Morse Watchmans announces that its KeyWatcher Touch Key Management System has once again received LenelS2 factory certification and interfaces with the LenelS2 OnGuard version 7.5 access control security system. “Morse Watchmans has completed required factory testing at LenelS2 to validate the functionality of its interface to the OnGuard system,” said John Marchioli, OAAP product management, LenelS2. “We look forward to their continued involvement in the LenelS2 OpenAccess Al...
Digital Defense, Inc. announces Frontline Network Map, an innovative feature offering IT security and operations professionals enhanced visibility of vulnerabilities and threats found on small, medium, and large networks. Frontline Network Map is accessible within Frontline.Cloud, the company’s SaaS security assessment platform and is being demonstrated at Black Hat 2019 conference currently underway in Las Vegas, Nevada. Risk network segments Through the Network Map capability, Fronlin...
The Dallmeier 5000 series single sensor cameras are equipped with a new encoder technology. The new versions of the dome, IR and fisheye cameras support H.265 HEVC (High Efficiency Video Coding) and offer improved object classification with camera-based, AI-enhanced Video Content Analysis (VCA). H.265 compression By its nature, the constantly improving resolution of video images demands high bandwidths and large amounts of memory. With the new generation H.265 encoder in the Dallmeier cameras,...
In a move to build upon their existing radar technical and sales support, 360 Vision Technology, renowned UK CCTV manufacturing company, is delighted to announce that it has appointed Mark Rainbow to the role of UK & Export Business Development Manager. Radar, video camera solutions Greatly experienced in the sales, engineering and specification of radar and video camera solutions across a wide range of applications, Mark begins his new role at 360 Vision Technology after 25 years with Ogi...
Johnson Controls announces Tyco Cloud, a new cloud-based security suite developed to help customers move costly and complex security infrastructure for access control and video surveillance to the cloud. With Tyco Cloud, organisations can reduce costs, improve enterprise security management and scale security operations on demand, providing unlimited possibilities to deliver security services over the internet. Accelerating digital transformation Tyco Cloud empowers this digital transformatio...
Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promi...
Reliance High-Tech, the independent security technology integrator and provider of lone worker protection services, has announced that it has relocated its headquarters to a new state-of-the-art facility in Station Road, Bracknell, from its previous site in Winnersh, Berkshire. The move follows a highly successful 12 months for the company and highlights its intention to significantly grow its operation and market share. The new offices offer more flexibility, a great new working environment for the company’s valued employees and convenient transport links by both road and rail for customers and partners. To showcase the company’s growing range of services, the facility boasts a purpose-built boardroom and customer innovation area, which invites visitors from a diverse array of vertical sectors to learn how Reliance High-Tech can help them achieve their security objectives in comfortable surroundings. Siloed security systems and integrated solutions Having a headquarters that allows us to further develop our strategic offering is vital as we move forward"Reliance High-Tech works with the very best technology partners in order to assist customers on their journeys from disparate, siloed security systems to fully integrated IT based solutions and, with the new innovation area, visitors now have the opportunity to see these first-hand. The company also runs its management, finance and sales functions from the new site, where its newly appointed sales director, Tom Clarke, will also be based. “The move to this new head office indicates our intention to rapidly expand the company’s success across key target areas with an absolute focus on supporting the changing needs of our customers,” commented Alistair Enser, Reliance High-Tech’s chief executive officer (CEO). “As a specialist niche integrator, with a strong interest in key technologies and helping customers navigate and gain incremental value through the fast changing and converging landscape of security, we operate at the cutting edge of service provision. Having a headquarters that allows us to further develop our strategic offering is vital as we move forward.”
Milestone Systems recently received the Security Equipment Approval from the Security Industry Regulatory Agency (SIRA) of Dubai. SIRA is a government body regulating the security industry in the Emirate of Dubai, providing protection to the community using preventive security systems and precautionary measures. Video Guard security system Video Guard, an initiative by SIRA is specialised in monitoring security cameras in buildings, in the case of a problem or dysfunction. The video guard system will monitor security cameras in Dubai and provide direct notification to SIRA Clients and system maintenance companies. If VSS faults are detected, an alert is sent to user and service provider by email and SMS for immediate action. This program will make sure that all cameras are operating as per expectations and regulations. Based on a true open platform, Milestone XProtect shows its endless integration possibilities The Milestone XProtect Corporate, XProtect Expert and XProtect Professional+ video management software (VMS) are the first major VMS’ to be officially approved from SIRA. Based on a true open platform, Milestone XProtect shows its endless integration possibilities and strengths to embed third-party applications and business systems through the Milestone Integration Platform (MIP). Milestone Husky X8 NVR The Milestone Husky X8, a high performing network video recorder offering astonishing performance and extreme reliability, has also been certified by SIRA. This seal of approval is very important, as it helps customers identify solutions which live up to the UAE authorities’ requirements and the standards defined by SIRA. Milestone Systems is a globally renowned provider of open platform video management software; technology that helps the world see how to ensure safety, protect assets and increase business efficiency. The open platform technology enables the most extensive global partner community and drives collaboration and innovation in the development and use of network video. Reliable, scalable solutions In the Middle East since 2008, Milestone is a global company with reliable and scalable solutions that are proven in more than 150,000 sites worldwide. Since every installation is different, Milestone software is highly adaptable and can accommodate the changing needs of any businesses. Through the extensive partner network, customers have the ability to choose the optimal cameras, the best infrastructure and the prime third-party solutions suited to individual and changing needs. This provides the industry’s broadest knowledgebase only a local call away – important in distributed installations covering large geographic areas.
