN systems and more while the individual colleges runs their own core servers and applications. Good technical knowledge The project aim was to join two separate networks that had multiple subnets in the same native VLAN The college decided it needed to upgrade its ageing 3COM networking kit and after an evaluation process selected ANSecurity to help it specify, design and upgrade to new switches and a firewall from Juniper. James Dore, IT officer of New College at Oxford University, commented: “ANSecurity was a great company to deal with. It had good technical knowledge around the Juniper products and managed the project efficiently from start to end.” The project aim was to join two separate networks that had multiple subnets in the same native VLAN. This was overcomplicating the network because of how the VLANs had to be tagged and untagged when traversing the networks. As part of the move to a Zero Trust model, all users and server VLANs would be routed through the firewall. In addition, the project would also free up IP addresses from one of the subnets in order to re-allocate them to other colleges. High availability solution ANSecurity implemented a high availability solution using technology from Fortinet and designed and implemented a VLAN migration processes that by leaving the hosts in their original VLAN, allowed them to pick up IP addresses from a different subnet freeing up addresses to be re-allocated. The team from ANSecurity was easy to work with and had a deep knowledge of the network" “The design allows us to set up VLANs in a much simpler fashion, and is easier to manage while allowing us to better share resources across multiple colleges,” said Dore. “The team from ANSecurity was easy to work with and had a deep knowledge of the network and all the technologies we used. They have fielded questions from us at odd hours of the day and have kept us updated about new technologies on a regular basis.” Reducing annual charges It is estimated that the project will reduce annual charges related to client licences, hardware and maintenance fees by several thousand pounds annually. The project would also offer the benefit of allowing three of the colleges to share access to core security platforms to better utilise the technology and reduce upfront and ongoing maintenance contract costs. The successful project, delivered on time and within budget, allowed the college to refresh its infrastructure and start a relationship with ANSecurity that resulted in it becoming the trusted provider for the college’s networking and security needs. “It is fair to say that they have never let us down and we value the relationship which is now into its 7th year and look forward to working with them on future projects,” concluded Dore.
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilises a token model such as Open Authorisation The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilises a token model such as Open Authorisation. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
Everbridge, Inc., the global pioneer in critical event management, announced that it has been awarded a multi-year contract to support the deployment of Australia’s next-generation national early warning system. In combination with Australia’s major telecommunications companies, the Everbridge Public Warning solution will be used to power Emergency Alert in Australia, providing population-wide alerting to help reach the country’s over 25 million residents and approximately 9 million annual visitors. If residing within an area where a sudden, critical event occurs such as fire, extreme weather or a terror attack, residents and visitors to Australia will receive location-based SMS notifications on their mobile phones, in addition to smart phone mobile app notifications and fixed line voice alerts, among other modalities. Supports first responder communications Everbridge Public Warning leverages telecom infrastructure to reach everyone within a geographic area Everbridge Public Warning leverages existing telecom infrastructure, with no opt-in required, to reach everyone within a geographic area to reduce disaster risk, support first responder communications, and analyse disaster communication effectiveness for subsequent mitigation activities. “Our Public Warning solution enables government organisations and public safety agencies to immediately connect with every person in an affected area during a critical event regardless of nationality, residency or mobile telephone handset type,” said Jaime Ellertson, Chief Executive Officer and Chairman of Everbridge. “Australia has served as a model example for population-wide alerting and emergency preparedness over the past decade, and we are honoured to support them on the evolution of their national system.” The next-generation system is scheduled to become operational in 2020.
Everbridge, Inc., the global pioneer in critical event management software that helps keep people safe and businesses running, announced that its mass notification solution will be used to power alerts for Nashville and Davidson County, Tennessee in times of emergency. The Metro Emergency Alert & Notification System (MEANS) will deliver safety instructions via cell phone, landline, and SMS for localised emergencies such as flooding, public health emergencies or active shooter situations. “This is an important way for us to keep the community updated on incidents happening in Nashville and Davidson County,” said Chief William Swann, Director, Nashville Fire Department. “The Everbridge system will be leveraged by Metro Government to communicate directly to the public. Residents and visitors can feel confident that when they receive alerts, they are getting accurate information straight from a Metro public safety agency.” Everbridge Mobile App delivers alerts to cell phones based on a user’s physical location during emergency Receiving alerts on cell phones Metro officials also urge residents to download the Everbridge Mobile App, which brings the added security of delivering alerts to cell phones based on a user’s physical location at the time of an emergency. “The Everbridge app provides Metro with a key alerting capability because it enables us to send safety instructions to residents who happen to be in the vicinity of an emergency in real time,” said Department of Emergency Communication’s Director Michele Donegan. Nashville joins a growing list of America’s largest cities, counties, and entire states that have rolled out the Everbridge platform including the cities of New York, Philadelphia, New Orleans, Atlanta, Houston, Phoenix, San Francisco, Tampa, and Washington, DC; hundreds of counties including Napa, Sonoma, Ventura, Miami-Dade, Palm Beach, Cook, Harris, and Maricopa; and the states of Florida, Connecticut, Vermont, and New York.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Ethical hackers are familiar to the world of cybersecurity. As cybersecurity awareness increases in physical security, they are also playing a larger role to ensure the safety of networked and information technologies used in our market. We asked this week’s Expert Panel Roundtable: What is the role of ‘ethical hackers’ to ensure cybersecurity of networked products in the physical security market?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
How plate reader technology increases your perimeter securityDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals