Antaira Technologies, globally renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LNX-C800 and LNX-C800G Series. LNX-C800 and LNX-C800G series Antaira Technologies’ LNX-C800 and LNX-C800G series are 8- port industrial compact unmanaged Ethernet switches embedded with 8*10/100Tx RJ45 ports (8*10...
Coronavirus (Covid19) pandemic has hit the world unprepared for its consequences on the healthcare system and economic life. As a result, the number one priority for countries and states is to flatten the infection curve and provide them with time. Essential policies adopted to achieve this are directed at changing and controlling human daily behaviour. AI-based solutions viisights has Artificial Intelligence-based solutions to help authorities enforce those policies, help prevent the virus sp...
Bodies within the Security and Fire sector, namely the British Security Industry Association (BSIA), Fire and Security Association (FSA), National Security Inspectorate (NSI), and the Security Systems and Alarms Inspection Board (SSAIB) are re-iterating calls for employees of all security and fire safety companies approved by UKAS-accredited specialist certification bodies to be designated as ‘Key Workers’, to ensure environments not currently designated as ‘critical’ con...
Arcules, innovators in integrated video and access control cloud services, announces the appointment of Bruce Nisbet as Senior Director of Sales. In this role, Nisbet will help guide the regional sales teams and develop strategic initiatives for expanding the reach of the company’s cloud-based services in key markets. With more than 30 years of security, video surveillance, sales and management experience, Nisbet has executed successful sales strategies and business development initiative...
BCD International announces the launch of a new online tool that allows customers to track the status of their order in real-time. The online tool, OTFD Live is easy-to-use and does not require customers to create an account or provide login information. OTFD Live tracking tool All that customers’ need is their company’s unique purchase order number. Once the customers enter that number and click the “track order” button, they will instantly get an update on their order...
Safeture AB announces that several new customers have signed up for its cloud-based software to help manage safety and reduce risk for their employees. The increasing awareness of corporate duty-of-care for employees continues to drive demand for Safeture’s software globally. The new direct customers who have obtained the company’s platform include the Swedish firm SwedFund, electric racing championship Formula E and U.K. giant Imperial Tobacco, which has some 32,700 employees. Safe...
The Security Industry Association (SIA) has selected Efrain Pardo as the spring 2020 recipient of the Denis R. Hebert Identity Management Scholarship, a program presented in partnership with the Center for Identity at the University of Texas at Austin offering $5,000 scholarships for SIA members to help further their education in the field of identity management. This scholarship program – named after Hebert, President of Feenics Inc. and a past member of SIA’s Board of Directors who served as Chair from 2016 to 2018 – is designed to support the professional development goals of individual SIA members and student members who specialise in identity management – a field involving the systematic control of access, authenticating users, securing assets and protecting privacy. Identity management encompasses many aspects of risk management, public policy, fraud prevention, privacy, data analysis, risk and governance, information technology and security. Identity management expertise Pardo – a SIA student member who has a proven track record of experience in network and information security – serves as a flight operations implementation specialist at Horizon Air. He is pursuing a Bachelor of Applied Science degree in networking and cybersecurity at Green River College and will use the scholarship funds to further his network and cyber security education. “SIA congratulates Efrain Pardo for being selected as the spring 2020 Denis R. Hebert Identity Management Scholarship winner and for his impressive accomplishments and dedication to helping to advance this foundational security space,” said SIA CEO Don Erickson. “SIA is proud to help cultivate members’ identity management education and career development through this unique scholarship program; it is critical that we continue to build on our identity management expertise to better address identity threats, protect privacy, secure assets and foster innovation.” Center for Identity Prior to his time at Horizon Air, Pardo held IT, research, sales, analyst and customer service roles with Prime Strategy, the Kline Group, Venues & Events – Global Travel, IDC and IBM. He holds a Master’s Degree in sales and IT from the United Kingdom’s University of Lincoln and a Bachelor’s Degree in Industrial Engineering and Information Systems from Monterrey Tech and is currently working toward certifications with the PM Institute and CompTIA. Applications are now open for the Fall 2020 Denis R. Hebert Identity Management ScholarshipThe Center for Identity at the University of Texas at Austin works closely with its public-private partners, including corporations, state and federal government agencies and law enforcement, to deliver innovations for consumers, businesses and government that help them to better protect people’s identities. Access and identity management As a critical component of its mission, the center conducts research to better understand how emerging technology such as biometrics affects consumers and organisations alike and how standards and expectations of privacy are evolving. Applications are now open for the Fall 2020 Denis R. Hebert Identity Management Scholarship. Each applicant must be either a SIA student member or a full-time employee of a SIA member company and have 1-5 years of professional experience in the security industry or a verified plan of study in the field of access and identity management. Scholarship funds must be used toward post-secondary education programs, including training courses, accredited college courses, certifications or other credentialing programs related to identity management.