Prey Inc., provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, announced Prey for Education, a mobile security feature-set offering developed to address the needs of K-12 and higher education environments. Co-designed with partnered schools, Prey for Education centralises and automates mobile device security management so that hard-pressed school IT staff can delegate and automate tasks and ease their workflow. This initial feature release is designed to help schools better evaluate and track their mobile fleets and grow their device environments safely to ensure they can generate better results and promote the growth of their tech programs. Features of Prey for Education IT managers can also review further inventory data, such as battery and network connection per devicePrey for Education was developed in collaboration with Prey’s education customers to provide the following: Scheduled Automations – This new capability allows managers to schedule Prey actions on their devices, such as the lock, alert, and alarm, to be executed on specific days, hours, and data ranges. For example, a curfew lock can be set from Monday to Friday at 6pm to deter out-of-hours device usage. Reactive Security – New Control Zone Actions Triggers integrate with the Control Zone settings, Prey’s geofencing movement detection parameters, to precipitate reactions and eliminate reaction time in case of an eventuality. Users can configure Prey’s alarms, alerts, locks, and the ‘Mark as Missing’ evidence reporting feature whenever a device enters, or leaves a designated area. Specific actions can be assigned to both the entry, and exit. Inventory Management – IT staff can now assign a user or specify a contact for each device. An Online/Offline tag has been added to provide visibility on the devices’ connection, as well as a ‘Last Seen Online’ device sorting for quick visibility. As for device status, IT managers can also review further inventory data, such as battery and network connection per device, together with the logged in user. The multi-OS Prey for Education platform allows IT managers to group devices by class, usage, or state with custom tags Unified Management – The multi-OS Prey for Education platform allows school IT managers to group devices by class, usage, or state with custom tags; view device status or hardware changes; and assign them to faculty or students. Data Privacy – An extra layer of FERPA / data privacy compliance is delivered with data wipe and retrieval reactions, and Prey’s tracking and evidence gathering are configurable to boost end-user privacy. Promoting safe mobile environments “The Control Zone Actions and Scheduled Automations were created from the feedback our users gave us regarding their multi-tasking and high-pressure workflow. In the end, we’re trying to make their work as easy as possible. For example, they can now do things such as create digital curfews for their devices and ensure their fleet is locked up when the day ends,” said Carlos Yaconi, founder and CEO of Prey Inc. “We’re doubling down on our promise to help promote safe mobile environments for NGOs, schools, and universities, and we will continue to work with our partners to enhance and deliver new solutions for them.”
Radiflow, global provider of industrial cybersecurity solutions for industrial automation networks, has announced that the company has been recognised as the Global Customer Value Leader in IT/OT Security for Smart Buildings by the leading analyst firm, Frost & Sullivan. Cybersecurity protection This award from Frost & Sullivan highlights the growing importance that Radiflow is playing in providing cybersecurity protection for smart building operations as dramatically increasing numbers of industrial IoT devices are deployed for building automation systems and smart applications that control building operations, such as elevators, lighting and HVAC systems. Radiflow has been selected for this award for allowing smart building operators to better manage cybersecurity risks with a unique combination of superior technology and attractive partnerships with Managed Security Service Providers (MSSPs). Radiflow correctly recognises building automation security as a promising growth opportunity" “Radiflow correctly recognises building automation security as a promising growth opportunity and has developed specific use cases for its superior technology for this segment,” explained Swetha R K, Senior Research Analyst at Frost & Sullivan. “Radiflow has already won substantial business for securing building management system networks and is expecting to significantly accelerate growth in this vertical with its win-win partnerships with MSSPs.” iSID Threat Detection System Protecting smart buildings is one of the many growing use cases for Radiflow’s iSID Industrial Threat Detection System, which also includes industrial automation networks and critical infrastructure. iSID builds a network topology map on an OT network and continuously monitors for any changes to this baseline understanding. For a smart building operator, iSID can detect in real-time policy violations of the various maintenance teams and third party suppliers that need to access its OT network. “Many smart building operators lack the internal expertise and bandwidth to internally address OT-specific cybersecurity issues and are increasingly preferring to utilise managed security services from MSSPs to protect both their IT and OT networks,” continued Swetha R K. “Radiflow has recognised this shifting market trend and has proactively taken steps towards implementing an attractive partnership-based strategy with MSSPs.” OT cybersecurity services MSSPs can also offer advanced OT cybersecurity services that leverage iSID’s automated vulnerability mapping Radiflow has recently launched an OT MSSP partner program that provides tools, procedures and expertise for MSSPs to efficiently introduce new cybersecurity services dedicated to ICS/SCADA systems and OT networks. Radiflow works closely with each OT MSSP partner to implement the processes that are required to rollout a full range of OT cybersecurity services, including mapping and monitoring the network topology and connected assets, detecting and responding to security alerts, optimising end user cybersecurity expenditures and others. MSSPs can also offer advanced OT cybersecurity services that leverage iSID’s automated vulnerability mapping. MSSPs can also offer advanced OT cybersecurity services that leverage iSID’s automated vulnerability mapping and dynamic scoring processes in order to identify the most critical security risks based on the impact to a customer’s specific business operations. Smart Building security “The smart building segment certainly holds a lot of potential for our company and we are pleased with our initial traction in this space with customers in critical facilities, including government buildings, hospitals and banks,” said Ilan Barda, CEO at Radiflow. “This important recognition from Frost & Sullivan confirms our position that using an MSSP-based service ensures the effective evaluation of risks and response procedures.”
Sargent and Greenleaf, Inc. (S&G), a global manufacturer of high-security locks and locking systems for safes, vaults and high-security cabinets, has appointed Mark LeMire to Chief Executive Officer. LeMire comes to Sargent and Greenleaf with over 25 years of experience in executive management, new product development and engineering. Most recently, LeMire held leadership positions at Loma Systems and Buehler, both divisions of Illinois Tool Works (ITW). As a Global Director of Marketing and Product Development for Buehler, he managed and led the product portfolio encompassing lifecycle management, innovation and new product development. As CEO, LeMire will provide strategic leadership and day-to-day operational management for Sargent and Greenleaf, guiding the company to exceed its business objectives. Security and communication expert Mark will be a great asset as he takes on this role to help further S&G’s long-standing reputation" “We are proud to welcome Mark to the S&G executive team,” said Paul Bridwell, Managing Director at OpenGate Capital, who is responsible for overseeing all North American investments for the firm. “With his extensive product development knowledge, Mark will be a great asset as he takes on this role to help further S&G’s long-standing reputation as a trustworthy and dependable manufacturer of high-quality, innovative products.” OpenGate Capital acquired S&G in June 2019 and the business joins the firm’s global portfolio of lower middle market businesses operating across North America and Europe. Asset security “I am excited to work with the S&G team to build upon the successful and respected legacy that those before me have built over the last 160-plus years,” states LeMire. “As technology evolves, S&G will continue to provide products that secure our customers’ most valuable assets, while building even stronger customer relationships.” LeMire graduated from Purdue University with a B.S in Mechanical Engineering Technology and received his M.B.A in Marketing from DePaul University in Chicago.
Traka is making its debut at Security Expo 2019 in Sydney, Australia to demonstrate its local capability to offer innovative, sector specific solutions for key and equipment management, backed with a global support network. Traka, globally renowned intelligent management solutions provider for keys and equipment, acquired Secure Edge early in February 2019, to increase the ability to support its global and regional customer base. Endorsed key control system Traka will unveil its latest systems, including its specialist IntrepidTM SCEC Endorsed key control concept During Security Expo on stand G38, Traka will unveil its latest systems, including its specialist IntrepidTM SCEC Endorsed key control concept. Designed exclusively for Australian Government departments, agencies and suppliers, Traka’s innovative IntrepidTM design provides a scalable solution to secure, control, distribute and audit sensitive, often critical, keys and assets. Traka will be able to demonstrate to visitors its key management portfolio, including its innovative V-Touch together with its scalable L-Touch, S-Touch and M-Touch solutions. Each are presented to operate standalone or fully networked, as part of a centralised system and offer simple ways to control keys and manage different facilities, with full and compliant audit trail capability. Key control management solutions Says Martin Woodhouse, Head of APACMEA for Traka: “Security Expo 2019 is the perfect platform for Traka to demonstrate our international growth, with the most recent acquisition in Australia enabling us to present our bespoke local solutions and our ability to respond to the regional needs. This includes our powerful Traka IntrepidTM SCEC Endorsed Key Control management system, dedicated to presenting high security functionality for the Australian Government.” “Traka’s direct presence here is backed by a global network of technical services and design skills. We look forward to meeting visitors on our stand to discuss their requirements for intelligent key and equipment management solutions and demonstrate how Traka can assist end users to increase efficiency, reduce downtime and enhance safety while maintaining compliance and meeting operational requirements. All these provide a tangible return on investment for our customers.” Locker systems Live demonstrations of Traka’s key management solutions will include faulty item exchange Traka’s dedicated locker systems will also be on display, featuring their ability to charge equipment whilst stored, ensuring the most charged device is always handed out first for equipment optimisation and increased productivity. On the stand, live demonstrations of Traka’s key management solutions will include faulty item exchange, email notifications and random return capability. Integration with Gallagher security platforms Traka will also be demonstrating the power of integrated solutions by showcasing how Gallagher’s Command Centre and Genetec access control platforms work seamlessly with its key and equipment management systems. All solutions on display, will be fitted with HID readers to present secure authorised access. Oceania Regional Director, Rod Barden concluded: “Our team is really excited to be at Security Expo 2019 and to press ahead with our ambitious growth plans for the region, all based on our ability to be ‘local when you need us, global when it counts.’ We look forward to seeing you there!” Traka’s product portfolio of intelligent key and asset management solutions will be on display on stand G38 at Security Expo 2019, taking place between 24 – 26 July 2019 at ICC Sydney.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is especially relevant to two of March Networks’ primary vertical markets – banking, whose focus on money requires stringent cybersecurity; and retail, which has been the target of recent cybersecurity attacks. “People just don’t know what to do with cybersecurity,” says Dan Cremins, Global Leader, Product Management at March Networks. “The thing is, you have to figure out how to make your products, solutions and networks more secure, and then let them know what you are doing about it.” Cybersecurity mobile app As the profile of cybersecurity has increased in the physical security market, March Networks has added cybersecurity features to its GURU app. GURU is a mobile app for integrators to use when installing and diagnosing equipment in the field. Using a wireless dongle, the system can read the QR (Quick Response) code on a camera, for example, and provide installation information specific to that camera. As the profile of cybersecurityhas increased in the physicalsecurity market, March Networkshas added cybersecurity featuresto GURU GURU’s new Security Audit tool enables the app to scan a unit and check to make sure it is cybersecure; that is, the right ports have been closed and default passwords have been changed. Simple green, yellow and red coding communicates the cybersecurity status of equipment as it is being installed – and it takes less than five minutes. After installation, the GURU app can be used to conduct an extra check to ensure cybersecurity. There is also a section on the March Networks web site identifying security vulnerabilities (listed by CVE [Common Vulnerabilities and Exposures] number), explaining whether they affect March Networks equipment, and the availability of any patches. “Cybersecurity is the number one threat to any industry, including ours,” says Cremins. “We offer a tool to help people address it. We are trying to be as proactive as possible, and stay ahead of it.” Integrating inventory tracking & video There are other developments at March Networks, too, including a new integration partner in the retail sector. Tracking inventory is critical to retail loss management, and March Networks has integrated its video system with the Zebra RFID system for inventory tracking. Zebra uses radio frequency identification (RFID). Asset tags are used in combination with sensors mounted throughout a facility to keep track of where goods are transported in a retail store, warehouse or other location. If something goes missing,video of that item, tied to trackinginformation from the RFID system,is available instantly to aid withan investigation The Zebra RFID system generates inventory tracking information that is integrated with March Networks video in much the same way that point-of-sale (POS) information has been used with video. Information from inventory tracking is associated directly with each frame of video. The integration allows video cameras to watch equipment as it moves around a warehouse or retail space. If something goes missing, video of that item, tied to tracking information from the RFID system, is available instantly to aid with an investigation. In addition to retail, there are also applications of RFID inventory tracking in medical environments, where expensive equipment is used throughout a hospital, for example. Integration of video with inventory control would allow video cameras to watch medical equipment as it travels from floor to floor and room to room. Video provides a valuable investigation tool if a medical device goes missing. “They can review the video to see where it was and see what happened with it,” says Cremins. HDR cameras for banking applications At the recent ASIS show in Orlando, March Networks introduced the new ME4 series of multi-exposure, 4 megapixel cameras. The cameras are aimed at improving video image performance in situations with varied light, such as a glass-enclosed ATM enclosure, bank branch, or a retail location where bright windows can cause backlighting and other problems. In addition to better image quality and resolution, the cameras have been designed very economically, says Cremins. They strike a balance between video clarity and bandwidth and storage efficiency. The cameras use HDR (high dynamic range) technology designed for the most extreme lighting conditions. Even in an environment surrounded completely by glass, the cameras can still see the person in the foreground and details in the background. Facial details are critical in applications at banks and financial institutions.
There was another big trade show last week – the four-day Security Essen event in Germany. I didn’t attend, but several of my SourceSecurity.com colleagues report it was a busy show from start to finish, with the halls devoted to video/CCTV and access control dominating the show. The other halls were quieter, with smaller stands. Hot topics included big data, machine learning, mobile credentials, storage and an emphasis on solutions (rather than products). The exhibit hall was a bit of a maze, but attendees managed to find their way to the various stands. Three big companies – Bosch, Siemens and Honeywell – were conspicuously absent from their usual large role at Security Essen, and there was mixed feedback about the impact of their absence on the larger show. Without three gigantic stands to concentrate the footfall, attendees seemed more spread out than clustered. Hands-on, technical displays Hands-on displays with plenty of technical detail were the norm, encouraging attendees to interact with the products. The ASSA ABLOY stand, huge as always, reflected the continuing popularity of key systems in the German, Swiss and Austrian markets. ASSA ABLOY’s Yale also featured a home automation zone. Hands-on displays with plentyof technical detail were thenorm, encouraging attendeesto interact with the products Hikvision envisions cameras coming very soon with “deep learning” capabilities. These cameras, combined with big data applications, are the future of smart traffic systems, for example. Deep learning systems will replace traditional licence plate recognition (ANPR) and analyse electronic data about cars, rather than relying on number plates, says the company. Hikvision also highlighted multi-sensor cameras that can cover a large area and reduce the cost-per-channel – they have big projects in China and Southeast Asia. Hikvision’s privacy masking functionality is popular in Europe because of privacy regulations. Fujifilm demonstrated its impressive zoom lens series, featuring 60x zoom, long focal length and full HD quality, for use in airports and perimeter protection. Stabilisation is important with zoom because even slight movement can have a large effect, says the company. In Fujifilm lenses, the stabilisation is optical-based (in the lens), rather than software-based. Another stand that drew attention was Nedap, where a tiered seating area was provided for visitors to view video projected on a back wall. New laws in the Netherlands and France require that no information can go outside government buildings, thus requiring closed security systems, according to Nedap. It’s a trend likely to follow in the European Union, with similar laws potentially impacting hospitals and banking as well as government, says Nedap. This is why they are working with partner AET Europe to ensure that encrypted communications are secure between all elements of an IT-based access control system. Solutions – not just products The need to provide solutions rather than “just products” was a repeated theme. One solutions provider is MOBOTIX, which highlighted a new corporate design with fresher and more unified branding. The solutions approach includes analytics and people counting embedded for inventory optimisation and business intelligence. MOBOTIX is releasing new plug-and-play bundles to combat the perception that the company’s technology is not easy to use. There is also a 4K bundle with NAS (network attached) storage – all preconfigured; just power it up and it will run. MOBOTIX is releasing new plug-and-play bundles tocombat the perception thatthe company’s technologyis not easy to use Sony also offered solutions, including their intelligent approach to 4K, which they say overcomes traditional concerns with the higher-resolution technology. Sony also displayed “glass-to-glass” technology, streaming 4K cameras directly to a screen with no PC in between. Even with the company shifting to end-to-end solutions, their cameras are still at the core of the portfolio, including an accent on low-light and changing light conditions. Adding ROI was another hot topic for exhibitors. MOBOTIX emphasised its process monitoring capabilities, as did Geutebrück. VIVOTEK highlighted combining a people-counting solution with other retail data for business intelligence. Contrary to the focus on solutions was LTV Europe, a video company that keeps the attention on products. LTV emphasises personal service and a fresh approach rather than competing with bigger providers. Focus on storage and automation The themes my colleagues heard at Security Essen were not unlike those we heard recently at ASIS and earlier this year at IFSEC and even ISC West. More companies are looking to expand into non-traditional applications beyond security, such as asset tracking and logistics/delivery. Another example: Sony suggested using video to monitor rivers and lakes water levels for flood warnings. Quantum is keeping itsattention on storage, whileaddressing the IT department’sneed for data protection Quantum is keeping its attention on storage, while addressing the IT department’s need for data protection. The new StorNext scalable storage system, which can handle 4K, integrates various tiers of storage appropriate to varying workflows and business needs. For example, retrieval can be faster for more valuable data, thus maximising value while minimising the overall cost. Allegion is rolling out products that combine electronic and mechanical locks from subsidiary SimonsVoss and the Allegion portfolios. Allegion wants to position itself as electronic access control expert. Paxton highlighted a building automation system, Paxton net10, which is aimed at small and medium enterprises (SMEs) and works on mobile credentials as well as cards. They’re looking to build this kind of technology into future products. Another company, AxxonSoft, is pushing strongly to establish its brand in the United States – something to watch in 2017. SALTO also highlighted cloud-based mobile access control: They have developed a Keys as a Service system, SALTO KS, which allows businesses to grant access remotely while viewing a video of the door. Four busy days in Germany Security Essen is an international show, but the emphasis was on German, Austrian and Swiss companies and larger companies targeting those markets. There was more of a continental Europe “flavour” compared to IFSEC’s focus on the U.K. market. Four days is a long time for a trade show – my feet are shot after two and a half days! But my colleagues agree it was time well spent, if for nothing else than getting to watch an 8-foot-tall robot dance around Hall 3.
As prominent in Belfast’s history as its cranes are on the city’s skyline, it’s hard to imagine Belfast without Harland and Wolff. Once the world’s greatest shipbuilder, Harland and Wolff today has evolved into a company that provides over 150 years of engineering excellence to the maritime, offshore, and renewable energy sectors. The Harland and Wolff facilities on Queen’s Island are now used to maintain some of the world’s largest ocean-going vessels, ranging from offshore platforms and cruise liners to offshore wind farms. The company is spread over two sites in Belfast and covers over 200 acres. Its main facility has a public-facing perimeter of no less than 1.5 kilometers. With safety as a primary consideration in the execution of projects, the company goes to great lengths to protect its investments from unwanted visitors, intruders, and vandalism. FLIR VMS solution For over 15 years, Harland and Wolff has been using FLIR’s United VMS to manage a wide variety of security cameras For over 15 years, Harland and Wolff has been using FLIR’s United Video Management System (VMS) to manage a wide variety of security cameras. As technology innovations and features were being added onto the United VMS over the years, Harland and Wolff has always remained loyal to the FLIR brand. But with the increasing development of Queen's Island as an industrial, commercial, and tourist area came a greater public presence and an increased safety and security threat. That is why in recent years Harland and Wolff has been continuously investing in the latest security camera technology from FLIR, including enterprise security cameras, PTZ cameras, intelligent thermal cameras, and mobile and wearable cameras. Optical and thermal cameras “Today, over 140 FLIR cameras on-site and along the site’s perimeter make sure that we can detect any irregularity,” said Chris Neill, security operations manager at Harland and Wolff. “Whenever one of our cameras picks up an incident – an intruder for example – an alarm is generated and sent to our security control room, who can then follow up the incident. This ensures us that our investment and that of our customers is safe and secure at all times.” Due to the high impact and risk associated to a possible incident on site, the company’s security department follows a proactive approach for possible intruders. Even in complete darkness, in perimeter areas where there is no additional lighting, thermal analytic cameras can pick up the presence of intruders, animals, or vehicles automatically based on their heat signatures. Intruder detection While thermal camera footage does not allow actual identification of intruders, it can still be used as evidence for insurance companies or law enforcers, especially when an intrusion pattern can be seen over different cameras. United VMS is FLIR’s enterprise-level software solution for video surveillance operations United VMS is FLIR’s enterprise-level software solution for video surveillance operations. The software is currently used at Harland and Wolff by four control room operators and eight managers, all of which have dedicated user rights. One of the strengths of the United VMS system is that it can connect with nearly any security camera on the market and that video streams and detection alerts can be presented on any screen, be it on a video wall, a PC, or a smartphone. United VMS But Harland and Wolff has been using United VMS for far more applications. “We also use the United VMS platform to monitor alarms coming from fire sensors on oil rigs, for example,” said Neill. “Another example is the detection of failed pumps on one of our drydocks. This information also comes in on United VMS, where we generate alarms and notify key staff in real time.” Harland and Wolff has indeed managed to make use of United VMS's flexibility and deploy it for much more than security applications only. "We are not in a static business," said Neill. "At Harland and Wolff, we are always taking on new challenges and solving new problems; FLIR’s United VMS platform helps us do that.” TruWITNESS mobile sensor technology Harland and Wolff will also make use of TruWITNESS, the latest mobile and wearable sensor technology from FLIR. TruWITNESS will allow guards on patrol to stream video directly to the control room in real time and from anywhere on the Harland and Wolff sites. Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport" Guards will be able to bookmark events so that incidents or irregularities can be reported and can be followed up more efficiently. In case of incidents, camera footage from the TruWITNESS wearable devices can be used as evidence. In addition, control room operators will be able to track members of staff via the United VMS and display their location on a map. Security technology advancements “Our yellow gantry cranes have become a national icon,” said Neill. “Unfortunately, this also means that they are an attractive target for political messages or, as in the past, terrorism. As a port facility, Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport. But in reality, we always exceed these requirements. We owe this to our continuous investments in security technology, which we also consider as a commitment to our customers.” Maybe this is what connects Harland and Wolff with FLIR. “As committed as we are to our customers, we expect the same from our suppliers as well,” said Neill. “As someone with a technical background, I have always been convinced of the quality of FLIR security products. But there will always be a time when you need to rely on technical support, and that’s where FLIR really makes a difference.”
In a highly visible, and competitive sport like Formula One racing, it’s not hard to understand why an organisation like Aston Martin Red Bull Racing attracts people who want access to their factory, and all the secrets contained within. Intrusion from unwanted visitors or vandalism is something that the people at Milton Keynes headquarters, in Buckinghamshire, England, want to avoid at all cost. Asset protection “Our Milton Keynes facility contains valuable technology and intellectual property,” says Mark Hazelton, Chief Security Officer. “At the same time, we are located alongside a public road, close to a residential area with high footfall. That is why it is critical for us to have high-performing security processes and systems in place, so we can effectively protect our assets as well as the people who work here.” The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing. Crafting the next Formula One challenger is done on the engineering site with a variety of buildings, including many office spaces, an R&D facility, manufacturing and storage areas. The design, testing, building and assembling of thousands of parts required to construct each race car all happen in house. About 750 people are employed at Milton Keynes and some parts of the factory are operated on a 24/7 basis. Site and facility security “As our site has grown, our previous CCTV system was no longer sufficient to provide adequate security monitoring,” says Caroline Tierney, Infrastructure Project Manager at Aston Martin Red Bull Racing. “Our CCTV installation was no longer state of the art and we wanted to ensure that we made best advantage of the improving technology available. We were also looking to make it easier to retrieve information from the system.” Aston Martin Red Bull Racing started to look out for an updated CCTV system, investigated different options and ultimately selected FLIR Systems as their technology provider through a local IP security system integrator. Quasar HD and 4K cameras The facility is now equipped with some 120 cameras, both visual and thermal, that cover the entire area 24/7. Cameras on site include FLIR’s visual Quasar HD and Quasar 4K, the latter presenting four times the resolution of the HD camera and, therefore, able to cover larger areas with less cameras. The facility also makes use of the Quasar Hemispheric Mini-Dome, which provides 360° immersive viewing, and of the thermal FLIR FC-Series ID camera, which includes onboard video analytics capable of classifying human or vehicular intrusions. The entire camera network is managed by FLIR’s Latitude Network Video Management System (VMS). FLIR thermal cameras The image quality that we get from the new range of visual FLIR cameras is truly impressive" “The image quality that we get from the new range of visual FLIR cameras is truly impressive,” says Zoe Chilton, Head of Technical Partnerships at Aston Martin Red Bull Racing. “It’s amazing what kind of image quality can come out of such a compact camera unit.” The FLIR thermal cameras have powerful video analytics on board, which makes them extremely useful as intrusion protection devices at several strategic locations across the Milton Keynes site. With the FC-Series ID camera, you can set custom trip lines and regions of interest that will trigger alarms for human or vehicular intruders, even at night or in poor weather conditions. Upon the detection of an intruder, an alert is sent over to security personnel via email. FLIR Latitude VMS The FLIR Latitude video management system is the backbone of the system, allowing Aston Martin Red Bull Racing personnel to easily view, playback, search and export video from a scalable number of cameras. “In the past, when we wanted to investigate a particular incident in more detail, it used to take a long time to actually retrieve the information we needed from our video recordings, but with the new FLIR Latitude VMS, this is much more straightforward and we save a lot of time,” says Tierney Comprehensive camera network The cameras used in the network around the Milton Keynes site are relatively small in size. And there’s a very good reason for that, according to Chilton. “Of course, it’s important to have the best image quality possible, but on the other hand, we don’t want our cameras to be too large and imposing either.” The Milton Keynes headquarters receives visitors, customers and partners every day. For Aston Martin Red Bull Racing, it’s important that everybody feels welcome: “While we need our site to be secure, and the cameras are of course important, we don’t want them to be the first thing visitors see when they arrive to visit us, " said Chilton. "I think that the FLIR cameras strike that difficult balance between security and subtlety really well.” The cameras can also be used to check whether visitors are using the parking lot correctly FLIR security monitoring system Other than the security aspect, there are other practical benefits of having a comprehensive camera network, as well. The cameras can also be used to check whether visitors are using the parking lot correctly, to track contractors around the site, and just for general site management purposes. The selection of the FLIR security monitoring system fits into a long-standing technology partnership between FLIR and the Aston Martin Red Bull Racing team. Since 2014, the team has been integrating FLIR cameras for a wide variety of uses around the factory and track, from electrical maintenance, test rigs and security on site, to tyre temperature assessments in the garage. High product quality The high product quality and innovative approach FLIR takes to developing new solutions for the challenges of Formula 1 makes a great fit with Aston Martin Red Bull Racing’s desire to push the boundaries of available technology for developing their cars.
EchoGuard receives FCC Equipment Authorisation allowing widespread deployment of the radar for security, surveillance, and airspace management applications. EchoGuard radar Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces that it has received approval from the FCC for widespread deployment of its EchoGuard radar for radiolocation and radionavigation in the United States. FCC Equipment Authorisation allows the radar to be used throughout the US for ground, airspace surveillance The FCC Equipment Authorisation allows the radar to be used throughout the United States for ground and airspace surveillance applications that detect and track potential security threats with high accuracy and for ground-based airspace management applications that ensure safe navigation of commercial drone missions. Electronically Scanning Array radar Echodyne's innovative metamaterials technology and powerful software combine to create an electronically scanning array (ESA) radar in a compact, solid-state format at commercial price points for the very first time. The radar has been demonstrating award-winning performance for government, law enforcement, security, and UAS / UTM customers for some time via experimental licenses. "We are excited that EchoGuard has received this authorisation allowing its widespread adoption in the US," said Eben Frankenberg, CEO of Echodyne. "With the growing number of troubling drone incursions at airports, stadiums, and other facilities, there is tremendous demand for high-performance radar sensors. Tackling drone threats Eben adds, "Our innovative radar technology and software greatly increases the ability for security systems to accurately detect and track drone threats, as well as improves ground tracking of people, vehicles, and vessels. Our radar outperforms every other radar in its class, is priced for commercial markets, and has proven to be the best mid-range surveillance radar in the market." Features of the EchoGuard high-performance radar include: True electronic beam-steering with market-leading C-SWaP attributes; Long-range detection with high reliability and accurate tracking of multiple, concurrent air and ground targets; and Easy integration into sensor fusion and security systems for unmatched 3D situational awareness.
The sensor solutions provider HENSOLDT is equipping the second batch of the German Navy’s K130 corvettes with its TRS-4D Rotator naval radar and its MSSR 2000 I friend-or-foe identification system (IFF). Only six months after the order was placed, the company has now successfully passed the factory acceptance test by the German procurement authority BAAINBw for the second system. “With the TRS-4D, the corvettes are getting an extremely powerful radar system,” said HENSOLDT’s CEO Thomas Müller. “Since we have started to produce our radars in series a short time ago, we have been able to reduce the time required for delivery to our customers considerably.” Order for seven TRS-4D radars On board the new F125 frigate, the TRS-4D is used in a configuration comprising four fixed planar arraysHENSOLDT has orders for seven radars which are intended for five ships and two land-based systems and are to be delivered by 2022. The company had previously equipped the first K130 batch with its proven TRS-3D radar. For the second batch, the TRS-4D has now been ordered to be supplied in a version comprising a mechanically rotating antenna (TRS-4D Rotator), which is also under contract for the U.S. Navy’s littoral combat ship (LCS). On board the new F125 frigate, the TRS-4D is used in a configuration comprising four fixed planar arrays. This radar system is part of a family of products which also includes ground-based air defence radar, TRML-4D. It thus benefits from shorter production cycles, continuous product improvements as well as advantages in stock levels of spare parts and training. Quick detection and tracking of targets The TRS-4D Rotator has been designed to be used for anti-aircraft and anti-surface operations. Its rotating antenna combines mechanical and electronic azimuth scanning, which allows targets to be detected and tracked very quickly. Thanks to its higher sensitivity, the AESA radar allows more precise detection, especially of small and manoeuvering objects, as well as faster confirmation of the target, which means that the ship crew has more time to respond to threats. The system includes an MSSR 2000 I secondary radar for friend-or-foe identification (IFF) The radar can be specifically programmed according to the customer’s needs, and its characteristics can be changed via the software to match new requirements that arise during its useful life. The system also includes an MSSR 2000 I secondary radar for friend-or-foe identification (IFF), which complies with all IFF standards, even the latest ‘Mode S / Mode 5’. This is all the more important as all NATO troops and their allies are currently in the process of converting their IFF systems to Mode 5. The Mode 5 capability enables the troops to take part in joint and combined operations with NATO and other allied forces.
Merthyr County Council were experiencing high levels of break-ins and thefts in its three household recycling sites resulting in high repair and replacement costs. The Council employed a security company to man guard three sites which cost over £150,000 per annum however, the break-ins were still occurring. The Gallagher Channel Partner designed a solution to detect, deter and protect. They installed a Gallagher Monitored Pulse Fence to detect intruders climbing or breaking through the fence, deter by delivering a short, sharp but safe shock, while protecting the Council's assets and on-going operation. Cost-effective installation The system was retrofitted to an existing fence structure ensuring an easy, efficient and cost-effective installation. Since the fence was installed break-ins have ceased and the requirement for man guarding is no longer needed. Electrical Statutory Compliance Inspector at Merthyr County Council, Les Lewis, said: “I was thrilled with the completed project. Not only is it aesthetically pleasing, but it has met all of our security requirements. It has also helped make huge cost savings as we no longer require manned security out of hours or need to repair damaged fences and replace expensive assets. I believe the Gallagher system will pay for itself within 18 months.”
Based in Muscat, Oman, the Oman Electricity Transmission Company (OETC) owns and operates the main electricity transmission network, transferring electricity from generating stations to distribution load centres in all governorates of the Sultanate of Oman. Asset and public protection Protecting the company’s assets while ensuring the safety of the public is central to ensuring business continuity for OETC and reliable distribution of electricity to over 4.6 million people. With 90 grid stations in remote locations, identifying and responding to unauthorised intrusions in a timely way was challenging. OETC required a robust perimeter security system to deter intruders, manage risk, and protect the public “It can take up to an hour to reach some of our sites after an alarm is triggered. By then it’s too late, the intruder is gone,” says ESC Gulf Project Lead. Members of the public were also entering the sites to have picnics, unwittingly risking injury or even death. After a fatality when someone interfered with an electricity transformer, it was clear the OETC required a robust perimeter security system to deter intruders, manage risk, and protect the public from harm. Monitored pulse fencing solution The Gallagher solution OETC work in partnership with an established local consultant ESC Gulf who provide a wide range of services including design, tender evaluation and project implementation support. During tender submission stages, security contractors Majees Technical Services and Mustafa Sultan Enterprises, proposed a Gallagher Security monitored pulse fencing solution to protect OETC’s remote sites. Upon contract award the certified contractors installed the system, while Gallagher provided support and oversight of the installation and commissioning works. Using Gallagher’s effective and reliable fencing solution, perimeter breach attempts are deterred by an energised pulse, delivering a short but safe shock. The monitored wires detect unauthorised entry or exit and trigger instant alerts. Gallagher Z20 Disturbance Sensor Gallagher Z20 Disturbance Sensor heightens perimeter security by ensuring continuous monitoring and motion detection The Gallagher Z20 Disturbance Sensor in use at the gate heightens perimeter security by ensuring continuous monitoring and detection of vibration or movement of the gate when it is closed, and the system is in an armed state. Gallagher delivers robust perimeter security systems suited to the most rigorous requirements of high security sites. The ability of Gallagher technology to easily integrate with CCTV cameras, automated lighting and a remote monitoring system, further ensures a safe and secure environment. A world class solution, Gallagher perimeter products are designed to comply with international safety and electromagnetic compatibility standards. These standards set out the safety requirements for the design, installation, and operation of pulse fencing and associated equipment. Gallagher perimeter control solutions Saving money while keeping people safe Gallagher perimeter control solutions are now under construction or completed at 70 of the remote grid station sites – including over 25 kilometres of monitored pulse fencing. Unauthorised entry to these sites has been reduced to zero. OETC now has peace of mind that assets at its remote sites are protected, while being secure from unauthorised access – ultimately keeping people safe from harm. Gallagher’s accurate and responsive security monitoring systems have also resulted in significant cost savings and business efficiencies for OETC. “OETC were employing up to six guards on each grid station at a significant cost,” says ESC Gulf Project Lead. “With a fully monitored solution, the number of guards has been reduced and they have been redeployed on other tasks”. Gallagher security solutions are successfully supporting OETC’s mission to transmit and dispatch electricity safely, reliably, securely and economically. ESC’s Gulf Project Lead concludes “Gallagher provides a great amount of support to all stakeholders and both OETC and ESC Gulf are very pleased with the outcome of this project.”
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?