Milestone Systems, globally-renowned open platform company in networked VMS, released its Device Pack 10.0a in October this year and now supports the MOBOTIX MOVE camera series. MOBOTIX MOVE is an independent product line providing customers everything from a single source. “MOVE” stands for the use of mechanically moving parts in the cameras, meaning that MOBOTIX have parted with their previous product policy of only offering decentralised video systems on the market. The MOBOTIX M...
Used for both people and vehicle access, the UHF ISO Combi Card offered by Nortech is a card with a long-range UHF tag and proximity or smartcard technology. UHF ISO Combi Card Designed for use with the uPASS range, the card’s features ensure that only one card is required for both vehicle and building access applications. Based on passive UHF technology, the UHF Combi Card by Nedap is identified up to 10 metres with the uPASS Target, five metres with the uPASS Reach or two metres with...
Intrusion is the act of intruding, forcible inclusion or entry in an area that is not welcome. Track is the act of following the movements or trail of someone or something, typically in order to find them or note their course. Without staring monitors for 24/7, Intrusion Video Analytics can help partners to detect the act of intrusion and give alerts, and Track Video Analytics can help users to find the direction of moving object, give alert if the object goes to wrong direction. Most intrusion...
On Wednesday 28th November, GJD’s longest serving staff member, Chris Moore celebrated 30 years of service. As Technical Director at GJD, Chris is responsible for the Research and Development of new products and technology for the company. Chris’s knowledge and skills have made him an integral part of GJD. GJD has over 35 years’ experience in protecting and securing people, properties and assets. In 2017 GJD was awarded with the Queen’s Award for Enterprise for Internati...
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's p...
GJD, a British manufacturer of professional external detector equipment and LED illuminators, is very pleased to announce it has been shortlisted as a UK OSPA 2019 finalist in the Outstanding Equipment Manufacturer category. Winners will be announced at an evening awards ceremony on Thursday 28th February 2019 at the Royal Lancaster London hotel. Now in their third year, the UK OSPAs serve to acknowledge the creditable and infinite contributions that companies, initiatives, teams and individual...
Live Earth, an advanced data visualisation platform for directing and monitoring complex business and security operations, has partnered with HERE, the Open Location Platform that provides advanced location intelligence, to improve operations and safety measures across indoor venues. Through this partnership, organisations will be able to integrate HERE Venue’s detailed floor plans with a variety of assets that include sensors, door access controls and security cameras. The ability to marry detailed maps and monitoring tools with the Live Earth platform will provide venues and building owners the ability to track resources throughout the premises with far greater accuracy than was previously available. Enhancing safety measures for organisations Live Earth and HERE Venue’s integrated system improves outdated surveillance and security systems by providing precise venue mapping“GIS technology has evolved and with the addition of HERE Venues, Live Earth’s platform capabilities now reach the indoors,” explained Craig Johnston, Live Earth’s VP of business development. “HERE Venue’s indoor mapping solution will add a critical layer to Live Earth’s visualisation platform, improving safety measures and monitoring for organisations.” Traditionally, venues have relied on surveillance footage and timestamps to monitor facilities. Live Earth and HERE Venue’s integrated system improves outdated surveillance and security systems by providing precise venue mapping layered with data that can be monitored within the context of a larger building. If unauthorised access should arise, for example, security personnel can immediately pinpoint an exact location and map the quickest way to address the threat. The combined technology enables faster response times during critical situations when every second counts. Improving building efficiency The integration offers building managers and maintenance teams the opportunity to improve building efficiency“It’s one thing to drop a pin in a map and call it a security camera. It’s quite another to drop that pin, then have the ability to access the asset that pin represents, understand its data and understand the context of what’s going in and around that pin’s space,” Jim Leflar, manager, Venues Marketplace at HERE said. “This is where HERE and Live Earth’s collaboration offers a powerful use case to customers and building owners.” In addition to security and public safety, the integration offers building managers and maintenance teams the opportunity to improve building efficiency. Building managers can set up alerts to a host of data including asset maintenance, grounds keeping, vandalism, Direct Digital Controls and fire alarms. The combined insight provided by Live Earth and HERE has the potential to reduce overall maintenance costs as well as protect valuable investments in the property.
Check Point announces a technology integration with Amazon Web Services (AWS) Security Hub, a unified security service, which centralises view and management for security alerts. This integration, together with the addition of Dome9 to the CloudGuard portfolio, following its recent acquisition by Check Point, allows enterprises to access multi-layered security and nearly continuous compliance capabilities from the central console of AWS Security Hub. By leveraging AWS Security Hub, Check Point can provide a nearly seamless experience to customers in providing additional protection to their AWS environments against advanced cyber-threats in real time and mitigating compliance risks at any scale. Enhanced threat prevention CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies AWS Security Hub provides users with a comprehensive view of their high-priority security alerts and compliance status by aggregating, organising, and prioritising alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie as well as from AWS Partner Network (APN) security solutions. The findings are then visually summarised on integrated dashboards with actionable graphs and tables. The Check Point CloudGuard solution natively integrates with AWS Security Hub to provide customers with better visibility into gaps in their security and compliance posture, and context-rich security intelligence for enhanced threat prevention. CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies and provide AWS Security Hub with visibility into threat alerts based on deep event correlation and rule-based cloud intrusion detection. To complete the picture, customers leveraging the CloudGuard Dome9 solution can analyse and respond to events triggered by its sophisticated nearly continuous compliance and governance framework. Continuous network monitoring Enterprises using it benefit from powerful features that prevent 5th generation cyber-attacks in their hybrid environments. These features include: Threat prevention of both North-South and East-West cyber-attacks based on contextual awareness and attribution of network traffic to cloud-native ephemeral services Real-time alerts on network vulnerabilities, with nearly continuous network monitoring and alerting based on easily customisable policies Comprehensive visibility into cloud assets and security configurations Nearly continuous compliance monitoring and enforcement of security posture Fully integrated security capabilities, including firewall, IPS, application control, IPsec VPN, antivirus, anti-bot and more Unified management of security policies across hybrid environments (datacenter, private and public clouds) Manage cloud environments Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services" “AWS is a leader among cloud services providers, delivering powerful security capabilities that help enterprises deploy and manage cloud environments with enhanced security features at scale,” says Itai Greenberg, Vice President of Product Management at Check Point Security. “Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services. We are privileged to offer integration with AWS Security Hub to deliver comprehensive visibility into ongoing security and compliance risks, and end-to-end workflows to mitigate risks.” “We are happy to have Check Point as a launch APN Partner integrating the CloudGuard IaaS solution with AWS Security Hub,” said Dan Plastina, Vice President, Security Services, Amazon Web Services, Inc. “Check Point offers advanced threat prevention capabilities to AWS customers. The integration with support for AWS Security Hub makes it even easier for our shared customers to access and act on their cloud security insights.”
Oncam, the provider of 360-degree video capture and business intelligence technology, announces the release of its new ExD Explosive Environment camera range, the only 360-degree single-sensor camera with an explosion protected housing. The range is designed to safeguard environments in markets such as oil and gas production and refineries, power and utilities, wastewater treatment, grain handling and storage, and other hazardous materials facilities. To provide the best possible protection for hazardous areas, cameras installed as part of a comprehensive security plan must guarantee the appropriate level of safety and adhere to stringent regulations. Flame-proof housing The Oncam ExD camera range helps ensure the safety of the surrounding atmosphere by containing electrical sparks that can ignite and potentially cause significant harm to both people and assets. Designed to withstand the toughest conditions, the camera's flame-proof housing has obtained various certifications across the globe: The ATEX certification approves the use of the ExD in applicable hazardous environments (excluding mining) within the European Union IECEx — The International Electrotechnical Commission certifies the ExD camera range at a ‘high’ protection level, with the housing protecting an inner explosion from spreading into the air surrounding it. ATEX — The ATEX certification approves the use of the ExD in applicable hazardous environments (excluding mining) within the European Union. Explosion-protected housing The Oncam ExD 360-degree camera range, which includes both 5MP and 12MP models, provides increased flexibility for customers in these markets to install a high-quality, single-sensor camera in an explosion-protected housing. The camera range also features heavy-duty, 316L stainless steel and is rated IP66, IP67 and IP68 against water and dust ingress. “The new ExD camera range is the perfect addition to our specialist cameras, which are targeted toward markets that require robust equipment to provide video capture in extreme conditions,” said Jon Marsh, VP Product, Oncam. “The expanding list of certifications for these cameras, along with Oncam's attention to the needs of these markets, allow us to provide high-quality 360-degree coverage and intelligent video that increases situational awareness and protects critical assets from threats.”
Hikvision, the provider of innovative video surveillance products and solutions, announces the launch of its Security Radar intrusion detection solution. The solution uses cutting-edge Hikvision technology to accurately pinpoint the location and motion trail of up to 32 potential intruders per radar, even in the harshest weather conditions. Hikvision Security Radar is ideal for monitoring large, exposed spaces with harsh weather, and where the perimeter environment is too complex for deployment of only video surveillance cameras. Thanks to its reliability in all weathers, wide detection angle and ultra-accurate intruder detection capabilities, this cutting-edge solution is perfect for locations such as ports, airports and large open industrial areas. Accurate detection over a wide area Hikvision Security Radar can offer accurate detection over a wide angle of 100°, and up to a distance of 60mTraditional cameras or motion detectors such as Active Infrared and Video Motion Detection have limitations in pinpointing the exact location of a potential intruder related to their detection area. Hikvision Security Radar, however, can offer accurate detection over a wide angle of 100°, and up to a distance of 60m. Hikvision Security Radar uses digital beam-forming technology and intelligent analysis algorithms to accurately detect all target movements in all weather conditions, keeping false alarms to a minimum. What’s more, IP67 rating gives peace of mind that the hardware itself is all-weather approved. Visual verification of the intruder Hikvision Security Radar can also link with as many as four Hikvision PTZ dome cameras at once. This configuration will not only trigger an alarm when an intruder is detected – it will also trigger video recording, to help with visual verification of the intruder. Furthermore, the cameras and the radar can be installed in different locations. This Hikvision-patented video linking solution is unique, and enables users to view, accurately track and record multiple images of targets simultaneously, all while identifying their precise movements such as running, walking, crouching and crawling. Suitable for multiple applications Hikvision Security Radar is compatible with a variety of brackets, such as Bullet-PTZ brackets, for easy installationThe Hikvision Security Radar has multiple scene modes, making it suitable for a variety of applications. Shrub Mode, for instance, is best suited to areas surrounded by dense forest, as it will filter out false alarms such as shaking trees or heavy rain. Open-Area Mode is ideal for large, open, sensitive locations such as ports. And the Custom Mode enables users to fine-tune settings to suit their particular needs. Hikvision Security Radar is compatible with a variety of brackets, such as Bullet-PTZ brackets, for easy installation. It also supports Power over Ethernet (PoE) so users can just plug and play. Jiang Feng Zhi, Head of Hikvision’s alarms division says, “We are excited to bring our cutting-edge Security Radar solution to the market, and in such an innovative way. We hope that being able to accurately detect tens of intruders at once, day or night, and in all weather conditions, will bring incredible value to a whole variety of organisations globally.”
Moxa Inc., a provider of industrial communications and networking, and Trend Micro Incorporated, a provider cybersecurity solutions, announce they have executed a letter of intent relating to the formation of a joint-venture corporation-TXOne Networks, which will focus on the security needs present in the Industrial Internet of Things (IIoT) environments, including smart manufacturing, smart city, smart energy and more. Historically, Information Technology (IT) and Operations Technology (OT) have operated within industrial organisations as isolated and independent networks with different teams, objectives and requirements. Securing the entire ecosystem TXOne Networks combines these strengths and responds to the growing security needs of industry Organisations are teeming with machinery and devices that were not originally designed for connectivity to the corporate network, which means they often lack the ability to be easily updated or patched for security measures. There is a critical need to secure these devices, identify clear ongoing ownership, and to provide a holistic view across the broadening attack surface within enterprises. Trend Micro, majority owner in TXOne Networks, identified the potential challenges faced by IIoT stakeholders early on and has been working on several fronts to secure the entire ecosystem, from data centre to device. Moxa Inc. brings more than 30 years of experience in industrial networking and protocol expertise. TXOne Networks combines these strengths and responds to the growing security needs of industry, such as smart factories that require a unified solution for delivering deeper visibility into both devices and protocols. Partnering with Moxa These complicated environments are made up of multiple layers requiring protection that sits in and between IT and OT. The responsibility for the security of these combined layers is traditionally unclear. "I'm excited about this venture and how Trend Micro continues to take diverse yet focused growth steps that allow our teams to remain concentrated on core strengths while giving room to better serve customers and advance into new markets," said Eva Chen, Chief Executive Officer for Trend Micro. "Partnering with Moxa will combine more than 60 years of expertise to accelerate our ability to view and secure the extended enterprise including these important but often overlooked OT environments." Reinforced business model Trend Micro brings IT channel partner strength while Moxa brings OT channel partner strength TXOne Networks will build security gateways, endpoint agents and network segmentation to secure, control, and provide visibility of operational technology and equipment. Unlike some solutions focused solely on protecting assets nearest to the IT layer via detection, TXOne Networks has expertise closest to the OT layer and will provide proactive, timely and easily implemented solutions to secure the Industrial Control Systems (ICS) world. In addition to investing intellectual capital, funds and dedicated headcount, each parent company lends complementary channel expertise. For its part, Trend Micro brings IT channel partner strength while Moxa brings OT channel partner strength. Together these reinforce the business model and geographic territory targets. Reducing operational risk TXOne Networks will be led by Dr. Terence Liu, Trend Micro Vice President and former CEO of Broadweb. With experience building both products and teams, Dr. Liu will bring nearly 20 years of security product expertise to this new team. "With this joint venture, Moxa and Trend Micro will position TXOne Networks as a global leader in the industry to create effective IIoT security solutions that help ensure that IIoT applications and critical infrastructures are secure," said Andy Cheng, Strategic Business Unit President for Moxa Inc. "Industrial automation customers around the globe will be able to reap the benefits of having a holistic OT/IT security solution to protect assets and reduce operational risk." Raising security levels TXOne solutions also will enable OT customers to optimise network infrastructure for more IIoT opportunities TXOne solutions also will enable OT customers to optimise network infrastructure for more IIoT opportunities. They will benefit from Moxa's expertise in building reliable networks to bring more legacy and disparate networks into on industry-grade Ethernet backbone and raising the security level of the entire network's communication to help drive nonstop productivity and cost reduction. Professional services will also be provided including security risk assessment, security breach response, and access to threat intelligence from Trend Micro Research and its Zero Day Initiative (ZDI). "In a world where attacks are getting more persistent and sophisticated, while organisations are struggling with skills shortage and alert fatigue, these two groups are joining forces to successfully secure enterprises around the globe," said Dr. Terence Liu, General Manager, TXOne Networks. "I am eager to pursue the opportunities and challenges this team will tackle in the months and years to come."
Morse Watchmans, global provider of key control and asset management systems, is showcasing their KeyWatcher Touch key management system at ISC East in New York City. Also, on display is AssetWatcher, their RFID-powered asset management solution for sensitive and valuable assets. KeyWatcher Touch system “We always love the opportunity to get our product in front of new faces,” said Fernando Pires, CEO at Morse Watchmans. “ISC East gives us the chance to show the NY metro area the benefits that KeyWatcher and AssetWatcher can bring their business.” Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface and patented SmartKey system Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. AssetWatcher RFID solution AssetWatcher is a flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile electronics, and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three modes for flexible usage. AssetWatcher’s RFID technology allows you to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Proven features of KeyWatcher, including email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher. “We’ve taken the features in KeyWatcher that our customers rely on most and applied them to AssetWatcher,” said Mr. Pires. “We also make a point to continually improve our KeyWatcher system based on user feedback, and we’re excited to show these powerful products this week in New York.”
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulnerable to threats. Physical security solutions Terrorists and other malefactors have known for centuries that any large gathering of people has inherent vulnerabilities on which they can prey: Crowds make it hard for security to keep track of any single person or spot unusual behavior, and the number of people congregated in one space amplifies the impact of any attack. In recent years, organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands, and deploying K9 and police units to patrol the lines to enter security. But these current methods share a universal flaw: to be caught, evil-doers have to be on the verge of actually entering the venue with hundreds of other people, which means they can still cause a massive amount of destruction. In a survey conducted by Brivo, 50 percent of business security leaders felt they lack adequate budget and financial resources to invest in physical security solutions. Augmented security measures Organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands Security professionals and event organisers are constantly on the verge of finding new methods to implement in order to add an extra layer of security at venues and large facilities. For example, at this year’s Coachella Music Festival in Indio, California, which attracts over 100,000 attendees each year, organisers boosted their security initiatives by adding drones, armed guards, magnetometers and dog patrols. Unfortunately, large entertainment festivals have been a target for ill-intended individuals. Last year, the 91 Route Festival in Las Vegas, Nevada took the lives of more than 50 people and injured over 500. In the United Kingdom, 22 people lost their lives to a suicide bomber at an Arianna Grande concert in the Manchester Arena. Yet, concerts aren’t the only place new security initiatives and technology need to be implemented in, but also sports arena and large facilities. Metrasens partnered with Villa Park, the football grounds for Aston Villa Football Club in the UK, to conduct a trial using FMDS technology, Proscreen 900, to screen fans Current screening methods Conventional walk-through metal detectors are a compromise between effective screening and high throughput, as they successfully detect metal objects, but only can screen about five or six people each minute. They are generally placed 10 to 20 yards from a venue’s front façade, either just outside or just inside, to screen people as they enter the facility. Hand wands are used for anyone that sets off the walk-through detector as a secondary screening method for confirmation. Many facilities also use observational methods to screen, such as drones, CCTV, security officers or police walking the crowd and looking for suspicious behavior, or explosives-sniffing K9 units patrolling the area. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue Security method limitations Each of these methods has intrinsic limitations. Observational security methods are just that – observation-based, not detection-based. They rely much more heavily on human factors that introduce greater degrees of error and chance, and positive visual identification of a suspicious threat requires a relatively close proximity to observe the threat. They’re also slow and laborious. Walk-through detectors and wands will catch someone trying to enter a facility with a weapon, but by the time they do, it may be too late – a terrorist will already be well within proximity to do a lot of damage. Bad guys don’t need to actually enter the venue; they just need to get close enough to injure or kill a large number of people. That can happen – and has happened, such as with Manchester Arena bombing in 2017 – right at the security point, where a terrorist will be surrounded by dozens or hundreds of people and 10 to 20 yards away from the critical asset: the interior of the venue. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue. What they haven’t had until recently is a way to screen mass amounts of people for weapons of mass casualty as far away from the critical asset as they can, and as far away from densely populated areas as they can, all while not impeding throughput resulting from the requirement for patrons to divest their possessions. Expanding security reach with FMDS The far perimeter of a venue is an ideal place to screen for weapons of mass casualty. Most of the time, a terrorist is trying to get closer to the immediate perimeter of the venue, to inflict the most damage to large groups of people waiting to get in; farther away, event attendees are walking toward the entrance and thus are more dispersed, not standing in clusters or lines. This advance screening is possible using ferromagnetic detection systems (FMDS). The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium Metrasens recently partnered with a football stadium in Birmingham, UK to conduct a trial using FMDS technology to screen fans. The trial took place in March at Villa Park, the football grounds for Aston Villa Football Club. The stadium can hold over 42,000 people. The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium, adding an extra layer of security. FMDS is highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Everything else is invisible to it; it doesn’t see people, clothing, backpacks, purses, etc. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects a magnetic signature, down to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find (e.g., a weapon). Although it is a passive technology, it is more effective and reliable than using observational security methods to screen a perimeter, because the technology will never miss something the way a human would. Recognising moving magnetic signatures An important point is that the system only works on moving objects. This makes it immune to environmental conflicts such as rebar that would trip up conventional metal detectors and allowing people to be screened quickly and unobtrusively without stopping to divest their possessions as they walk toward a venue – up to 50 or 60 people a minute. FMDS does not need people to be organised into lines or groups; it simply detects a magnetic signature on anything that passes. It runs on batteries – there is no need for an electricity source, as with a walk-through detector – and can be placed on just about any form factor (a pole, a stand, etc.). This gives security personnel flexibility when deploying FMDS, allowing them to create a wide perimeter around a venue without worrying about portability or a power source. Screening can be as obvious or as concealed as personnel prefer for a particular situation, based on the form factor they select. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution All of these combine into a solution that creates a way to close a gap in mass screenings at large events, by expanding the secure perimeter and creating a highly accurate way to detect weapons of mass casualty farther away from a critical asset and large crowds. It does not replace screening for smaller items necessarily, and all large venues should use a layered security solution that also deploys tactics like roving security guards, walk-through metal detectors and hand wands. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution. Effective mass screening solution Pessimists sometimes muse the world is getting more dangerous with each passing year, and that technology is at least partially responsible for both the breadth and depth of the increasingly creative ways bad guys harm people. But some technologies also are responsible for helping to fight against those threats and make the world safer, and FMDS is one of those. By providing a foolproof method of detecting weapons of mass casualty before terrorists get too close to an event venue, FMDS gives event security personnel a way to better protect large events, making them less dangerous and keeping people safe. Images source: Metrasens
Security teams at casinos and gaming facilities are challenged daily to balance a welcoming and guest-focused attitude with a firm and capable presence to prevent and handle security issues, manage surveillance and security systems, and protect employees, guests, and assets. And all of this needs to be accomplished while complying with strict gaming regulations. An experienced security systems integrator can assist you with many of those challenges, including the very important job of ensuring that the correct security technologies are integrated and installed correctly to avoid downtime and maintain regulatory compliance. On the flip side, partnering with the wrong security integrator can be an expensive lesson with disastrous financial consequences due to system interruptions that can shut down gaming operations. However, selecting the right security systems integrator is not always an easy task. To get the answers you need, you need to ask the right questions. Here’s a list of criteria to help get the search process started. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry 1. Relevant and proven industry experience This may be one of the most important factors for you to research. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry. You wouldn’t hire a plumber to fix your roof or a chef to repair your car, so why consider hiring an integrator without relevant work experience in your specific industry? Does the integrator have experience working with security solutions for casinos and gaming facilities similar to your facility? Have they worked with gaming commissions in your state? Do they have the gaming certifications necessary to ensure your new system is in compliance? And what specific projects have they done – with references you can contact? Even more, look for a systems integrator who has strong relationships with contractors, suppliers, unions and equipment suppliers, as they may need to call on them for assistance during the course of your installation. 2. Security systems knowledge Security technologies are evolving at an unprecedented pace which presents obvious advantages and some hidden dangers. It’s important that you select a systems integrator who not only installs products well – but also works very closely with equipment and software manufacturers to develop new and innovative solutions for the most challenging installations.It’s also important to ask about their procedures and processes for after-hours emergency situations Look for systems integrators that utilise integration and testing facilities to evaluate which system configuration and specific components meet your functionality needs, lighting challenges, resolution and frame rate requirements, and recording accuracy demands to ensure your system provides you with the highest levels of identification while maintaining regulatory compliance. Since no two systems are ever alike, it’s also important to look for custom integration capabilities employing solutions from different manufacturers to ensure you are getting the best possible solution on an application by application basis. 3. Brand loyalty versus conflicts of interest There’s no doubt that security professionals have their preferred brands. This can be based on prior experience, proven reliability, superior customer support, or even personal relationships. But it’s also no secret that price and sometimes spiffs can play a deciding role on which products a reseller recommends. Be specific to ask questions about the systems integrator’s line card – which manufacturers’ products do they actually represent and why? And how do they select specific products for specific applications? If the answers to these simple questions seem vague, there may be more at play than meets the eye. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation. 4. Accelerating resolutions How is the integrator’s firm structured? How long have they been in business? Who will be your daily contact? How long have members of the integrator’s team been with the firm? What experience do they have? It’s also important to ask about their procedures and processes for after-hours emergency situations, as you will likely need service after normal business hours. Find out if they offer on-demand remote system support to address problems immediately, and to accelerate resolutions if and when there is a failure. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation Most importantly, verify that they have technicians who can get to your physical location quickly in the event problems need to be addressed physically in order to keep your property in compliance. Even though it can be overlooked, it’s important to assure the system integrator’s organisational structure meshes well with your general requirements before starting a relationship. 5. Pricing structure Of course, price is important, but while an integrator’s pricing should be competitive, it should be viewed as one of many selection criteria.An experienced systems integrator with casinos and gaming facilities will understand local, state, federal, and tribal regulations A security systems integrator with a proven track record of successfully configuring, installing, and servicing projects like yours, on time and on budget, is worth more than the small amount of money you might save by going with a low-cost integrator. 6. Knowledge of gaming regulations A systems integrator who has experience working with casinos and gaming facilities will understand local, state, federal, and tribal regulations, and will provide you with a gaming surveillance and security solution that minimises disruptions to your operations during its installation and after your new system has been implemented. Along with the requirement standards of performance, quality and reliability, compliance is critical to ensure fluid gaming operations. 7. Adding value with industry references Industry references are invaluable in determining your ideal choice. First, ask them to provide client contacts from their reference list, and contact those individuals. Questions to ask include: Did the integrator clearly understand the reference’s requirements? How did they contribute to the solution? What challenges did they need to overcome? Did the company deliver on time and on budget? How has the system(s) been operating since implemented? How has their support been? Why would you recommend them? A good security systems integrator will take extra steps to ensure your security solution is always working 8. Asking the right questions There are very few security systems integrators who can address all of a casino’s or gaming facility’s needs, but they do exist, and you’ll find them if you do your homework. Look for an integrator that can add value and not just take direction. A good security systems integrator will volunteer ideas to reduce maintenance costs, take extra steps to ensure your security solution is always working, and help save your casino money. Their success will be determined by their initial ability to understand your challenges and deliver the best possible solution to resolve them. And it all starts with choosing the right partner by asking the right questions.
Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is especially relevant to two of March Networks’ primary vertical markets – banking, whose focus on money requires stringent cybersecurity; and retail, which has been the target of recent cybersecurity attacks. “People just don’t know what to do with cybersecurity,” says Dan Cremins, Global Leader, Product Management at March Networks. “The thing is, you have to figure out how to make your products, solutions and networks more secure, and then let them know what you are doing about it.” Cybersecurity mobile app As the profile of cybersecurity has increased in the physical security market, March Networks has added cybersecurity features to its GURU app. GURU is a mobile app for integrators to use when installing and diagnosing equipment in the field. Using a wireless dongle, the system can read the QR (Quick Response) code on a camera, for example, and provide installation information specific to that camera. As the profile of cybersecurityhas increased in the physicalsecurity market, March Networkshas added cybersecurity featuresto GURU GURU’s new Security Audit tool enables the app to scan a unit and check to make sure it is cybersecure; that is, the right ports have been closed and default passwords have been changed. Simple green, yellow and red coding communicates the cybersecurity status of equipment as it is being installed – and it takes less than five minutes. After installation, the GURU app can be used to conduct an extra check to ensure cybersecurity. There is also a section on the March Networks web site identifying security vulnerabilities (listed by CVE [Common Vulnerabilities and Exposures] number), explaining whether they affect March Networks equipment, and the availability of any patches. “Cybersecurity is the number one threat to any industry, including ours,” says Cremins. “We offer a tool to help people address it. We are trying to be as proactive as possible, and stay ahead of it.” Integrating inventory tracking & video There are other developments at March Networks, too, including a new integration partner in the retail sector. Tracking inventory is critical to retail loss management, and March Networks has integrated its video system with the Zebra RFID system for inventory tracking. Zebra uses radio frequency identification (RFID). Asset tags are used in combination with sensors mounted throughout a facility to keep track of where goods are transported in a retail store, warehouse or other location. If something goes missing,video of that item, tied to trackinginformation from the RFID system,is available instantly to aid withan investigation The Zebra RFID system generates inventory tracking information that is integrated with March Networks video in much the same way that point-of-sale (POS) information has been used with video. Information from inventory tracking is associated directly with each frame of video. The integration allows video cameras to watch equipment as it moves around a warehouse or retail space. If something goes missing, video of that item, tied to tracking information from the RFID system, is available instantly to aid with an investigation. In addition to retail, there are also applications of RFID inventory tracking in medical environments, where expensive equipment is used throughout a hospital, for example. Integration of video with inventory control would allow video cameras to watch medical equipment as it travels from floor to floor and room to room. Video provides a valuable investigation tool if a medical device goes missing. “They can review the video to see where it was and see what happened with it,” says Cremins. HDR cameras for banking applications At the recent ASIS show in Orlando, March Networks introduced the new ME4 series of multi-exposure, 4 megapixel cameras. The cameras are aimed at improving video image performance in situations with varied light, such as a glass-enclosed ATM enclosure, bank branch, or a retail location where bright windows can cause backlighting and other problems. In addition to better image quality and resolution, the cameras have been designed very economically, says Cremins. They strike a balance between video clarity and bandwidth and storage efficiency. The cameras use HDR (high dynamic range) technology designed for the most extreme lighting conditions. Even in an environment surrounded completely by glass, the cameras can still see the person in the foreground and details in the background. Facial details are critical in applications at banks and financial institutions.
There was another big trade show last week – the four-day Security Essen event in Germany. I didn’t attend, but several of my SourceSecurity.com colleagues report it was a busy show from start to finish, with the halls devoted to video/CCTV and access control dominating the show. The other halls were quieter, with smaller stands. Hot topics included big data, machine learning, mobile credentials, storage and an emphasis on solutions (rather than products). The exhibit hall was a bit of a maze, but attendees managed to find their way to the various stands. Three big companies – Bosch, Siemens and Honeywell – were conspicuously absent from their usual large role at Security Essen, and there was mixed feedback about the impact of their absence on the larger show. Without three gigantic stands to concentrate the footfall, attendees seemed more spread out than clustered. Hands-on, technical displays Hands-on displays with plenty of technical detail were the norm, encouraging attendees to interact with the products. The ASSA ABLOY stand, huge as always, reflected the continuing popularity of key systems in the German, Swiss and Austrian markets. ASSA ABLOY’s Yale also featured a home automation zone. Hands-on displays with plentyof technical detail were thenorm, encouraging attendeesto interact with the products Hikvision envisions cameras coming very soon with “deep learning” capabilities. These cameras, combined with big data applications, are the future of smart traffic systems, for example. Deep learning systems will replace traditional licence plate recognition (ANPR) and analyse electronic data about cars, rather than relying on number plates, says the company. Hikvision also highlighted multi-sensor cameras that can cover a large area and reduce the cost-per-channel – they have big projects in China and Southeast Asia. Hikvision’s privacy masking functionality is popular in Europe because of privacy regulations. Fujifilm demonstrated its impressive zoom lens series, featuring 60x zoom, long focal length and full HD quality, for use in airports and perimeter protection. Stabilisation is important with zoom because even slight movement can have a large effect, says the company. In Fujifilm lenses, the stabilisation is optical-based (in the lens), rather than software-based. Another stand that drew attention was Nedap, where a tiered seating area was provided for visitors to view video projected on a back wall. New laws in the Netherlands and France require that no information can go outside government buildings, thus requiring closed security systems, according to Nedap. It’s a trend likely to follow in the European Union, with similar laws potentially impacting hospitals and banking as well as government, says Nedap. This is why they are working with partner AET Europe to ensure that encrypted communications are secure between all elements of an IT-based access control system. Solutions – not just products The need to provide solutions rather than “just products” was a repeated theme. One solutions provider is MOBOTIX, which highlighted a new corporate design with fresher and more unified branding. The solutions approach includes analytics and people counting embedded for inventory optimisation and business intelligence. MOBOTIX is releasing new plug-and-play bundles to combat the perception that the company’s technology is not easy to use. There is also a 4K bundle with NAS (network attached) storage – all preconfigured; just power it up and it will run. MOBOTIX is releasing new plug-and-play bundles tocombat the perception thatthe company’s technologyis not easy to use Sony also offered solutions, including their intelligent approach to 4K, which they say overcomes traditional concerns with the higher-resolution technology. Sony also displayed “glass-to-glass” technology, streaming 4K cameras directly to a screen with no PC in between. Even with the company shifting to end-to-end solutions, their cameras are still at the core of the portfolio, including an accent on low-light and changing light conditions. Adding ROI was another hot topic for exhibitors. MOBOTIX emphasised its process monitoring capabilities, as did Geutebrück. VIVOTEK highlighted combining a people-counting solution with other retail data for business intelligence. Contrary to the focus on solutions was LTV Europe, a video company that keeps the attention on products. LTV emphasises personal service and a fresh approach rather than competing with bigger providers. Focus on storage and automation The themes my colleagues heard at Security Essen were not unlike those we heard recently at ASIS and earlier this year at IFSEC and even ISC West. More companies are looking to expand into non-traditional applications beyond security, such as asset tracking and logistics/delivery. Another example: Sony suggested using video to monitor rivers and lakes water levels for flood warnings. Quantum is keeping itsattention on storage, whileaddressing the IT department’sneed for data protection Quantum is keeping its attention on storage, while addressing the IT department’s need for data protection. The new StorNext scalable storage system, which can handle 4K, integrates various tiers of storage appropriate to varying workflows and business needs. For example, retrieval can be faster for more valuable data, thus maximising value while minimising the overall cost. Allegion is rolling out products that combine electronic and mechanical locks from subsidiary SimonsVoss and the Allegion portfolios. Allegion wants to position itself as electronic access control expert. Paxton highlighted a building automation system, Paxton net10, which is aimed at small and medium enterprises (SMEs) and works on mobile credentials as well as cards. They’re looking to build this kind of technology into future products. Another company, AxxonSoft, is pushing strongly to establish its brand in the United States – something to watch in 2017. SALTO also highlighted cloud-based mobile access control: They have developed a Keys as a Service system, SALTO KS, which allows businesses to grant access remotely while viewing a video of the door. Four busy days in Germany Security Essen is an international show, but the emphasis was on German, Austrian and Swiss companies and larger companies targeting those markets. There was more of a continental Europe “flavour” compared to IFSEC’s focus on the U.K. market. Four days is a long time for a trade show – my feet are shot after two and a half days! But my colleagues agree it was time well spent, if for nothing else than getting to watch an 8-foot-tall robot dance around Hall 3.
Premier League football club Everton FC has deployed SureCloud’s GDPR suite to manage and monitor its data and GDPR compliance, enabling the club to work towards GDPR compliance, optimise internal processes and position it strategically for the future. The solution replaced Everton FC’s manual data mapping and processing methods. Manual data mapping and processing Everton FC’s databases are extensive, containing details on over 32,000 season ticket holders and over 600,000 registered fans, with details on around 360 employees, players, agents, suppliers, and individuals associated with the club’s community charity and partner school. Much of this information is sensitive. This data and all of the processes associated with it were being manually managed and tracked in a series of Excel spreadsheets. With multiple requests and queries to respond to every day, the club’s Data Protection Officer was struggling to record and manage smaller ad hoc queries, incidents, and tasks. With GDPR due to place much tighter restrictions on how the club processed, managed and shared its data – as well as on the reporting of any incidents that did occur – the club needed a more comprehensive and reliable tool in place before 25th May 2018. SureCloud platform The club approached its long-standing IT support provider NCC to find a solution. NCC recommended the SureCloud GDPR Suite, delivered on the SureCloud platform. After SureCloud had successfully demonstrated the ability to provide full visibility for management and automation of GDPR processes across the organisation, Everton FC selected its cloud-based suite of solutions. Two dashboards were created according to Everton FC’s specific needs Two dashboards were created according to Everton FC’s specific needs: one to show all data mapping and transfers, including where data is being held and who it is being shared with; and one showing incidents and requests, including a subject request register and incident tracker path. This gives an immediate overview of which requests are still outstanding, such as a request for an individual’s personal information to be erased from the database. SureCloud GDPR Suite The five applications Everton FC chose to deploy from the SureCloud GDPR Suite were: GDPR Program Tracker - to enable the club to map all its disparate data and workflows using intelligent risk-based questions GDPR Management – to provide all mandatory GDPR business-as-usual processes Information Asset Management - to record and maintain the club’s entire data inventory Compliance Management for GDPR - to help Everton FC speed up their process of attaining compliance and on-going real-time risk remediation Incident Management for GDPR – to meet the GDPR requirement to log, track and notify the ICO of any data breaches, should an incident arise Ian Garratt, Data Protection Officer at Everton FC said: “The penalties for not achieving GDPR compliance are severe – up to 4% of our revenues, or €20 million. It was imperative that we got a solution in place that could not only help us achieve GDPR compliance but would also make it quick and easy for us to demonstrate that compliance at any point, on request. SureCloud’s GDPR Suite fit the bill.” Centralised data management Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralised system “We are now tracking and recording every single data request in a centralised way. With NCC’s support, SureCloud’s solution has brought a comprehensive clarity to our data processing that was impossible to achieve with manual spreadsheets. The system is so intuitive; it has helped us streamline multiple processes and undertake impact assessments that we couldn’t handle before.” Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralised system. All changes and requests are automatically tracked so that activity records and data audits can be produced at the click of a button. Should an incident like a suspected data breach occur, it is identified and reported immediately and automatically. The club’s data protection team can select which asset has been affected and immediately determine the severity of the incident and whether it needs to be reported to the ICO. Should it need to be escalated, the report is available instantly. Data processing, documentation and risk management Ian Garratt added: “The SureCloud GDPR Suite isn’t just a compliance tool; it’s a comprehensive management tool. We now have a continuous, real-time status of where we are and what we need to be doing in terms of data processing, documentation and risk management. It would have simply been impossible to achieve this manually. SureCloud has not only helped us to work towards GDPR compliance they have optimised our internal processes and positioned us strategically for the future.” In addition to deploying five applications within the GDPR suite, SureCloud is currently adapting its Incident Assessment tool to meet Everton FC’s specific requirements.
Above the Line Security have improved the safety of their at-risk employees by switching from a manual call-in system to the user-friendly StaySafe lone worker solution. Employees at Above the Line Security are responsible for guarding individuals and high-value equipment on busy film sites. Ensuring employee safety StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map Prone to theft and coming into contact with potentially volatile paparazzi and members of the public, the company required a more reliable way of monitoring the safety of their guards. StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map. Monitors are alerted if an employee triggers an alert or fails to check-in on the app during their shift. StaySafe StaySafe also provides the ability for an alert to be raised even during difficult situations. If engaged in a confrontation, a panic can be sent discreetly, or a duress PIN entered if the app is discovered by the aggressor. Missed check-in alerts will also alert a monitor in cases where the lone worker may be unable to send a panic themselves. “Having used an app for the first time to protect our lone workers, we were incredibly impressed by the ease and agility of set up and usability. Our employees have adapted quickly to using the app whenever they work and as they do not always come to the office, it allows them to set up for the day quickly and independently.” Lone workers’ safety Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out" Adele O’ Toole at Above the Line, continues; “Previously, we had to rely on night supervisors based in external locations to take check-in and emergency calls manually. This proved expensive and disconnected, particularly if our lone workers were situated in areas of low signal where making contact to ensure their safety was infrequent and unreliable. With StaySafe, we are able to instantly locate our workers on a map once they have checked-in, even in areas of low signal, saving us a lot of time and human resources.” Don Cameron, CEO at StaySafe adds; “Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out. They often protect valuable assets which leads to the potential risk of theft and aggression. StaySafe provides peace of mind for the lone workers and the business by providing an effective and reliable solution for a range of volatile situations. Organisations can see exactly where their staff are in the case of an emergency and can send assistance directly to them – all with the added bonus of being user-friendly and cost-effective, only requiring a mobile phone.”
Traka has been specified at a main UK international Airport to deliver bespoke solutions for the safe management of replica improvised explosive devices (IEDs), alongside intelligent key management systems. The UK airport, which cannot be named for security reasons, uses replica IEDs for training purposes across its security network, to ensure correct procedures are being followed in the unfortunate event of a real threat. Security management using replica IEDs The importance of secure management of replica IEDs is integral, with recent well-publicised events having shown the major disruption caused by any unaccounted items, including an abandonment of the last game of the season for Manchester United in 2016. Traka, which already provides the airport with essential intelligent key management units, created a bespoke management locker solution for the safe storage of replica IEDs on site, to ensure they could only be operated by authorised personnel. The units present audit control capability and reporting on an instant basis with any units that do not get returned being instantly accountable. To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole" Intelligent key management Says a Security Manager at the Airport, “To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole, with a real possibility of closure and consequential mass disruption.” “With increasing numbers of passengers and noted global security threats, we cannot afford to take the risk and knew Traka could be called upon as the experts to provide a solution. The lockers not only provide an extra security dimension, but also ensure the smooth running of the Airport security. They enhance our training objectives as the audit control capability allows replica IEDs to be used across terminal staff, safe in the knowledge they will always be accounted for and returned.” The lockers support the Airport’s use of Traka solutions for intelligent key management Asset and vehicle tracking The lockers support the Airport’s use of Traka solutions for intelligent key management for security and engineering keys, alongside asset and vehicle control. Ben Farrar, Traka Market Development Manager added, “It is the focus of every Airport to deliver the best possible experience for passengers, while ensuring their absolute safety and security at all times. And in doing so, ensure staff can present all processes in a smooth and stress-free environment.” “Traka’s provision of bespoke locker solutions for the safekeeping of replica IEDs, alongside our intelligent key management systems as used by this Airport may only seem like smaller details in a complex security matrix. But they work together for the benefit of security teams to ensure effective management and automation, decreasing the likelihood of causing delays and disrupting the airport flow unnecessarily.”
The saying goes that “business is business,” but many experienced executives in this industry have come to learn that a few ounces of compassion and understanding can sometimes be both necessary and appreciated. Operations don't always go as planned; we know that uncontrollable, tragic incidents may occur, and we want to be sure we're there for our customers and partners when they need it the most. This time of need often presents itself during a significant crisis, such as the one Puerto Rico experienced and continues to face from the devastation of two major hurricanes in September 2017. Hurricane Maria, which made landfall on Sept. 20, and was considered a “catastrophic event,” brought intense rain and wind to the island for longer than 30 hours, leaving residents without power, communication and water. TimeQuest reconfigures access control solutions Vanderbilt dealer TimeQuest Technologies, located in San Juan, was forced to suspend active projects and focus all resources on recovery The destruction and damage to roads, communities and businesses changed the lives of almost everyone involved — with the inability to access supermarkets, banks and gas stations, daily tasks were severely interrupted, and so too were security activities. Vanderbilt dealer TimeQuest Technologies, located in San Juan, was forced to suspend active projects and focus all resources on recovery. With its customers' having lost everything and their buildings destroyed, TimeQuest Technologies Vice President Alberto Cupeles took his team to visit each in person, surveying the need for basic necessities and offering their assistance. As its customers started to begin construction in the aftermath, TimeQuest Technologies was forced to reconfigure and reconstruct its access control systems, software and solutions, while trying to adjust to a shift in electricity and combatting inconsistent power from day to day. Vanderbilt-TimeQuest collaborate on disaster relief Having known Vanderbilt for more than 20 years, Cupeles was grateful for the trustworthy and sympathetic relationship that had developed over time, extending far beyond daily business operations. Both companies worked together to ensure overarching support and commitment to restoration, allowing TimeQuest Technologies to spend its time and effort where it was needed most. “The help we received helped not just our customers but also our families,” Cupeles said. “This wasn't just a business-only situation. There were people in the middle.” Collaborations in the security industry often run deeper than what's seen on the surface; when dealing with an unexpected occurrence, at the end of the day, providing comfort and consideration should always take precedence.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced that Panda Restaurant Group, Inc. (parent of Panda Express, Panda Inn, and Hibachi-San) has completed deployment of 3xLOGIC’s VIGIL Trends Business Intelligence software to all of its North American locations. Interface Security Systems, headquartered in St. Louis, Missouri, is the integrator and overall project manager for this ambitious endeavour. Panda Express is the largest family-owned restaurant in America, with more than 2,000 stores globally, 35,000 associates and $3 billion in sales. Since it was established in 1983, Panda has steadily grown with roughly 125 stores opening each year. Privately owned and operated, the restaurant is guided by the core values of its co-founders and co-CEO, Andrew and Peggy Cherng and is dedicated to developing its team members and giving back to the community. As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems Business intelligence solution “As an industry leader, Panda Express’s culture sets an expectation of best-in-class results,” explained Lyle Forcum, executive director of asset protection at Panda Express. “Accordingly, we needed a state-of-the-art business intelligence solution to provide us with truly actionable information. Intelligence we can act on is central to Panda’s business strategy, which focuses on meeting high standards through continuous operational improvement.” Starting in August 2017, 3xLOGIC and Interface Systems worked with Panda Express to customise Trends to meet the company’s unique, comprehensive needs. Interface began system deployment in QI 2018 with the first location going live in March 2018. As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems. Integration with intrusion and video systems “It was impressive that we were able to integrate Trends so seamlessly with existing intrusion and video systems,” said Sean Foley, senior vice president of national accounts at Interface Systems, “and the entire solution was rolled out without a single technician visiting any store.” Unlike many retail BI implementations, the focus at Panda Restaurant Group is not solely on loss prevention, but also on tracking and improving all operations at every store. Here are some of the key elements of store operations that Trends enables Panda to monitor, track, and improve: Trends provides intrusion data, which shows when stores are opened and closed, deliveries are made, and whether the store is being remotely armed and disarmed People Development. To set its people up for success, store managers are able to review all transactional behaviour and address opportunity areas with employees within two days. Comparing Store Performance. The store managers’ Trends dashboard shows very clearly how the restaurant is performing compared to other stores in the region and to their prior month’s performance. Optimising Store Efficiency. Trends visually displays how many people are working per hour, what job they are facilitating, and the revenue generated per hour. Monitoring Intrusion Data. Trends provides intrusion data, which shows in a very simple display when stores are opened and closed, deliveries are made, cleaning is done, and whether the store is being remotely armed and disarmed. Tracking Cash. Panda Express can track currency, how much is in the safe and when it was last counted, as well as petty cash spend along with scanned receipts for purchases. Custom Dashboards. The system provides an array of dashboards for all levels in the organisation that give an at-a-glance or drilled-down overview of an employee’s priorities and responsibilities. “At Panda, safety and loss prevention are key priorities in executing great operations,” said Lyle Forcum, executive director of asset protection at Panda Express. “We worked with 3xLOGIC and Interface for over a year to implement a highly-customised solution to meet these priorities. Now, we have a cutting-edge tool deployed across the entire enterprise that we can all be proud of.”
One of the UK’s largest video surveillance projects in recent years involving the deployment of 845 Wisenet cameras manufactured by Hanwha Techwin, is nearing completion. The video surveillance system, which is designed to play an important role in helping ensure the safe and reliable delivery of public transport across the West Midlands, is being used to monitor activity at over 50 railway stations, 11 bus stations, 3 Midland Metro park and ride sites, as well as the main Number 11 bus route around the City of Birmingham. Live and recorded images from all cameras are being monitored at an advanced control room, located in central Birmingham Wisenet HD IP camera integration The project which is targeted for completion in July 2018 has so far seen approximately 845 Wisenet cameras installed by Total Integrated Solutions Ltd. (TIS) on behalf of Transport for West Midlands which was set up by the West Midlands Combined Authority (WMCA) to co-ordinate investment needed to improve the region’s transport infrastructure. The remaining work includes the deployment of the latest generation of Wisenet high definition IP cameras at a number of car parks, together with significant camera upgrades in Walsall and Solihull, two of four Local Authority public space CCTV systems are already monitored by WMCA. Live and recorded images from all the cameras are being monitored at a £1.2M state-of-the-art control room located in central Birmingham. “Our approach to this very large, complex project was not simply one of agreeing to meet exacting KPI’s from a performance perspective,” said Eamonn Murphy, Coleshill based TIS’s key account manager. “We felt the route to success would be to adopt a more partnership type approach, where we were not only the provider of technical solutions but were also involved at a strategic level in identifying with Transport for West Midlands a pathway of system upgrade, improved efficiency, cost reduction, innovation and utilising latest technology such as video analytics to the best advantage.” TIS is assured seamless integration between Wisenet cameras and Veracity Coldstore ‘direct to storage’ solution Wisenet cameras & Veracity Coldstore solutions Transport for West Midlands evaluated cameras available from 9 different manufacturers. The subsequent decision to source all the cameras from Hanwha Techwin, (previously known as Samsung Techwin), was partly due to the price/performance ratio of its cameras, but there were two other important factors which were taken into consideration. Firstly, Hanwha Techwin has a close working relationship with its technology partner, Veracity. This meant TIS could be assured that there would be seamless integration between Wisenet cameras and the Veracity Coldstore ‘direct to storage’ solution. This negates the need for Network Video Recorders (NVRs) and thereby substantially reduces capital costs, as well as minimising setup and maintenance requirements. Open Platform cameras The Veracity Coldstore recording solution is unique in the linear way that data is written to the hard drives. Only 2 hard drives are spinning at any one time, meaning a significant reduction in power consumption, lower heat generation and greater longevity of the hard drives, reducing the overall cost of ownership. When drive failures do occur, the faulty drive can be swapped with a new drive allowing uninterrupted use. The second important factor was the capability of the Wisenet open platform cameras to accommodate a variety of edge-based analytics such as ANPR and heat mapping, should Transport for West Midlands wish to deploy these at some point in the future. Trials of the Wisenet People Counting application are currently being carried out. This utilises the analytics software developed by Facit Data Systems, another Hanwha Techwin technology partner. Wisenet SNP-6320H cameras are configured for the transmission of 25 images per second (ips) at 1080p resolution Intelligent Day/Night cameras A large percentage of the cameras installed are Wisenet SNP-6320H 2 Megapixel Full HD network PTZ dome cameras. In addition to being a true Day/Night camera which is able to capture high quality images in low light, the SNP-6320H’s powerful 32 x zoom capability enables operators to observe the close-up detail of any activity. Trials were conducted where the cameras were capped at 2 Mbps and configured for the transmission of 25 images per second (ips) at 1080p resolution. The performance at this low bandwidth level was impressive and further contributed to the selection of the Wisenet SNP-6320H, which are also equipped with intelligent auto-tracking capability to ensure a greater level of detail can be captured when no operator is present. Other Wisenet cameras deployed as part of the project include the SNV-6084R vandal-resistant IR dome and the SNB-6004 fixed camera, both of which are able to capture Full HD 2 Megapixel images. Video Surveillance Technology “Working on rail, Metro and bus station sites spread across the wider West Midlands area is a complex and challenging operation and the TIS team deserve recognition for its expertise and diligence,” said Mark Babington, Safety & Security Manager for Transport for West Midlands. Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment" “TIS’s engineers were qualified to the highest degree to support the latest video surveillance technology, as well as being experienced to cope with older legacy systems. Both were needed within the unique environment of a busy integrated transportation network which brings its own exceptional requirements of compliance with bespoke health and safety legislation.” “Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment in the West Midlands transport infrastructure.” Commenting on the success of the project, Bob (H.Y.) Hwang Ph.D., Managing Director, Hanwha Techwin Europe, said: “We greatly value the opportunity to have been involved in this project. It is a excellent example of the benefit of all stakeholders interacting with each other in partnership at an early stage of a project to ensure the most suitable products are specified and subsequently installed to the client’s satisfaction.”