ACI Worldwide, a globally renowned provider of real-time electronic payment and banking solutions, has announced the launch of its new ‘Incremental Learning’ technology – an innovative industry-first approach to machine learning that will enhance fraud protection for merchants and financial institutions and their customers. ‘Incremental Learning’ technology ACI has filed a patent application for its ‘Incremental Learning’ technology, which is being implemented in machine learning models within ACI’s fraud prevention solutions, including Proactive Risk Manager, which delivers enterprise fraud management capabilities for financial institutions and intermediaries; and ACI ReD Shield, which underpins ACI’s secure eCommerce and merchant fraud management capabilities. ACI’s ‘Incremental Learning’ technology represents a significant advancement over current machine learning models ACI’s ‘Incremental Learning’ technology represents a significant advancement over current machine learning models that need to be retrained as fraud patterns change. Incremental Learning models are able ‘to think for themselves’ and make small adjustments on an ongoing basis to ensure they remain relevant, even as fraudsters and genuine consumers change their behaviors. 13-month tests carried out on data from three major retail customers revealed that, while traditionally trained models began to degrade after three months, ACI’s incremental models maintained their performance over the full period of the test. Proactive Risk Manager and ACI ReD Shield “Traditional machine learning models in many cases are not sufficient to stop fraudsters in their tracks. As fraudsters become more sophisticated, we need to continuously advance our models to beat them at their own game,” said Jimmy Hennessy, Director of Data Science, ACI Worldwide. “Our global data science team has created a game-changing piece of machine learning technology that can be seamlessly integrated and future-proofs the precision and operational efficiency for over 5,000 institutions protected by our solutions today.” ACI has more than 20 years of experience in designing and implementing machine learning models, which have long been a fundamental element within Proactive Risk Manager and ACI ReD Shield. ACI’s machine learning models will quickly and efficiently analyse all available features and data points, which will then be turned into intelligence that can build customer profiles, spot fraud signals and combat emerging fraud threats. Any anomalies are flagged in real time and immediate action is taken. Fraud monitoring and prevention solutions “We are the first vendor globally to roll out the new Incremental Learning technology across the merchants, payments and financial services sectors,” commented Fabian Gloerfeld, Head of Payments Intelligence, ACI Worldwide. “The new capability is a realisation of ACI’s multi-year investments and will further enhance our sophisticated fraud monitoring and prevention solutions to help customers to dramatically reduce payments fraud.”
The Security Industry Association (SIA) has named three leading experts from industry and government to join the list of high-profile keynote speakers and other security luminaries appearing at the 2020 ISC West as special guest speakers for key SIA events at the United States’ largest converged security trade show. ISC West 2020 will take place March 17-20 at the Sands Expo in Las Vegas, Nevada. SIA’s The Advance On March 17 at The Advance, SIA’s annual membership gathering, attendees will hear featured remarks from William Wilkins, executive director of global security operations at Valero Energy Corporation. Wilkins’ presentation – “Lifelong Learning of a Global Security Officer: The One Lesson That Took Me the Longest to Learn” – will highlight the chief security officer framework and key lessons security professionals can learn from. In addition to Wilkins’ remarks, attendees at The Advance will review official association business, recognise outstanding volunteer achievements, exchange market intelligence and enjoy complimentary lunch and networking. SIA InteropFest & Cocktail Reception on March 18 will feature insights from special guest speaker Daryle Hernandez SIA InteropFest The SIA InteropFest & Cocktail Reception on March 18 will feature insights from special guest speaker Daryle Hernandez, chief of the Interagency Security Committee (ISC) in the U.S. Department of Homeland Security’s Infrastructure Security Division. SIA InteropFest, which showcases interoperability among physical security solutions leveraging SIA’s Open Supervised Device Protocol (OSDP) technology standard, will also include technology interoperability demonstrations, examples of how integrators and security professionals implement SIA OSDP and free cocktails, hors d’oeuvres and networking. SIA Women in Security Forum Breakfast On March 20 at the SIA Women in Security Forum Breakfast, attendees will hear a presentation from Jaime Paris Boisvert, General Manager for Siemens Smart Infrastructure based in Boston, Massachusetts, USA. Attendees will also enjoy complimentary breakfast and top-tier networking with women in the industry and learn about SIA’s Women in Security Forum, an initiative to engage security professionals in promoting, recruiting and cultivating women’s leadership to promote a more inclusive and diversified industry. In addition to hearing from these experts at SIA’s events, ISC West attendees can hear top-quality keynote presentations from Charles Burns, Head of Security – New Mobility at Uber; Michael MacKenzie, General Manager of Amazon IoT connectivity and control at Amazon Web Services (AWS); and Brigadier General (retired) Christopher Fowler, Former Deputy Chief of Operations for the City of Seattle Police Department. Securing a connected future with IoT On Wednesday, March 18, in the presentation Scaling Enterprise Risk Management at the Speed of Global Transportation, Burns will explain how Uber navigates a challenging landscape by using technology to enable their business, secure company assets and ensure the safety of riders and drivers globally. 'The Threat from Within’ will address the threat of workplace violence involving current or former employees On Thursday, March 19, MacKenzie’s morning keynote address – On the Edge of Transformation: Securing a Connected Future With IoT – will explain how AWS IoT enables organisations to protect the evolving security-focused Internet of Things ecosystem, built on the rapidly progressing marketplace underscored by the convergence of our digital and physical worlds, in order to secure the connected world of tomorrow. ‘The Threat from Within’ Later that day, Fowler’s presentation – ‘The Threat from Within’ – will address the threat of workplace violence involving current or former employees, what we can do before incidents take place to help prevent them and how to optimise processes to address an event if it does happen. The ISC West keynote series is free and open to all attendees of the show. “Each year at ISC West, thousands of security professionals gather to explore the latest innovations in security technology, unlock top-quality networking and education and get actionable insights to help their businesses succeed,” said Don Erickson, SIA CEO. 2020 SIA Education@ISC conference program Don adds, “SIA is thrilled to welcome Jaime Paris Boisvert, Daryle Hernandez and William Wilkins as the featured speakers for SIA’s key 2020 events at ISC West. These luminaries will be a valuable addition to the robust lineup of security industry leaders featured in the ISC West keynote presentations and the SIA Education@ISC conference program, and we look forward to their high-impact, informative presentations to SIA members and attendees.” ISC West and SIA are partnering to present the 2020 SIA Education@ISC conference program ISC West and SIA are partnering to present the 2020 SIA Education@ISC conference program, the top industry resource for vendor-agnostic security and network training. The 2020 SIA Education@ISC conference program includes nearly 100 accredited sessions covering hot topics in connected security, unmanned systems, smart cities, loss prevention and supply chain and more. Countering global security threats The program is designed to provide the necessary knowledge security professionals require to prevent threats and make a real-world impact in an increasingly converged security landscape. ISC West attendees can purchase single-session passes or one-, two- or three-day packages for the SIA Education@ISC program to unlock critical information on the newest technologies in security. Register now to save $100 off the onsite conference registration rates. Additional SIA events at ISC West include the Market Leaders Reception – a cocktail and networking reception and the premier kickoff to the trade show on Tuesday, March 17 – and the SIA RISE Happy Hour at Topgolf Las Vegas, a lively outing for young security professionals and those new to the industry on Thursday, March 19. SIA will also unveil the winners of the 2020 SIA New Product Showcase Awards – the flagship awards program at ISC West honoring innovative security products, services and solutions – on Wednesday, March 18.
All Round Security has rolled out a high tech mobile workforce system connecting field service engineers in real-time to the office as part of an end-to-end management system. With clients including Heathrow Airport, Arcadia, Mitie and Cloud FM, All Round Security install and maintain security roller shutters, doors and barriers across the UK. Since going live, the cloud-based system from Leeds-based BigChange has boosted productivity and customer service. All Round Security had previously implemented a number of different systems but was frustrated with having to manage different systems and began the search for an all-in-one solution. With an expanding customer base and over 60,000 jobs completed in the last year, BigChange with their 5-in-1 solution and JobWatch mobile app was quickly seen as the ideal partnership. Offering real-time automatic updates Our challenge is to manage growth whilst maintaining our high quality service" “We are always striving to provide our clients with the best possible service and as our workforce grows we required a system that can tackle our needs. With JobWatch, powered by BigChange, we have the system that we have longed for; offering real-time automatic updates, engineer tracking, 24/7 support and general ease of use,” says Charlie Keegan, Contracts Coordinator, All Round Security. Formed in 1986 with headquarters in Newton-Le-Willows near Warrington, All Round Security is planning to expand organically within the next 5 years. “Our challenge is to manage growth whilst maintaining our high quality service. With BigChange we have something that not only dramatically improves our business efficiency, service and productivity but also a solution that will allow us to freely expand the business thanks to the automation and ease of access via mobiles and the cloud,” says Lee Parker, Director, All Round Security. Completely integrated management of assets With the flexibility of JobWatch - the BigChange mobile app - All Round sees opportunities to diversify. With simple creation of new job sheets and workflows, services that are currently sub-contracted, such as electricals, or new services requested by customers, could be easily added. All Round Security contractors already use the same JobWatch app. Parker believes the facilities management sector will see a change in the future “For sure we’ll continue rely on partners as we expand and through JobWatch we have a platform that is seamless as far as the customer is concerned,” Parker explains. Parker believes the facilities management sector will see a change in the future with data-driven and completely integrated management of assets; a more holistic approach where Capex and Opex budgets are much more closely aligned. Improved engineer productivity “With our involvement in security matters there is a strong element of trust with our clients and we foresee our role expanding as an adviser on the condition of assets and provider of an all-encompassing asset management service,” says Parker. “The beauty of BigChange is that is can be easily configured to do just about anything so we are not restricted, IT wise, in what we can offer.” All Round Security provides a 24/7 call out service with a maximum 2 hour response time" “All Round Security provides a 24/7 call out service with a maximum 2 hour response time for critical sites such as hospitals and airports. With 50-strong fleet and field service engineers located countrywide, incoming service requests are logged into the BigChange schedular for optimised job allocation, route planning and scheduling. For a mobile service operation like ours, the killer of productivity is the travel time to jobs. With improved scheduling, routing and resource allocation using BigChange scheduler software we’ve already improved engineer productivity,” Parker adds. Correct risk assessment procedures The engineers receive jobs on their rugged Samsung tablets and with vans equipped with BigChange GPS telematics, live tracking and navigation is provided. The system generates an estimated time of arrival at site so customers can be auto-alerted via email or text. On arrival the JobWatch app guides the engineer through the correct risk assessment procedures using workflows before proceeding with the job. Using the tablet, the engineer completes their Job Card and gets an on-screen customer sign off. Time and location stamped photographs are also taken as part of a complete audit of the job. “Having this comprehensive and real time information at out fingertips 24/7 has really revolutionised our customer service and work output,” says Keegan. “Not only can we dynamically allocate engineers to do more jobs but onsite we can be more productive through live interaction to resolve issues; the office and customer are much better informed.”
Namib Property Patrols Ltd, the Oxfordshire-based security and protection company, is using employee scheduling and mobile workforce management software SmartTask to streamline operational processes, saving both time and money. The company is using the software for proof of attendance and guard monitoring across its mobile patrol and alarm response operations, which has helped reduce in administration by more than 15-hours a month, while enhancing service delivery to customers. Credible and transparent security services “We strive for quality through technology, so we needed a software solution that would enable us to serve our customers better; operate on tight margins in order to give value for money; and continue to innovate,” explains Joel Shikongo, Operations Director at Namib Property Patrols Ltd. “SmartTask is enabling us to deliver high-quality, credible and transparent security services in the most efficient manner possible.” The simple expandability of the software is enabling the company to take a phased roll-out" SmartTask was selected following a review of the marketplace to replace manual processes that had become time-consuming and no longer met the reporting needs of the business. The simple expandability of the software is enabling the company to take a phased roll-out with plans to adopt additional functionality, such as SmartForms for electronic incident and logbook reporting, in the next 12 months. Alarm response callouts Namib Property Patrols uses SmartTask at around 40 commercial and industrial sites within Oxfordshire to record arrival and departure times for mobile patrols and alarm response callouts. For scheduled patrols, active tags are used at critical and vulnerable points around the customer’s premises, which are scanned by an asset protection officer using a SmartTask-enabled smartphone. These tags can also contain unique messages to communicate specific tasks and patrol requirements. Namib Property Patrols has full visibility of completed work and officer welfare from its head office in Bicester, with the ability to create electronic operational reports at a push of a button. Clients can also log in to an online customer portal to view their individual security activity in real-time and generate bespoke performance reports. Reducing printing costs Our software is already delivering proven results for a wide range of businesses" As a result, the company has been able to dramatically reduce the time needed to compile reports, saving more than 15-hours each month, as well as reducing printing costs by around 50 per cent. “SmartTask is an ideal fit for our brand and values, underpinning our commitment to operational excellence and client satisfaction. The software is not only helping us to streamline our processes and operate more effectively in an ever-evolving world, but also retain and win business by always putting the customer first. SmartTask’s team is always on hand to provide first-rate support and is constantly looking at new ways to improve our service delivery, so they are a highly-valued technology partner,” adds Shikongo. Mobile workforce management solution Paul Ridden, CEO of SmartTask commented: “We have created an employee scheduling and mobile workforce management solution that is highly configurable and feature rich, so is a perfect fit for SME, mid-sized and top 30 security companies alike. Our software is already delivering proven results for a wide range of businesses by helping them to better plan, manage, deliver and report on their security services.”
Drones are commonly known for flying in the sky, but a new breed is rolling around on the ground and swimming in the ocean. Now, in an alliance straight out of science fiction, two CT-based drone companies are joining forces to take on the task of protecting our planet using both airborne and amphibious drones by automating operations in security, environmental and even military fronts, globally. Harford based Aquiline Drones (AD), a premiere Cloud and drone solutions company, will be powering GuardBot's spherical and amphibious robotic vehicles via the AD Cloud (or ADC). Like Amazon's AWS, ADC is quickly becoming the industry Gold Standard for all Unmanned Vehicle (UV) operations, taking full advantage of its capacity, modularity and truly salient features for autonomous assignments, operations and quests. Advanced AI for complicated missions “Our new alliance with Aquiline Drones now gives us the ability to program our bots with advanced AI for complicated missions in surveillance, security and detection. And with AD’s focus on US supply chain manufacturing, this is truly pioneering a new direction for drone technology in the US,” noted Peter Muhlrad, President of GuardBot. "GuardBot was initially conceived for a planetary mission on Mars. As such, our robots can traverse all terrains, including paved roads, dirt paths, dunes, snowy fields, sloped mountains, or even water surfaces. GuardBot spherical robots can even navigate upstream,” said Muhlrad. “And with the right sensor, camera and/or acoustic package, the use cases are endless,” Muhlrad notes. “Our new collaboration with Aquiline Drones couldn’t be timelier! The first batch of GuardBots will be manufactured at AD’s downtown Hartford facility starting in May,” added Muhlrad. Interchangeable sensors Each GuardBot is equipped with pods on its right and left sides that contains interchangeable sensors GuardBot’s circular drones range from 6.5 inches to 7 feet in diameter and move using a patented drive-mechanism that allows it to easily provide forward and backward motion as well as make 360-degree turns. They can operate continuously for up to 25 hours on one charge and reach speeds of up to 12 mph on land and 3 mph in water. Each GuardBot is equipped with pods on its right and left sides that contains interchangeable sensors, such as video cameras, thermal, infrared, microphones GPS and audio for continuous content gathering, transmission of data and constant communication with command control. AI and IoT infrastructure management “In the coming months, ADC will undergo rigorous testing, hosting and management trials with GuardBot’s proprietary software application. ADC’s highly modular AI architecture is suitable for crucial customisation of solutions typically not available in the open marketplace. And, as an unmanned vehicle cloud, no other cloud platform provides the same level of robustness and salient features that enable complex mission planning scenarios, autonomous flight and ground operations powered by AI and IoT infrastructure management,” said Barry Alexander, Founder and CEO of Aquiline Drones and AD Cloud Services. “We eagerly anticipate integrating GuardBot’s entire network of all-terrain drones into our cloud to provide enterprise asset management (EAM) services, including data gathering, analytics, modeling and storage capabilities,” Alexander added. "Additionally, the timing of this hi-tech endeavor could not be more opportune - not just for Connecticut, which is quickly becoming the drone capital, but for our entire nation!" Advocates workforce development Admittedly, drone technology is exciting, ushering in a plethora of opportunity industry wide" "Admittedly, drone technology is exciting, ushering in a plethora of opportunity industry wide. AD strongly advocates workforce development and intends on using the burgeoning AD brand to further expand the industry, thus creating opportunity for all interested,” Alexander continued. "Given the abundance of use cases in our defense department and other government agencies, AD is particularly pleased with the opportunity it delivers to our veterans,” Alexander added. “Not only is GuardBot useful technology, but it is truly thrilling,” said Alexander. "Civic unions are born out of compatibility, and business is no different. Can’t think of a better way to describe the exciting collaboration between Aquiline and GuardBot,” Alexander added. “GuardBot dovetails nicely into our business model and complements our mission of pioneering a new direction in the UAV/S industry where safety comes first,” Alexander concluded. Audio/visual sensors As GuardBot’s amphibious and land-based drones can be outfitted to carry payloads, such as audio/visual sensors, fire retardant liquids and ground penetrating radar, Muhlrad and Alexander both emphasise that the collaboration of their companies will produce a variety of new and powerful capabilities for drone systems, including: Aquatic Military Missions Forest Fire Mitigation Security Monitoring (home, construction and commercial endeavors) Beach Patrol and Harbour Security School Safety Identification and Detection of Explosive Materials Ecologic and Geologic Testing (of volcanoes, mountains and other land structures to detect and warn of natural disasters) Parking Garage/Lot Surveillance Homeland Security Amphibious Surveillance Broadcasting and Multi-Venue Live Sportscasting Monitoring Hazardous Materials Spills and Environmental damage Safety Monitoring of Dangerous Weather Conditions Detection of Hazardous Chemicals Strict safety standards Further, through cloud-based transmitters, AD’s aerial hardware will be able to deploy and communicate with GuardBot’s ground-based vehicles for a seamless unmanned system that works together in solving potential life-threatening issues like fires, theft, vandalism and violent attacks. “Being pilot-owned and boasting more than 200 years of collective experience in the aviation industry, Aquiline Drones understands and adheres to the strict safety standards of the Federal Aviation Administration,” adds Alexander. “In addition, as one of only four drone airline companies in the United States holding an FAA 135 Air Carrier Certificate, we offer future operational flexibility to facilitate approvals and exemptions on non-traditional, augmented and unique UAV operations such as the GuardBot collaboration.”
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorised parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorised personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilisers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernise legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organisations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organisations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organisation understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritised and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organisations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
Intelligent LiDAR sensor technology from OPTEX, a globally renowned sensor manufacturer, is helping to protect the Belfast Call Centre premises and employees of a Fortune 500 company. Redscan laser sensor The Redscan laser sensor, which was installed by ZEST Fire & Security, a fire and security systems specialist, was required by the company to increase security in private areas of the facility only accessible to authorised personnel. This area, however, is only separated from the rest of the office space by partition walls which leave a gap between the wall and ceiling. OPTEX LiDAR creates a ‘virtual’ detection area that cannot be seen by the naked eye and that can be easily adjusted to the site requirement using the configuration software. In this instance, the REDSCAN RLS-2020S creates a virtual wall between the top of the partition wall and the ceiling of the building, and monitors movement or objects being thrown from one side to the other. OPTEX LiDAR technology OPTEX LiDARs work by analysing the speed, size and distance of the objects detected OPTEX LiDARs work by analysing the speed, size and distance of the objects detected, meaning they track the objects within the detection area and understand the ratio size/distance of the object. This provides the ability to accurately detect a specific size of object either at a distance or close up. In the event of any movement being detected, a security alarm is raised, and alerts are immediately sent to the 24-hour on-site security team. Masaya Kida, Managing Director of OPTEX EMEA, says “OPTEX’s LiDAR technology delivers the greatest accuracy of detection. We are constantly working to improve our technology to provide the highest quality sensing solutions.” REDSCAN RLS-2020 series Masaya adds, “Thanks to the high sensitivity and high-speed detection of the Redscan LiDAR sensor, it is able to detect a thrown object as small as a USB stick. The exact point of detection can also be mapped and associated with the cameras monitoring this area.” Justin Doherty, Director at Zest Fire & Security, said, “OPTEX provided us with great support and service throughout. The client was very pleased with the speed and simplicity of the installation, and is very happy with the performance of this new solution.” REDSCAN RLS-2020 series provides 95° detection and either 20x20m or 30m radius detection range and PoE connectivity.
Protecting assets and people has always been a top priority for Kirkland’s, a global home décor retailer. With over 400 stores in 37 states, Kirkland’s is a go-to spot for a broad selection of distinctive merchandise: art, mirrors, candles, lamps, frames, accent rugs, furniture and more. When they evaluated their security solutions in 2016, they determined they needed to upgrade the analogue video surveillance systems in use at their existing locations and plan for new stores. Analogue video surveillance cameras Management wanted a camera that provided a clear picture, while minimising bandwidth usage Saraya Charlton, Kirkland’s Loss Prevention Investigator, said the analogue video surveillance cameras they had in place were acceptable, but they desired cameras with wider coverage and better resolution. The department was also frustrated with the amount of time it took to investigate incidents for loss prevention and personal injury claims. Each time they were called to investigate an incident – vandalism, theft, employee misconduct, a slip and fall, or a cut from broken merchandise – each individual store had to extract the footage from the analogue DVR at that location and send it to loss prevention at Kirkland’s headquarters. Charlton said Kirkland’s sought an IP-based solution that could be accessed remotely, that would make the loss prevention investigation process more efficient and would provide additional benefits. Management wanted a camera that provided a clear picture, while minimising bandwidth usage and had analytics capability. IP video surveillance solution Working with several systems integrators, Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient enterprise Video Management Software (VMS). The first phase of the security upgrade has included the deployment of 1,800 Hanwha Wisenet X series XNV-6011 2 megapixel HD dome cameras and Wisenet Lite vandal-resistant dome cameras at 200 Kirkland’s locations, as well as the distribution centre and the e-commerce building. As new stores are built by this growing retailer, they will also include the Hanwha-Salient security solution. They expect to have a full migration to IP at all locations by 2021. Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient enterprise VMS Perfect fit for the retail environment The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less Each Kirkland’s location is outfitted with approximately eight cameras that are positioned to capture the entrance, the sales floor and the back of house operations. Charlton said Hanwha’s cameras provide the most comprehensive view of the store possible. “The wide-angle capability – as well as the quality of the camera – is really what sold us on Hanwha,” said Charlton. “We are getting the best views possible and they are allowing us to see the entire sales floor which is exactly what we wanted and needed.” Hanwha’s Wisenet X series of cameras is a perfect fit for the retail environment. The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less. Pulling recorded video Charlton said the Hanwha cameras are particularly useful at store entrances because, thanks to the WDR feature, video images are not affected by the bright sunlight that often shines through the windows and they can still see faces clearly. And because many of Hanwha’s cameras offer license free analytics, Kirkland’s will begin exploring that capability in the future to gain information on people counting, heat mapping and dwell time. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot The Hanwha-Salient solution has improved Kirkland’s loss prevention investigation efficiency since the team is able to pull recorded video from any camera via the Salient VMS rather than wait for information to be extracted from an analogue DVR. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot and resolve any camera issues remotely first rather than unnecessarily sending out a service technician. Video surveillance and security bandwidth In addition to offering quality images, improved field of view and more efficient operations, the Hanwha solution has also helped Kirkland’s conserve valuable bandwidth with Hanwha WiseStream II compression technology, said Charlton. WiseStream II dynamically controls encoding, balancing quality and compression according to movement of the image. Combined with H.265 compression, bandwidth efficiency can be improved by up to 75 percent compared to current H.264 technology. “We share our video surveillance and security bandwidth with our Point of Sale system and we don’t ever want to take away from the bandwidth of POS transactions or impact the speed at which they go through,” said Charlton. “Hanwha’s Wisestream compression technology fits our business model and along with Salient helps preserve and efficiently manage bandwidth. It’s really helpful to have a camera that’s smart enough to be able to tweak and regulate itself.”
