SecuX Technology Inc., a blockchain security company, has released a new firmware 2.0 upgrading SecuX V20, W20 and W10 crypto hardware wallets that support a new coin DigiByte (DGB) for cryptocurrency users to securely store and manage their DigiByte assets through the military-grade Secure Element (SE) to protect their Private Key and Device PIN of SecuX hardware wallets from all kinds of crypto physical and cyber attacks. Faster than Bitcoin “Our technical teams are delighted to be a R...
Johnson Controls is introducing the Ethos line of multi-tech contactless access readers from WaveLynx Technologies. Ethos readers are equipped with a choice of credential technologies, enabling customers to choose migration paths to deploy secure credentials. WaveLynx Ethos multi-tech contactless access readers feature a modern aesthetic and state-of-the-art feature set. All Ethos readers are capable of reading legacy Proximity credentials, MIFARE DESFire® smart card credentials, LEAF enabl...
The 22nd edition of inter airport Europe, the International Exhibition for airport equipment, technology, design & services, ended with a record visitor number. During the four exhibition days, a total of 14,962 trade visitors from 108 countries came to the Munich Trade Fair Centre in Germany to discover the latest trends in the airport industry and source innovative equipment and systems. This represents an 8% increase in visitor numbers compared to the previous show in 2017. With a total...
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowe...
Milestone Systems is committed to protect people and assets and optimise businesses. With the Milestone Community Kickstarter Contest, Milestone invites innovators to help them create technology that will make the world a better place. Milestone Systems has built an open platform for vision-based technology software working with applications that create benefits across areas such as security, transportation, emergency response, traffic optimisation and even in wildlife. The Milestone Community...
ELATEC USA Inc., a developer and manufacturer of innovative RFID products, announced Paul K. Massey as Chief Executive Officer. In this newly created position, Massey will report to the ELATEC Board of Directors and Managing Director Stefan Haertel. As CEO of ELATEC USA, Massey will focus on the growth and proliferation of ELATEC solutions in its North American and Latin American markets. Customer focused communicator “We are fortunate to have someone of Paul Massey’s calibre and...
Nedap and Touchless Biometric Systems (TBS) are hosting the first Security Integration Forum in the Middle East on 7th October 2019. Held at the Conrad hotel on Sheikh Zayed Road in Dubai, it will bring together technology businesses and experts. The aim is to enable discussion of the latest security industry trends and potential collaborations, and showcase advanced technologies and integrations. The highlight of this first Security Integration Forum is the live experience area. Here, in a live demo of a smart building, attendees can experience seamless integrations of technologies from TBS, and other manufacturers, with Nedap’s AEOS access control. Visitor registration and management The integrations on show will be from best-of-breed solution providers and security equipment manufactures It’s also an opportunity to learn more about the commercial and operational value offered by AEOS and TBS integrations. The integrations on show will be from best-of-breed solution providers and security equipment manufactures. This includes Milestone Systems, Axis communication, CNL Software, Samsotech, Traka, Assa Abloy and Boon Edam, as well as Nedap Identification Systems. The scenarios and features available to experience include: End-to-end security for access control Visitor identification and verification using biometrics Visitor registration and management Vehicle identification Key and asset management Wireless access control using online and offline locks Video management systems and CCTV Physical security information management Identifying new opportunities and partnerships All of the businesses involved will present the technology trends in their business area and market" Jochem van Ruijven, Managing Director at Nedap FZE says: “With this event, we aim to display the incredible strength and expertise of each participating technology partner. All of the businesses involved will present the technology trends in their business area and market.” “It’s an amazing opportunity for security industry experts in the Middle East to come together and get to know the people behind the leading security manufacturers. Not to mention the chance to identify new opportunities and partnerships for their business. More than ever before, decision makers must provide both security and convenience,” says Alex Zarrabi, CEO of TBS and co-host of the Security Integration Forum. “This calls for integrated rather than isolated solutions. Navigating the maze of technologies and interoperability takes more time than people have available. But during a few hours at our forum, decision makers can experience what happens when best-of-breed security manufacturers join forces to solve their challenges.”
Identiv, Inc announced that the company is expanding its partnership with Les Bouchages Delage to deliver Internet of Things (IoT)-ready solutions for near field communication (NFC)-connected bottles in the wine and spirit industry. Identiv and Les Bouchages Delage originally partnered while collaborating on an intelligent NFC bottle cap for a luxury cognac brand. Now, the two companies are expanding their partnership by equipping a wide variety of Les Bouchages Delage cap designs with Identiv’s NFC technology. Near Field Communications technology Identiv and Les Bouchages Delage incorporated a contactless NFC tag into the cork stopper of all decanters While partnering on the luxury cognac project, Identiv and Les Bouchages Delage incorporated a contactless NFC tag into the cork stopper of all decanters. By tapping their mobile device to the cork, consumers are able to register their purchase and become a member of a private club providing exclusive content, unique experiences, and personalised services. The expanded partnership between the two companies will now apply the same intelligent technology to a greater selection of Les Bouchages Delage bottle caps. Custom Near Field Communications tag Identiv has developed a custom NFC tag design that fulfills a variety of unique bottle cap requirements, including high-performance in complex metal environments, maximum durability and readability by both Apple iOS and Android mobile devices at a small tag size, and 100% tested, secured, encoded, and locked variable data. As an expert in closure design and production, Les Bouchages Delage has provided the most reliable industrial production process for tag embedding, ensuring maximum radio frequency identification (RFID) performance and luxury-brand quality control. Radio frequency identification performance “Forty billion devices will be connected to the IoT by 2020,” said Stephane Ardiley, Identiv Director of Product Management. “Identiv’s expanded partnership with Les Bouchages Delage meets the increasing demands of consumers in this NFC-enabled world.” He adds, “people expect to connect to products in new ways, and through this partnership, we’re strengthening our commitment to consumer engagement, asset tracking, and authentication in the IoT.” IoT-connected products We saw a tremendous response to the intelligent corks in the luxury cognac project" “We saw a tremendous response to the intelligent corks in the luxury cognac project,” said Christian Delage, Les Bouchages Delage CEO. “Les Bouchages Delage is expanding its partnership with Identiv to apply this same intelligent technology to our complete line of customisable bottle caps to meet the increasing consumer demand for IoT-connected products. He further said, “Identiv’s tag designs meet each unique requirement in the wine and spirits industry and the team shares our vision for truly trustworthy product authentication.” NFC-compatible electronic devices Identiv’s complete portfolio of NFC-enabled solutions features a catalog of transponders compatible with NFC Forum, created for contactless transactions and connecting electronic devices with a simple tap-and-go model.
Sisense, the analytics platform for builders, achieves a series of new security compliance standards that will provide its customers with the highest levels of protection for their data. Sisense and Periscope Data, who merged with Sisense this spring, both achieved ISO 27001 compliance, the internationally recognised standard for information security programs. ISO 27001 is a systematic approach to managing sensitive information and assets so they remain secure. Continual improvement of security efforts Certifying to ISO 27001 validates that the governance and oversight of information security management has been confirmed to keep customer information at a high level of confidentiality, integrity, and availability. Compliance with these standards affirms Sisense's commitment to protecting customer data, and the company’s continual improvement of security efforts. Sisense continues to invest in various security capabilities, solutions and features Sisense continues to invest in various security capabilities, solutions and features to meet the ever-changing threat landscape. “At Sisense, we’ve designed our programs with security front of mind. This was not an overnight effort to achieve ISO compliance. It was through meticulous security processes and procedures that it became part of our culture and we’re confident in our ongoing commitment to provide the security that our customers deserve,” said Ty Sbano, cloud chief information security officer at Sisense. Delivering secure products and services “Delivering secure products and services is critical for every company from enterprises to small businesses, especially in the business intelligence & analytics market where compliance is core to the product experience and helps build trust with our customers,” said Leon Gendler, vice president of research and development at Sisense. “These independent certifications are a testament to our security mindset and culture and the high standards we uphold for our customers.” Earlier this year, Periscope Data by Sisense re-certified for SOC 2 Type II, which ensures a company’s data is securely managed to protect the interests of the organisation and the privacy of its clients. In 2018, Periscope recertified its Privacy Shield Certification to comply with data protection requirements when transferring personal data from the European Union and Switzerland to the United States in support of transatlantic commerce. Periscope also renewed its Health Insurance Portability and Accountability Act (HIPAA) certification in support of partners in the healthcare industry.
BriefCam, the provider of VIDEO SYNOPSIS® and video content analytics solutions, announces the availability of the BriefCam Starter Kit Program. The tightly coupled appliance-based solutions, enable low-touch deployments in less than five minutes as a result of a pre-configured and a certified hardware appliance, seamless integration with the deployed VMS software, powerful and intuitive user interface and administration tools, and full access to BriefCam’s cloud-based learning management system for user and administration training. High-value video content analytics The BriefCam Starter Kit Program is designed to meet the market demand for high-value Video Content Analytics" “The BriefCam Starter Kit Program is designed to meet the market demand for high-value Video Content Analytics, seamlessly integrated with industry leading VMS solutions with virtually plug-and-play deployment capabilities,” said Trevor Matz, BriefCam President & CEO. “This channel-friendly solution enables BriefCam and its VMS partners to rapidly deliver best-of-breed forensic analytic solutions to the sub-200 channel of the video surveillance market.” The BriefCam RapidReview Starter Kit is based on the BriefCam’s RapidReview product, with support for VIDEO SYNOPSIS, robust multi-camera search capabilities including 27 classes and attributes, as well as colour, size, speed, path, direction, and dwell time, face recognition and appearance similarity. Collaborative case management quickly and effectively organises all video assets of an investigation to further accelerate and optimise the video review process. VMS IP Address configuration Visual layers support activity level, dwell time, common paths and background changes, round out an ever increasing and powerful set of hundreds of search combinations for accelerating video investigations. The Starter Kit enables a low-touch, 5-step, 5-minute deployment for rapid time-to-value The Starter Kit enables a low-touch, 5-step, 5-minute deployment for rapid time-to-value. The simple process consists of license activation, VMS IP Address configuration, camera activation, SSO enablement/user creation and VMS plug-in installation. The Kit includes out of-the-box support for on-demand and scheduled analytics, and scales to support a maximum of 200 channels. Upgrade paths to BriefCam’s Insights and protect products are also available. Open platform community The BriefCam Starter Kit Program is available to the BriefCam’s VMS partner ecosystem with an initial offering available for Milestone XProtect. Starter kits for additional VMS partners will be available in the coming months. “Milestone enables an open platform community intended to drive innovation and collaboration across the partner ecosystem, and we are delighted to be one of the first BriefCam VMS technology partners to participate in the BriefCam Starter Kit Program,” said Tim Palmquist, Milestone Vice President of the Americas.
Radiflow, a provider of cybersecurity solutions for industrial automation networks, announces that the company releases a new version of its iSID industrial threat detection solution. In this new version, iSID analyses the OT network and maps the operational business processes of the industrial facility. All business processes on the OT network are then graphically displayed, while each network-connected asset now includes the details of the business processes that each is connected to within the asset inventory maintained by iSID. Detecting potential attack paths iSID would calculate a risk score based on the increased attack surface and potential damage The iSID operator can then use this information to rank the business processes according to their critical impact and adjust the risk scoring, resulting in a business-driven prioritisation of the risk mitigations. In addition, Radiflow has added a framework for delivering on-going insight and actionable recommendations for reducing the risks on the OT network. For each identified risk, iSID calculates a risk score based a set of best practices for OT cyber security defined by Radiflow. Each identified risk also includes a description of its potential impact on operational business processes and recommendations for mitigation. For example, upon detecting potential attack paths to and access vectors on the OT network, iSID would calculate a risk score based on the increased attack surface and potential damage, and then provide the user with recommendations for threat mitigation measures. Maintaining and improving performance The research and advisory company Gartner recommends in its July 2019 Hype Cycle for Managing Operational Technology, 2019 (available to subscribers) that “security and risk managers should map OT leading performance indicators against IT/OT leading risk indicators to write security policies consistent with maintaining and improving performance”. These new risk analysis capabilities are part of our overall product strategy" “These new risk analysis capabilities are part of our overall product strategy to deliver our customers with the intuitive tools to manage their risks in a business-driven manner, which we believe are aligned with Gartner’s recently published recommendations to security and risk managers,” said Michael Langer, Chief Product Officer at Radiflow. “It is also important to highlight that these new capabilities are a direct extension of the Dynamic Vulnerability Scoring for OT assets included in our previous release of iSID.” Industrial enterprise customers “By mapping business processes and prioritising OT risks according business impact, industrial enterprises can address the most important vulnerabilities first in order to reduce the potential for business interruptions, which are critical for factories, manufacturers and similar industrial enterprises, especially in the private sector,” further explained Langer. These new additions to the iSID solution can be leveraged by Radiflow’s OT MSSP partners to offer on-going OT risk analysis and mediation services to their industrial enterprise customers. Radiflow is scheduling demonstrations of this new version of its iSID solution on its web site.
macmon secure GmbH, globally renowned technology solutions provider for network security, announced developing its Network Access Control (NAC) solution completely in Germany. The Berlin-based in-house development team has now been able to even extend the best-of-breed solution with further significant features in order to solve major future challenges of Corporate IT-Security. Network access control solution With macmon NAC, enterprise networks will be even more effectively protected against unauthorised access. Security teams will be significantly relieved of administrative workload. The amount in security tools will be reduced, and the IoT-devices securely operated. With version 5.15.0, macmon secure GmbH has reached yet another milestone With version 5.15.0, macmon secure GmbH has reached yet another milestone. In addition to numerous new and improved functions, the overall performance of the engine could be significantly increased, again. Therefore the processing speed of large amounts of data - as they occur in the Domain Name System (DNS), the network device detection and foot-printing - multiplied. Scalability for growing networks In the optimised dashboard, administrators now can see more details about unauthorised devices in the network status in more detail. macmon NAC also evaluates the network status. This relieves the IT department from work and makes decisions easier. With new and enhanced filter wizards, macmon NAC now also offers the option of searching in IPv4 and IPv6 ranges. The filters can be even more granular. In addition, RADIUS authentication information has been enhanced in reporting and included in a NAC RADIUS report.In addition to various improvements and optimisations, which result from the close collaboration with the macmon customers, it is now possible to also implement NAC via SNMP with macmon satellites, enabling decentralised NAC. The synchronisation of the servers has been significantly accelerated, the interaction has been expanded considerably with more stability. The transparency of the processes and the performance of the scalability nodes has been increased. In addition, detailed status messages provide more transparency about the synchronisation as well as the system status of the satellites. macmon RADIUS server The relatively new Past Viewer feature has been further optimised to more effectively evaluate the historical data of the network. On one hand, the collected information was supplemented by further details and the search for historical data was made more flexible for the administrator. For logins to a network device, the macmon RADIUS server can now be used for authentication. To do this, macmon NAC has a separate set of rules that makes access options controllable. The switch port layouts stored in a particular network device can be configured, and also displayed graphically. The overview of complex networks increases enormously. macmon REST API With a wider range of functionalities, the macmon REST API now covers almost all areas of macmon NAC With a much wider range of functionalities, the macmon REST API now covers almost all areas of macmon NAC. Thus, the possibility to set manual links was added and the intelligent access to endpoints was extended. So not only the information about company devices, guest devices, and BYOD devices, but from now on about any other unknown/discovered devices are available. Last but not least, the API also enables guest management and Wake-On-LAN.Access VLANs configured on the switch ports can now be automatically adopted as terminal standard VLANs. Other VLAN concepts can be implemented flexibly, extending to parallel operation with other VLAN management solutions. By activities and on demand you will be informed by e-mail about the event ID and get with one click directly to the process. Extended capabilities To support the widest possible network device diversity, several new methods are included, such as extended capabilities for SonicWall Firewalls, Cisco WLAN Controller 5500 and switches from HP (1910s), Ruckus, Extreme (Rail), Alcatel (Industrial), Enterasys and Moxa.The management of guests and the creation of vouchers via the macmon guest portal has been expanded and is now much more flexible. Administrators can differentiate between time of usage and usage duration and are in the position to extend voucher lifetime quickly. FireEye integration extends connectivity In addition to texting, a SMS can be sent to guests on extension or expiration of their utilisation period. The portal pages can now also be displayed in Spanish and Italian. The site offers an optimised display of details and messages for administrators and guests.The new integration of FireEye enables the receiving and processing of status information of individual endpoints in the network. This way, endpoints that are classified by FireEye as dangerous or infected, are automatically isolated in macmon NAC, accordingly. Integration with other security solutions In macmon NAC, other security products can also be integrated, for example, endpoint security solutions In macmon NAC, other security products can also be integrated, for example, endpoint security solutions, emergency management and firewall / IPS. The company uses its long-standing technology partnerships with well-known manufacturers of security products such as Barracuda, Certex Tenfold, Contechnet, EgoSecure and NCP to promote the knowledge exchange. The open macmon REST API also enables direct connection to any asset management system, identity source or infrastructure component. Customers benefit from these far-reaching opportunities and can optimally combine multi-vendor IT systems. Network security Christian Bücker, Managing Director macmon secure GmbH, said "Over the past few months, our development team has developed significant capabilities that will allow us to further extend our leading position in the dynamic network security market. He adds, “Our customers appreciate macmon NAC because we offer a solution that can handle the existing enterprise infrastructure in a highly dynamic, but also an intelligent way. Network security becomes even easier and more efficient through our permanent in-house development capabilities."
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promises to 'elevate the event experience with modern education learning experiences, revitalised networking opportunities, and a reimagined trade show floor.' More than 550 exhibitors will be featured in the expo hall (open Sept. 10-12), according to ASIS International. Chicago is a great location for GSX, as evidenced by the successful 2013 ASIS show. Cutting-edge solutions X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding GSX seeks to attract more attendees to the exhibition hall with education events positioned alongside the industry’s latest-and-greatest equipment and technology exhibits. On the expo floor, the GSX: Disruption District will include new and enhanced programs such as the X Learning stages, the D3 (drones, droids, defence) Learning Theater, the Pitch Competition and the Innovative Product Awards. X Learning is a series of experiential sessions. X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding of new technology. GSX: Startup Sector highlights new companies with emerging technologies; and GSX: Pitch Competition brings together entrepreneurs, investors and industry leaders to feature early-stage startup pitches. Career HQ will provide free resume reviews, career coaching, professional development and networking opportunities. A Sharpshooter Contest sponsored by Smart Simulators and SB Tactical will allow contestants donating $20 to compete for $500 in prizes each day. Pre-conference certification courses More than 300 security courses, plus pre-conference certification courses, will provide security professionals expertise to enhance their career development. Programming will be led by ASIS and InfraGard subject matter experts. (InfraGard is a non-profit organisation serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation.) Seventeen education tracks will serve the needs of security professionals interested in topics from business continuity to crime/loss prevention, law and ethics to national security, information security to physical and operational security. The show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers 'Game Changer' sessions will address hot and controversial topics, including 'The Ever-Changing Drone Landscape: What You Need to Know' and 'Accelerating Digital Transformation: Insights and Applications.' Ian Bremmer of Eurasia Group will speak on navigating the geopolitical landscape; Steve Demetriou and Joe Olivarez of Jacobs, a global professional services company, will speak about harnessing technology and big data to make strategic decisions. Providing new opportunities Wednesday morning, General John F. Kelly of the U.S. Marine Corps (Ret), will provide insight into the evolving geopolitical landscape around the world. His keynote presentation on Sept. 11 will kick off Military and Law Enforcement Appreciation Day. Tarah Wheeler, cyber security researcher, will speak on protecting assets in the age of cybersecurity leaks and scandals. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry Although the attendee emphasis is on security end-users, the show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry, according to ASIS International. Networking events will include an ASIS Town Hall Meeting on the afternoon of Sept. 8, aimed at opening communication between ASIS staff and membership. There will be an Opening Night Celebration Sept. 8 centred on the theme 'Chicago on the Silver Screen' at Revel Motor Row, a popular Chicago landmark originally home to the Illinois Auto Club. Emphasis on education On Monday (Sept. 9) a networking luncheon will be followed by the Awards Reception later in the day. A reception in the evening will present the Karen Marquez Honors Award, recognising a female security professional. Tuesday (Sept. 10) will have a Happy Hour at the exhibit hall, followed later by a Women in Security and Young Professionals Happy Hour. Wednesday evening will be the President’s Reception at Wintrust Arena, with a 1980s theme. The annual trade show has declined in recent years, and ASIS International has implemented changes that seek to reinvigorate the show, culminating in the rebranding last year. One challenge is that the show’s emphasis on education keeps attendees engaged for hours of the day, making it harder to meet the expectations of exhibiting companies who want more booth traffic. More attractions on the show floor, including the Tuesday happy hour, are aimed at increasing overall foot traffic in the hall.
Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is especially relevant to two of March Networks’ primary vertical markets – banking, whose focus on money requires stringent cybersecurity; and retail, which has been the target of recent cybersecurity attacks. “People just don’t know what to do with cybersecurity,” says Dan Cremins, Global Leader, Product Management at March Networks. “The thing is, you have to figure out how to make your products, solutions and networks more secure, and then let them know what you are doing about it.” Cybersecurity mobile app As the profile of cybersecurity has increased in the physical security market, March Networks has added cybersecurity features to its GURU app. GURU is a mobile app for integrators to use when installing and diagnosing equipment in the field. Using a wireless dongle, the system can read the QR (Quick Response) code on a camera, for example, and provide installation information specific to that camera. As the profile of cybersecurityhas increased in the physicalsecurity market, March Networkshas added cybersecurity featuresto GURU GURU’s new Security Audit tool enables the app to scan a unit and check to make sure it is cybersecure; that is, the right ports have been closed and default passwords have been changed. Simple green, yellow and red coding communicates the cybersecurity status of equipment as it is being installed – and it takes less than five minutes. After installation, the GURU app can be used to conduct an extra check to ensure cybersecurity. There is also a section on the March Networks web site identifying security vulnerabilities (listed by CVE [Common Vulnerabilities and Exposures] number), explaining whether they affect March Networks equipment, and the availability of any patches. “Cybersecurity is the number one threat to any industry, including ours,” says Cremins. “We offer a tool to help people address it. We are trying to be as proactive as possible, and stay ahead of it.” Integrating inventory tracking & video There are other developments at March Networks, too, including a new integration partner in the retail sector. Tracking inventory is critical to retail loss management, and March Networks has integrated its video system with the Zebra RFID system for inventory tracking. Zebra uses radio frequency identification (RFID). Asset tags are used in combination with sensors mounted throughout a facility to keep track of where goods are transported in a retail store, warehouse or other location. If something goes missing,video of that item, tied to trackinginformation from the RFID system,is available instantly to aid withan investigation The Zebra RFID system generates inventory tracking information that is integrated with March Networks video in much the same way that point-of-sale (POS) information has been used with video. Information from inventory tracking is associated directly with each frame of video. The integration allows video cameras to watch equipment as it moves around a warehouse or retail space. If something goes missing, video of that item, tied to tracking information from the RFID system, is available instantly to aid with an investigation. In addition to retail, there are also applications of RFID inventory tracking in medical environments, where expensive equipment is used throughout a hospital, for example. Integration of video with inventory control would allow video cameras to watch medical equipment as it travels from floor to floor and room to room. Video provides a valuable investigation tool if a medical device goes missing. “They can review the video to see where it was and see what happened with it,” says Cremins. HDR cameras for banking applications At the recent ASIS show in Orlando, March Networks introduced the new ME4 series of multi-exposure, 4 megapixel cameras. The cameras are aimed at improving video image performance in situations with varied light, such as a glass-enclosed ATM enclosure, bank branch, or a retail location where bright windows can cause backlighting and other problems. In addition to better image quality and resolution, the cameras have been designed very economically, says Cremins. They strike a balance between video clarity and bandwidth and storage efficiency. The cameras use HDR (high dynamic range) technology designed for the most extreme lighting conditions. Even in an environment surrounded completely by glass, the cameras can still see the person in the foreground and details in the background. Facial details are critical in applications at banks and financial institutions.
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Ensuring safety and security of all who work and experience award-winning cruise facilities, a leisure travel company has secured key management across its fleet with Traka. The integration sees Traka specialist key management systems integrated into a complete fleet, ensuring compliance to the Cruise Vessel Security and Safety Act 2010 (Kerry Bill) in allowing only authorised staff access to dedicated areas on a bespoke curfew management system. Bespoke key management The number of ocean cruises taken last year reached over two million for the first time" Speaking about the integration, a representative from the cruise company said: “Cruise holidays are undeniably growing in popularity, as they give our guests the opportunity to experience being on board a floating city. For the UK and Irish market, the number of ocean cruises taken last year reached over two million for the first time, hitting a record 2,009,000 in 2018." “We have a necessary duty of care to ensure the high level of security and protection of our guests throughout their stay on any one of our luxury ships. Traka designed a bespoke key management solution that was simple to integrate and minimise interference with everyday operations to ensure not only compliance to cruise security but also an ability to capture audit control on every key in operation amongst our staff.” Cruise management platform “Together we believe this is a key step to improve ship safety and provide transparency and consistency, alongside dedicated accountability amongst all our staff. And in partnership, we can create an environment whereby guests can enjoy excellent standards of service throughout their stay on any one of our award-winning fleet.” “Traka worked closely with the technical team to install S-Touch key management systems across its fleets, with bespoke solutions designed per cruise facility. The dedicated curfew management feature integrated into each system can be set on any key, enforcing staff to return keys by a certain time, with an alert created on any asset that is not back in the allocated timeslot.” The result is improved productivity with lower collection and distribution time on staff handover" “The result is improved productivity with lower collection and distribution time on staff handover. And by integrating systems into the cruise management platform, even loggings could be specified on environmental and sustainability credentials in an innovative bid towards showcasing ‘green cruising.” Significant cruise community Ben Farrar, Traka Market Development Manager added: “Cruise ships are undeniably experiencing a booming market, with increased staff and fleets to accommodate demand. But within this, leading corporations have a role to play in highlighting the significance of compliance to the latest cruise regulation and guest safety.” “Traka created a bespoke system, enabling this prestigious fleet to benefit from essential security, including an ability to support authorised staff to control access to different areas, whether it be stock-taking or environmental control. We are looking forward to continuing our relationship to present various technical innovations and ensure even increased customer satisfaction across a significant cruise community.”
Delta Scientific, globally renowned manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, has announced that its innovative DSC1000 portable barrier and TB100 portable bollard systems were rented from Australian-based Knight Brothers to help protect the 85,000 entrants in the world's largest run on 11 August. Both a fun run and a competitive contest, the City2Surf Run covers a 14 kilometers (8.7 miles) course that begins in Sydney's Central Business District (CBD) and culminates at scenic Bondi Beach. Vehicle access and control system This annual event needs a vehicle access and control system that can be deployed temporarily and quickly" "This annual event needs a vehicle access and control system that can be deployed temporarily and quickly to secure vehicle check points into the main event area for the mobilisation, execution and demobilisation phases," explains Matthew Knight, director of Knight Brothers Pty Ltd, Australian partner of Delta Scientific. Knight adds, "At the same time, they did not want to purchase units that would only be used once a year. For such applications, a lease plan has been created where organisations can simply lease the portable barriers and bollards, use them, pack them up and return them." DSC1000 portable barrier system "Pre-packed in a 20 foot container, the DSC1000 barrier and TB100 bollard array package was delivered to site and deployed within an hour to provide effective perimeter protection whilst maintaining the required pedestrian and vehicle thoroughfares into the event grounds." The DSC1000 is a self-contained unit that is stored and towed on its own trailer. Light enough to be pulled by a golf cart and set up in only 10 minutes, the DSC1000 portable barrier's crash test stopped a 2300 kg vehicle going 64 km/p, providing it with an ASTM rating of P40. With no foundation or electrical hook-up needed, two people can set up and take down the DSC1000 special event barrier. TB100 portable bollard system The patent pending crash rated TB100 portable bollard system lets security providers promptly block access to temporary venues. Individual portable bollards provide vehicle safety in applications such as heavily traveled narrow walkways and roadways or any area that a vehicle can get through. Certified testing demonstrates that a TB100 portable bollard system will stop and disable a 6,804 kg vehicle traveling at 48 kph, resulting in an ASTM M30, P3 rating. A single TB100 bollard absorbs 400,000 foot pounds of kinetic energy.
As prominent in Belfast’s history as its cranes are on the city’s skyline, it’s hard to imagine Belfast without Harland and Wolff. Once the world’s greatest shipbuilder, Harland and Wolff today has evolved into a company that provides over 150 years of engineering excellence to the maritime, offshore, and renewable energy sectors. The Harland and Wolff facilities on Queen’s Island are now used to maintain some of the world’s largest ocean-going vessels, ranging from offshore platforms and cruise liners to offshore wind farms. The company is spread over two sites in Belfast and covers over 200 acres. Its main facility has a public-facing perimeter of no less than 1.5 kilometers. With safety as a primary consideration in the execution of projects, the company goes to great lengths to protect its investments from unwanted visitors, intruders, and vandalism. FLIR VMS solution For over 15 years, Harland and Wolff has been using FLIR’s United VMS to manage a wide variety of security cameras For over 15 years, Harland and Wolff has been using FLIR’s United Video Management System (VMS) to manage a wide variety of security cameras. As technology innovations and features were being added onto the United VMS over the years, Harland and Wolff has always remained loyal to the FLIR brand. But with the increasing development of Queen's Island as an industrial, commercial, and tourist area came a greater public presence and an increased safety and security threat. That is why in recent years Harland and Wolff has been continuously investing in the latest security camera technology from FLIR, including enterprise security cameras, PTZ cameras, intelligent thermal cameras, and mobile and wearable cameras. Optical and thermal cameras “Today, over 140 FLIR cameras on-site and along the site’s perimeter make sure that we can detect any irregularity,” said Chris Neill, security operations manager at Harland and Wolff. “Whenever one of our cameras picks up an incident – an intruder for example – an alarm is generated and sent to our security control room, who can then follow up the incident. This ensures us that our investment and that of our customers is safe and secure at all times.” Due to the high impact and risk associated to a possible incident on site, the company’s security department follows a proactive approach for possible intruders. Even in complete darkness, in perimeter areas where there is no additional lighting, thermal analytic cameras can pick up the presence of intruders, animals, or vehicles automatically based on their heat signatures. Intruder detection While thermal camera footage does not allow actual identification of intruders, it can still be used as evidence for insurance companies or law enforcers, especially when an intrusion pattern can be seen over different cameras. United VMS is FLIR’s enterprise-level software solution for video surveillance operations United VMS is FLIR’s enterprise-level software solution for video surveillance operations. The software is currently used at Harland and Wolff by four control room operators and eight managers, all of which have dedicated user rights. One of the strengths of the United VMS system is that it can connect with nearly any security camera on the market and that video streams and detection alerts can be presented on any screen, be it on a video wall, a PC, or a smartphone. United VMS But Harland and Wolff has been using United VMS for far more applications. “We also use the United VMS platform to monitor alarms coming from fire sensors on oil rigs, for example,” said Neill. “Another example is the detection of failed pumps on one of our drydocks. This information also comes in on United VMS, where we generate alarms and notify key staff in real time.” Harland and Wolff has indeed managed to make use of United VMS's flexibility and deploy it for much more than security applications only. "We are not in a static business," said Neill. "At Harland and Wolff, we are always taking on new challenges and solving new problems; FLIR’s United VMS platform helps us do that.” TruWITNESS mobile sensor technology Harland and Wolff will also make use of TruWITNESS, the latest mobile and wearable sensor technology from FLIR. TruWITNESS will allow guards on patrol to stream video directly to the control room in real time and from anywhere on the Harland and Wolff sites. Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport" Guards will be able to bookmark events so that incidents or irregularities can be reported and can be followed up more efficiently. In case of incidents, camera footage from the TruWITNESS wearable devices can be used as evidence. In addition, control room operators will be able to track members of staff via the United VMS and display their location on a map. Security technology advancements “Our yellow gantry cranes have become a national icon,” said Neill. “Unfortunately, this also means that they are an attractive target for political messages or, as in the past, terrorism. As a port facility, Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport. But in reality, we always exceed these requirements. We owe this to our continuous investments in security technology, which we also consider as a commitment to our customers.” Maybe this is what connects Harland and Wolff with FLIR. “As committed as we are to our customers, we expect the same from our suppliers as well,” said Neill. “As someone with a technical background, I have always been convinced of the quality of FLIR security products. But there will always be a time when you need to rely on technical support, and that’s where FLIR really makes a difference.”
EchoGuard receives FCC Equipment Authorisation allowing widespread deployment of the radar for security, surveillance, and airspace management applications. EchoGuard radar Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces that it has received approval from the FCC for widespread deployment of its EchoGuard radar for radiolocation and radionavigation in the United States. FCC Equipment Authorisation allows the radar to be used throughout the US for ground, airspace surveillance The FCC Equipment Authorisation allows the radar to be used throughout the United States for ground and airspace surveillance applications that detect and track potential security threats with high accuracy and for ground-based airspace management applications that ensure safe navigation of commercial drone missions. Electronically Scanning Array radar Echodyne's innovative metamaterials technology and powerful software combine to create an electronically scanning array (ESA) radar in a compact, solid-state format at commercial price points for the very first time. The radar has been demonstrating award-winning performance for government, law enforcement, security, and UAS / UTM customers for some time via experimental licenses. "We are excited that EchoGuard has received this authorisation allowing its widespread adoption in the US," said Eben Frankenberg, CEO of Echodyne. "With the growing number of troubling drone incursions at airports, stadiums, and other facilities, there is tremendous demand for high-performance radar sensors. Tackling drone threats Eben adds, "Our innovative radar technology and software greatly increases the ability for security systems to accurately detect and track drone threats, as well as improves ground tracking of people, vehicles, and vessels. Our radar outperforms every other radar in its class, is priced for commercial markets, and has proven to be the best mid-range surveillance radar in the market." Features of the EchoGuard high-performance radar include: True electronic beam-steering with market-leading C-SWaP attributes; Long-range detection with high reliability and accurate tracking of multiple, concurrent air and ground targets; and Easy integration into sensor fusion and security systems for unmatched 3D situational awareness.
The sensor solutions provider HENSOLDT is equipping the second batch of the German Navy’s K130 corvettes with its TRS-4D Rotator naval radar and its MSSR 2000 I friend-or-foe identification system (IFF). Only six months after the order was placed, the company has now successfully passed the factory acceptance test by the German procurement authority BAAINBw for the second system. “With the TRS-4D, the corvettes are getting an extremely powerful radar system,” said HENSOLDT’s CEO Thomas Müller. “Since we have started to produce our radars in series a short time ago, we have been able to reduce the time required for delivery to our customers considerably.” Order for seven TRS-4D radars On board the new F125 frigate, the TRS-4D is used in a configuration comprising four fixed planar arraysHENSOLDT has orders for seven radars which are intended for five ships and two land-based systems and are to be delivered by 2022. The company had previously equipped the first K130 batch with its proven TRS-3D radar. For the second batch, the TRS-4D has now been ordered to be supplied in a version comprising a mechanically rotating antenna (TRS-4D Rotator), which is also under contract for the U.S. Navy’s littoral combat ship (LCS). On board the new F125 frigate, the TRS-4D is used in a configuration comprising four fixed planar arrays. This radar system is part of a family of products which also includes ground-based air defence radar, TRML-4D. It thus benefits from shorter production cycles, continuous product improvements as well as advantages in stock levels of spare parts and training. Quick detection and tracking of targets The TRS-4D Rotator has been designed to be used for anti-aircraft and anti-surface operations. Its rotating antenna combines mechanical and electronic azimuth scanning, which allows targets to be detected and tracked very quickly. Thanks to its higher sensitivity, the AESA radar allows more precise detection, especially of small and manoeuvering objects, as well as faster confirmation of the target, which means that the ship crew has more time to respond to threats. The system includes an MSSR 2000 I secondary radar for friend-or-foe identification (IFF) The radar can be specifically programmed according to the customer’s needs, and its characteristics can be changed via the software to match new requirements that arise during its useful life. The system also includes an MSSR 2000 I secondary radar for friend-or-foe identification (IFF), which complies with all IFF standards, even the latest ‘Mode S / Mode 5’. This is all the more important as all NATO troops and their allies are currently in the process of converting their IFF systems to Mode 5. The Mode 5 capability enables the troops to take part in joint and combined operations with NATO and other allied forces.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?