Use of iTrak solution by casino operators in both Macau and Las Vegas for reporting, security and loss prevention expands Omnigo’s global footprint. Omnigo’s security system “One of the major benefits of penetrating a market like Macau with Omnigo’s security system is that casinos can draw from a shared database of banned patrons, advantaged players, and VIP guests from Day One of implementation,” said Mark Kornegay, CRO of Omnigo Software. He adds, “Sharing data across properties enhances security and surveillance for everyone by allowing casino operators to exchange critical information with each other and with law enforcement.” Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting iTrak security solution Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting and data analysis. Casinos can function more efficiently using iTrak thanks to its simplified reporting and notification process. The system also empowers casino employees to leverage data-driven security intelligence to address incidents in real-time, track persons of interest and mitigate risk and exposure to liability. Various modules within iTrak include Facial Recognition, Visitor Management, Lost and Found and more. Security and risk management system In addition to the Macau expansion, Omnigo’s casino portfolio also includes 100% of the Las Vegas Strip casinos and 65% of the Canadian gaming market. Each casino uses iTrak, Omnigo’s security and risk management system for incident reporting, property surveillance and security and loss prevention. “It’s a true testimony that these casino operators have put their full confidence into Omnigo’s offerings to keep their properties safe. With that level of trust, we’re able to prioritise innovation and bring the latest technology like facial recognition software and advanced data analytics to market faster for our customers, both large and small,” Kornegay added.
With the opening of the new Thomson Nature Park, Singapore, the National Parks Board (NParks) recently unveiled a new system to help detect wildlife crossing the roads between forests and provide real-time warning messages for approaching vehicles, so that the vehicles can slow down and let the animals safely walk onto the other side (The Strait Times). IronYun AI NVR Animal Detection solution IronYun AI NVR Animal Detection is the solution that NParks has selected to realise the system IronYun AI NVR Animal Detection is the solution that NParks has selected to realise the system. On one hand, AI NVR uses deep learning AI models to accurately recognise animals versus vehicles and people via camera feeds on the roadside. On the other hand, AI NVR integrates with signage systems to trigger the appropriate alerts when such animals are detected. Wildlife protection program: “Thomson Nature Park (TNP) is a 50-hectar (124-acre) green space to buffer between the eastern forests of the Central Catchment Nature Reserve and the new infrastructure developments. TNP is separated from the Nature Reserve by a 3-km-long Old Upper Thomson Road, on which visitor cars frequently travel. Animals, however, do not recognise manmade geographical boundaries”, said NParks Director for Conservation, Sharon Chan, and thus often walk across the road from the forest into TNP and vice versa to forage for foods and find mates. Animal-vehicle collisions have occurred because the cars and motorcycles cannot see the animals and stop in time. Meanwhile, biodiversity surveys have indicated that many native animals, including critically endangered species such as the Raffles' banded langur and the Sunda pangolin often cross this road. Several measures have been implemented to protect the animals, including: Aerial crossing: a rope ladder and a single rope crossing along the Old Upper Thomson Road to help canopy-dwelling animals crossing overhead Culverts: five culverts to help ground-dwelling mammals crossing underground Reducing traffic: turning Old Upper Thomson Road from a dual-lane road to a single-lane road in June 2018; plans to close the road to vehicles between 7:30 pm – 6 am daily in the future Roadway animal detection system: a combination of IronYun AI NVR, cameras, and signage to alert vehicles to slow down from afar when an animal crosses the road In particular, the roadway animal detection system is co-funded by NParks and the Land Transport Authority (LTA) to reduce animal-vehicle accidents. At the heart of the system is IronYun AI NVR. AI technology for wildlife protection The system is guaranteed to recognize a human versus an animal versus a vehicle AI NVR is a deep learning video analytics solution, which can distinguish several types of objects, including vehicles (car, bus, motorcycle, etc.), people, manmade objects (backpack, suitcase, etc.), and animals. IronYun engineering teams train the AI models using thousands of hours of video data to ensure high accuracy, so the benefits are two-fold: No false alarms: the system is guaranteed to recognise a human versus an animal versus a vehicle. As an improvement compared to legacy sensor-based systems, motions caused by tree branches swaying, people walking/biking, cars driving by, etc. do not trigger any alarm. In this case, only an animal crossing the road would trigger an alarm. Easy to use: no calibration to the environment is required. The model is pre-trained and ready to use from day 1. AI Network Video Recorders (NVRs) The LTA and NParks users set the alert rule so that when an animal appears, AI NVR recognises, records the metadata and triggers lights to flash under a sign that reads ‘Animals Ahead’, all within 3 seconds. The car sees the flashing light and slows down, allowing the animals to reach safety. The unintrusive monitoring and alert system AI NVR has proven useful The current system supports 5 cameras along Old Upper Thomson Road. The system was announced on October 11, 2019, and is a year-long pilot project in the joint effort of LTA and NParks to protect wildlife in Singapore national parks. Unobtrusive and alert video system While the rope crossing and culverts help providing the animals safe alternative travel routes, Dr. Andie Ang, a primate scientist and chair of the Raffles’ Banded Langur Working Group, has commented that it would take time for animals like the Langurs to get used to artificial structures, so long-term monitoring is necessary. Therefore, the unintrusive monitoring and alert system AI NVR has proven useful. According to LTA Chief Executive, Ngien Hoon Ping, “Joint efforts, such as the one on the roadway animal detection system, help us understand how technology could be deployed to achieve our aims.”
March Networks, a video security and video-based business intelligence provider, announces that the rapidly growing U.S. convenience store chain Yesway has selected its Searchlight for Retail solution for advanced video surveillance and analytics. Yesway is currently deploying March Networks Searchlight for Retail in 136 locations across Iowa, Kansas, Oklahoma, Missouri, Texas, Nebraska, New Mexico, South Dakota and Wyoming. The c-store chain, which is operated by an affiliate of Brookwood Financial Partners, LLC, is expanding across the U.S. and plans to standardise on March Networks as it moves forward. Asset protection investigations Brandon Pohlman, Yesway Safety & Asset Protection Manager, said the company selected Searchlight for its scalability and centralised management features as well as its powerful exception-based reporting capabilities. Through its combination of high-quality video surveillance, point-of-sale (POS) transaction data and analytics, Searchlight helps Yesway visually monitor operations at all of its sites and quickly analyse transaction data for anomalies. “Having our video surveillance, POS data and analytics together on one easy-to-use platform is a huge advantage for Yesway,” said Pohlman. Using the software, the c-store can rapidly search and sort all of its transactions and match them with corresponding video clips. The company can also group higher-risk transaction types like refunds and assign risk factors to its stores based on the number of these transactions. “The insights uncovered by Searchlight have helped Yesway reduce its shrink levels and improve the speed and efficiency of asset protection investigations,” Pohlman said. Advanced system management software Yesway is also deploying March Networks 8000 Series Hybrid NVRs for reliable video recording In addition to asset protection, Searchlight also delivers valuable business intelligence through the integration of video analytics including people counting, queue length and dwell time. Several different Yesway departments use Searchlight’s information to monitor operations, merchandising and customer service across the organisation. Iverify, a full-service interactive security company and March Networks certified partner, managed the Yesway installation. Marty Brakel, Iverify National Account Manager, said March Networks’ products are ideal for the c-store market. “March Networks Searchlight is a professional-grade solution for customers like Yesway that need robust loss prevention tools and the ability to manage hundreds of locations simultaneously,” said Brakel. In addition to Searchlight, Yesway is also deploying March Networks 8000 Series Hybrid NVRs for reliable video recording, and March Networks SE2 Series IP Cameras for high-quality video capture. It is managing the solution with March Networks Command Enterprise, advanced system management software that simplifies multi-site video management. Improve customer satisfaction “With March Networks’ complete solution for c-stores, organisations like Yesway can cut losses and improve customer satisfaction as well as operational efficiency,” said Net Payne, Chief Sales & Marketing Officer, March Networks. "Because Searchlight is also available as a hosted service, c-stores and other retailers can enjoy all the benefits of this powerful solution for a low monthly fee. They can have peace of mind knowing that March Networks’ trained professionals are monitoring and maintaining the health of the video system on their behalf.”
Traka’s innovative key and equipment management solutions have been installed at a new national distribution centre for a top four UK supermarket. The new distribution centre, fulfils orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centres are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorised personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centres are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorised colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organisations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorised ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Reducing the cost of video surveillance system deployment and operationDownload
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals