The physical security specialist, Technocover, has successfully passed its annual Achilles UVDB (Utilities Vendor Database) verify audit, achieving 100% across all assessment categories. The company’s management and onsite operations were subject to two days of detailed inspection by Achilles auditors in gaining registration to Verify Category B2. Achilles UVDB Verify is a rigorous pre-qualification scheme for the UK utilities sector, which assesses organisations against high standards of...
In large-scene applications, it is difficult for a panoramic surveillance equipment to acquire real-time round-the-clock data due to a lot of factors such as blind spots, aperture limitation, fixed monitoring scene, etc. Aiming to solve these common problems that most general panoramic equipment are facing, Dahua Technology, a video-centric smart IoT solution and service provider, launches its new Hunter SDT5X Series Camera to bring more benefits to its users. Featuring smart tracking, perimete...
PPSS Group's next generation of high-performance body armour is taking personal protection to a completely new-found level. Made from Auxilam, a unique carbon fibre composite material, this latest body armour will protect the wearer from even the most vicious and brutal types of edged weapon and shanks imaginable. Utilising a combination of the incredible strength of carbon fibre, the auxetic properties of Auxilam technology and some additional ‘top secret’ assets derived from the s...
Check Point has extended the capabilities of its CloudGuard cloud security platform to support Kubernetes computing services, including Amazon Elastic Kubernetes Service (Amazon EKS) and Amazon Elastic Container Service (Amazon ECS). CloudGuard also delivers additional security capabilities for Amazon Web Services (AWS) Serverless computing solutions, including AWS Lambda and related services like AWS Fargate, Amazon API Gateway, Amazon DynamoDB, and Amazon Kinesis. The announcement further del...
Site security specialist, Safer Scotland is celebrating a double victory at this year’s business awards run by the Renfrewshire Chamber of Commerce. Paisley-based Safer Scotland, headed by founder and managing director Ryan Clark, made it to the shortlist in two categories of the 2019 ROCCOs Business Awards and secured the top accolade in both. Held on November 15 at the Normandy Hotel, the ROCCOs are the largest business event in Renfrewshire and rank among the top corporate events in Sc...
Panasonic Security Systems, a business unit of the newly formed Panasonic i-PRO Sensing Solutions Co., Ltd., is showcasing its impressive solutions capabilities at ISC East 2019, booth #435 at the Javits Centre. By combining superior imaging technologies with new AI-driven software and analytics solutions, Panasonic i-PRO Security Systems offers comprehensive, customisable solutions to meet the most diverse range of users’ specific needs. Core solutions on display include the company&rsq...
Milestone Systems has announced releasing the troubleshooting assistant for partners and customers using Milestone XProtect video solutions. Video management systems today are not only used to protect people and assets, but also to help optimise businesses and improve the way people live and work. Milestone open platform VMS Milestone Systems’ open platform video management software (VMS) makes these innovations easily available to a wide range of integrator, consultant, and end-user customers. As a result, more and more businesses and people may need support to maintain, upgrade, and operate their XProtect system. Fortunately, the troubleshooting assistant is now available 24/7 to help users resolve issues and optimise their systems. This complimentary new online tool is a helpful addition to existing Milestone eLearning troubleshooting courses, Knowledge Base articles, and robust User Forum Milestone Troubleshooting Assistant The Milestone Troubleshooting Assistant is a self-help online tool that enables XProtect users to identify causes of issues and guides them through a step-by-step resolution. The Milestone trouble-shooting assistant is an interactive decision tree that provides support in maintaining, upgrading, and troubleshooting many common issues, such as: Being unable to log into the Smart Client Being unable to add a camera Having server performance issues The guide leads users through a branching process where one can select answers to questions that become progressively more specific to their issue. The assistant leverages and compliments the Milestone Knowledge Base articles, User Forum, and more. Accessible with Milestone Support Page The Troubleshooting Assistant is available online, and is also accessible through the Milestone Support Page. Milestone will regularly update the troubleshooting assistant and add more guides to address additional issues as needed.
Rhombus Systems, a provider of enterprise cloud-managed physical security solutions, announces a suite of new sensors - asset tags, door sensors, environmental sensors – to transform how organisations manage their physical security. The new sensors are battery operated and use the Rhombus security cameras as a local intelligence hub to capture sensor events, corresponding video footage, and data of the physical environment. By seamlessly combining enterprise video security with IoT sensors, organisations can simplify their physical security infrastructure, gather more actionable insights, and better secure their workplaces all from a single console wherever they happen to be. Physical security software tools This innovative approach means that organisations no longer need multiple, siloed consoles to manage different enterprise IoT sensors. Now - all sensors, data collected by the sensors, and video footage - can be remotely accessed and managed from one console and work in unison. All of the data captured by the sensors and cameras work together to deliver a unique experience For example, if you attach an asset tag to a valuable tool on a construction site, you not only can see where the tool is located, but you can also see its movement patterns and even receive an alert for when that tool goes missing. All of the data captured by the sensors and cameras work together to deliver a unique experience rarely seen in physical security software tools. A versatile solution for physical security “Existing systems for securing and managing physical spaces are woefully outdated and underserved,” said Omar Khan, Rhombus Systems Co-founder and CTO. “By leveraging our AI security cameras, we’re able to pair video with IoT sensors to provide a more advanced and versatile solution for physical security. There’s a huge opportunity to completely reinvent this space, and we’re on a mission to do just that.” The Rhombus sensors are managed through a web console or mobile device and are plug-and-play – meaning they can be set up, taken down, and moved in minutes – and have a battery life of up to 2 years with a single coin cell battery. The asset tag can be attached to any object to track and issue alerts when valuable items enter or leave an organisation. Monitoring the temperature and humidity of a space The Door Sensor features a built-in accelerometer and can be attached to any door or entry point to issue alerts when an entry point is opened or left open. The Environmental Sensor monitors the temperature and humidity of a space and issue alerts when certain environmental parameters are surpassed. “We’ve been working with Rhombus for years and are continually impressed with the quality of their products and speed of innovation. It’s hands down the best video security solution we’ve ever used,” said Arik Levy, Luxer One CEO. “We have thousands of Rhombus cameras deployed, and with the new sensors, their platform is going to be game-changing for us. We’re already envisioning the different ways we can add these into our operations.” Full end-to-end encryption The sensors automatically communicate with Rhombus’s R2 cameras The sensors automatically communicate with Rhombus’s R2 cameras meaning no other gateways or network gear is required to set them up. The sensors benefit from the same great infrastructure as the security cameras giving organisations full end-to-end encryption, automatic firmware and software updates, modern cloud management, and a 5-year warranty as standard with the service. The asset tag, door sensor, and environmental sensor will be available in January and will start at $49 plus an annual software subscription. Feature highlights of the Rhombus platform include: Plug-and-play sensors and cameras that can be set up, taken down, and moved in a matter of minutes for unique scalability and flexibility compared to existing options Cloud management, allowing users to securely access their system from any computer or mobile device Rhombus AI and Computer Vision for advanced facial recognition, people analytics, and custom alerts End-to-end encryption for enterprise-grade system security Automatic firmware and software updates to ensure the system is kept up to date with the latest technology IT Integrations with an organisation’s technology stack, such as single sign-on (SSO), Office 365, and Slack
ReconaSense, a next-gen physical security intelligence and access control company, has announced the beta launch of its Rapid Install Wizard, a new software tool for integrators that reduces the time-intensive configuration of access control projects using Mercury controllers by 50% or more. Deploying Access control systems Deploying and configuring access control systems is typically a manual, error-prone process for integrators who must physically locate each onsite controller and input different parameters and thresholds for each controller, door, and reader. In large dynamic environments such as airports, hospitals, and manufacturing facilities, this can be a daunting and costly task — particularly when upgrading legacy implementations in existing facilities. Rapid Install Wizard Rapid Install Wizard detects all controllers, cameras, and IP devices connected to a network Instead, the Rapid Install Wizard detects and incorporates all controllers, cameras, and IP devices connected to a network and offers pre-defined templates that should be applied to those devices. This expedites system deployment and configuration for installation teams while eliminating the burden of setting industry standard thresholds per door. The goal of the new tool is to trim installation efforts from weeks to days, and configuration time from days to hours, enabling integrators to save time and money for themselves as well as their clients. Installation and commissioning of Mercury controllers “ReconaSense is using new software tools to simplify integrator best practices for the installation and commissioning of Mercury controllers,” said Clayton Brown, executive vice president of ReconaSense. He adds, “This reduces time, cost, and error from every access control project by orders of magnitude. More or less, we believe this will allow our partners to upgrade two projects in the time it currently takes to finish one.” ReconAccess intelligent access control solution ReconAccess is the first intelligent access control solution that leverages analytics to measure the real-time evolving risk of individuals, assets and environments, while automatically adjusting access permissions and delivering actionable guidance to help avert potential threats or disasters. The Rapid Install Wizard will be demonstrated at ISC East, Nov. 20-21, 2019 in New York City, at Booth #524.
BIRD Aerosystems, global developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information and Observation (ASIO) solutions, will present its MACS (NG) Sensor and the SPREOS DIRCM, at DSEI Japan. The systems will be presented for the first time in Japan together with NTK International in booth number B321. Missile Approach Confirmation Sensor With an open architecture and an ability to connect to any missile warning system, passive or active, both the MACS (NG) Sensor and the SPREOS DIRCM can be supplied as an add-on solution for any existing airborne protection system and any platform. Easily installed, robust and with virtually zero false alarms, BIRD's MACS and SPREOS provide the most enhanced protection for military and civilian aircraft against the growing threat of MANPADS. MACS sensor performs confirmation of incoming missile threats detected by the main electro-optical passive sensors MACS (Missile Approach Confirmation Sensor) sensor performs unique confirmation of suspected incoming missile threats detected by the main electro-optical passive sensors, and ensures zero false alarms - hence only real missiles will be declared by the system and reacted upon. Self Protection Radar Electro-Optic System DIRCM SPREOS (Self Protection Radar Electro-Optic System) DIRCM combines a radar-based confirmation sensor and an active laser jammer to ensure optimal protection against different MANPADS threat types. Compact and Lightweight, SPREOS uniquely performs multiple functions, including threat detection and confirmation, tracking and jamming of advanced IR guided missiles. Ronen Factor, Co-Chief Executive Officer and Founder at BIRD Aerosystems, said "We are proud to present our innovative airborne missile protection solutions in Japan for the first time, and believe that both the MACS (NG) sensor and the SPREOS DIRCM are ideal for the Japanese – as they can be provided as an add-on solution for any existing MWS, and ensure enhanced protection against MANPADS, which are a growing threat. With an open architecture, simple installation and a compact size, BIRD's patented airborne missile protection solutions offer enhanced platform protection with practically zero false alarms."
Vaion is proud to announce the general availability of its innovative Vaion vcore video management system at the upcoming ISC East 2019 event in New York. Designed with scalability in mind, Vaion vcore is a proactive solution that allows threats to be detected and addressed as incidents unfold. This is made possible through the use of a new neural network that mimics the human brain’s ability to recognise patterns and categorise images. Vaion vcore is equipped with integrated machine learning capabilities that analyse all video feed from all standards-based cameras in real-time. The system monitors and understands behaviours; identifies, classifies, and tracks people, vehicles, and other objects of interest; and sends alerts before threats escalate. Vaion vcore video management system Vaion vcore is enhanced with a range of advanced features that make the system scalable, secure, and easy to useVaion vcore is enhanced with a range of advanced features that make the system scalable, secure, and easy to use, covering a wide range of enterprise security needs. The system can work with third-party cameras or be further optimised with the suite of specialised Vaion cameras, available in January 2020. Vaion’s complete enterprise security solution will allow organisations to leverage additional features, including directional audio analytics and advanced cybersecurity features. Vaion vcore enables a proactive approach with the Spotlight capability that changes video feeds dynamically and sends real-time alerts and notifications based on predefined rules and detection of unusual activity. Instead of merely investigating incidents, organisations can take the necessary steps to prevent them. Vaion Smart Search As events occur, Vaion’s Smart Search allows operators to conduct forensic analysis and build case files in minutes versus the hours, days, weeks of traditional VMS platforms. Also, Vaion vcore’s unique Map view with Smart Presence provides people and vehicle tracking and counting, as well as camera and alarm views, giving operators detailed situational awareness and advanced operational benefits. “Vaion’s impressive vcore software includes all the features you would expect in a legacy VMS platform. However, the embedded artificial intelligence provides immense insight with people/object/vehicle detection, anomalies, presence-based maps, and fast/scalable similarity searches. End-users will realise operational benefits of the Vaion platform beyond the improvements to security operations and focused situational awareness.” — Michael Miller, President and CTO, TWG Security Physical security In addition to Vaion vcore’s physical security features, the system is secure from the ground up to protect data and minimise the risk of breaches. This is achieved by end-to-end encryption and digitally-signed files for secure export. Vaion vcloud allows operators to access the system remotely, manage complex deployments in a single platform Ease of use, simple deployment, remote access, link sharing, and license pooling is made possible with the Vaion vcloud connection. Vaion vcloud allows operators to access the system remotely, manage complex deployments in a single platform, and stay up to date with Vaion vcore upgrades and features. Cutting-edge video analytics and surveillance “Vaion harnesses the most advanced technologies out there to solve real problems security personnel really care about. We don’t just deliver an affordable state-of-the-art VMS based on decades of experience in the industry; we apply cutting-edge analytics on every video stream all the time to provide insightful and actionable information in real-time!” — Ran Pugach, Chief Product and Development Officer, Vaion. Come see Vaion demonstrate vcore in action with solutions to real-life scenarios at ISC East 2019, Booth #351. As a global company with offices in New York, London, and Oslo, Vaion is changing the traditional video security landscape with AI capabilities that make it easier for businesses and organisations to monitor their assets proactively. With embedded video and audio analytics powered by machine learning algorithms, intuitive installation processes, and a range of smart cameras, Vaion offers an end-to-end surveillance solution that helps companies detect threats in their earliest stages and perform fast, effective investigations with fewer resources.
As an innovator in certified physical security for asset protection, Technocover will be demonstrating the depth and breadth of its LPCB approved steel systems for the hardening of every type of site against unauthorised access. The Mid Wales-based expert in turnkey high security, including UltraSecure doors, access covers, enclosures, access control and accessories, will be participating in LPCB’s highly anticipated Live Lab over the two days of the show. Visitors will be able to view the engineered resistance of its products under simulated physical attack by LPCB’s certification test team. Technocover will be supplying compliant and non-compliant specimens of an LPCB SR3 (security rating 3) Sentinel Lite enclosure with side vents and cable entry cat-flap as part of the dramatic tests which replicate different levels of attack risk posed by criminals and their chosen tools. Physical security for industry More of the company’s product capability can be seen on stand H40 alongside leading brands within the HS Security portfolio of physical security for industry and the urban environment (part of Hill and Smith Holdings PLC). On show will be an example of an UltraSecure LPCB certified (SR4) mesh enclosure, whose modular design can be configured into large and complex secure enclosures for utilities, energy, transport, industrial and other sites. Equipment can be assembled offsite and lifted into position to overcome challenging site constraints Equipment can be assembled offsite and lifted into position to overcome challenging site constraints, speeding up installation in order to reduce downtime or even permitting the asset to remain live during the process. In addition, the Technocover ‘Tardis’ will showcase four LPCB approved doors, with security ratings 2, 3, 4 and 5, and a variety of LPCB certified accessories essential to ensuring the holistic performance of the door in line with its security rating. Asset protection Options on display include different types of entry and exit control, vision panels, door closers and vents among numerous accessories for adapting security provision to specific operational and location needs. The Technocover team will highlight the company’s Total Service approach to bespoke asset protection evolved over 25 years of designing, manufacturing and installing LPCB approved systems for critical infrastructure and the built environment. In line with the show’s theme of ‘Evolving Security Through innovation’, this specialised work demonstrates the company’s deep experience and ingenuity in resolving complex functionality within the scope of LPCB certification. Variations on the modular cage on show, for example, are solving growing demand for the secure containment of CBR (chemical, biological and radioactive) materials and controlled substances in laboratories, medical facilities, pharmacies, process and production sites. Protective cage and access system A recent project involved the design of a special protective cage and access system to secure a refrigerator and incubator within a university unit. Meeting the need for external visibility of the protected assets, Technocover designed and installed a five-sided cage system, tested and approved to LPCB SR4 (LPS 1175 Issue 7; cert no 450i). The company has just achieved an updated LPCB 450i certificate for a ‘Hybrid Case System’ with the options of solid panel construction, a removable roof, or sliding roof access hatch for even greater flexibility to meet operational needs.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorised parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorised personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilisers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernise legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organisations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organisations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organisation understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritised and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organisations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
March Networks, a video security and video-based business intelligence provider, announces that the rapidly growing U.S. convenience store chain Yesway has selected its Searchlight for Retail solution for advanced video surveillance and analytics. Yesway is currently deploying March Networks Searchlight for Retail in 136 locations across Iowa, Kansas, Oklahoma, Missouri, Texas, Nebraska, New Mexico, South Dakota and Wyoming. The c-store chain, which is operated by an affiliate of Brookwood Financial Partners, LLC, is expanding across the U.S. and plans to standardise on March Networks as it moves forward. Asset protection investigations Brandon Pohlman, Yesway Safety & Asset Protection Manager, said the company selected Searchlight for its scalability and centralised management features as well as its powerful exception-based reporting capabilities. Through its combination of high-quality video surveillance, point-of-sale (POS) transaction data and analytics, Searchlight helps Yesway visually monitor operations at all of its sites and quickly analyse transaction data for anomalies. “Having our video surveillance, POS data and analytics together on one easy-to-use platform is a huge advantage for Yesway,” said Pohlman. Using the software, the c-store can rapidly search and sort all of its transactions and match them with corresponding video clips. The company can also group higher-risk transaction types like refunds and assign risk factors to its stores based on the number of these transactions. “The insights uncovered by Searchlight have helped Yesway reduce its shrink levels and improve the speed and efficiency of asset protection investigations,” Pohlman said. Advanced system management software Yesway is also deploying March Networks 8000 Series Hybrid NVRs for reliable video recording In addition to asset protection, Searchlight also delivers valuable business intelligence through the integration of video analytics including people counting, queue length and dwell time. Several different Yesway departments use Searchlight’s information to monitor operations, merchandising and customer service across the organisation. Iverify, a full-service interactive security company and March Networks certified partner, managed the Yesway installation. Marty Brakel, Iverify National Account Manager, said March Networks’ products are ideal for the c-store market. “March Networks Searchlight is a professional-grade solution for customers like Yesway that need robust loss prevention tools and the ability to manage hundreds of locations simultaneously,” said Brakel. In addition to Searchlight, Yesway is also deploying March Networks 8000 Series Hybrid NVRs for reliable video recording, and March Networks SE2 Series IP Cameras for high-quality video capture. It is managing the solution with March Networks Command Enterprise, advanced system management software that simplifies multi-site video management. Improve customer satisfaction “With March Networks’ complete solution for c-stores, organisations like Yesway can cut losses and improve customer satisfaction as well as operational efficiency,” said Net Payne, Chief Sales & Marketing Officer, March Networks. "Because Searchlight is also available as a hosted service, c-stores and other retailers can enjoy all the benefits of this powerful solution for a low monthly fee. They can have peace of mind knowing that March Networks’ trained professionals are monitoring and maintaining the health of the video system on their behalf.”
Traka’s innovative key and equipment management solutions have been installed at a new national distribution centre for a top four UK supermarket. The new distribution centre, fulfils orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centres are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorised personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centres are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorised colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organisations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorised ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Ensuring safety and security of all who work and experience award-winning cruise facilities, a leisure travel company has secured key management across its fleet with Traka. The integration sees Traka specialist key management systems integrated into a complete fleet, ensuring compliance to the Cruise Vessel Security and Safety Act 2010 (Kerry Bill) in allowing only authorised staff access to dedicated areas on a bespoke curfew management system. Bespoke key management The number of ocean cruises taken last year reached over two million for the first time" Speaking about the integration, a representative from the cruise company said: “Cruise holidays are undeniably growing in popularity, as they give our guests the opportunity to experience being on board a floating city. For the UK and Irish market, the number of ocean cruises taken last year reached over two million for the first time, hitting a record 2,009,000 in 2018." “We have a necessary duty of care to ensure the high level of security and protection of our guests throughout their stay on any one of our luxury ships. Traka designed a bespoke key management solution that was simple to integrate and minimise interference with everyday operations to ensure not only compliance to cruise security but also an ability to capture audit control on every key in operation amongst our staff.” Cruise management platform “Together we believe this is a key step to improve ship safety and provide transparency and consistency, alongside dedicated accountability amongst all our staff. And in partnership, we can create an environment whereby guests can enjoy excellent standards of service throughout their stay on any one of our award-winning fleet.” “Traka worked closely with the technical team to install S-Touch key management systems across its fleets, with bespoke solutions designed per cruise facility. The dedicated curfew management feature integrated into each system can be set on any key, enforcing staff to return keys by a certain time, with an alert created on any asset that is not back in the allocated timeslot.” The result is improved productivity with lower collection and distribution time on staff handover" “The result is improved productivity with lower collection and distribution time on staff handover. And by integrating systems into the cruise management platform, even loggings could be specified on environmental and sustainability credentials in an innovative bid towards showcasing ‘green cruising.” Significant cruise community Ben Farrar, Traka Market Development Manager added: “Cruise ships are undeniably experiencing a booming market, with increased staff and fleets to accommodate demand. But within this, leading corporations have a role to play in highlighting the significance of compliance to the latest cruise regulation and guest safety.” “Traka created a bespoke system, enabling this prestigious fleet to benefit from essential security, including an ability to support authorised staff to control access to different areas, whether it be stock-taking or environmental control. We are looking forward to continuing our relationship to present various technical innovations and ensure even increased customer satisfaction across a significant cruise community.”
Delta Scientific, globally renowned manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, has announced that its innovative DSC1000 portable barrier and TB100 portable bollard systems were rented from Australian-based Knight Brothers to help protect the 85,000 entrants in the world's largest run on 11 August. Both a fun run and a competitive contest, the City2Surf Run covers a 14 kilometers (8.7 miles) course that begins in Sydney's Central Business District (CBD) and culminates at scenic Bondi Beach. Vehicle access and control system This annual event needs a vehicle access and control system that can be deployed temporarily and quickly" "This annual event needs a vehicle access and control system that can be deployed temporarily and quickly to secure vehicle check points into the main event area for the mobilisation, execution and demobilisation phases," explains Matthew Knight, director of Knight Brothers Pty Ltd, Australian partner of Delta Scientific. Knight adds, "At the same time, they did not want to purchase units that would only be used once a year. For such applications, a lease plan has been created where organisations can simply lease the portable barriers and bollards, use them, pack them up and return them." DSC1000 portable barrier system "Pre-packed in a 20 foot container, the DSC1000 barrier and TB100 bollard array package was delivered to site and deployed within an hour to provide effective perimeter protection whilst maintaining the required pedestrian and vehicle thoroughfares into the event grounds." The DSC1000 is a self-contained unit that is stored and towed on its own trailer. Light enough to be pulled by a golf cart and set up in only 10 minutes, the DSC1000 portable barrier's crash test stopped a 2300 kg vehicle going 64 km/p, providing it with an ASTM rating of P40. With no foundation or electrical hook-up needed, two people can set up and take down the DSC1000 special event barrier. TB100 portable bollard system The patent pending crash rated TB100 portable bollard system lets security providers promptly block access to temporary venues. Individual portable bollards provide vehicle safety in applications such as heavily traveled narrow walkways and roadways or any area that a vehicle can get through. Certified testing demonstrates that a TB100 portable bollard system will stop and disable a 6,804 kg vehicle traveling at 48 kph, resulting in an ASTM M30, P3 rating. A single TB100 bollard absorbs 400,000 foot pounds of kinetic energy.
EchoGuard receives FCC Equipment Authorisation allowing widespread deployment of the radar for security, surveillance, and airspace management applications. EchoGuard radar Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces that it has received approval from the FCC for widespread deployment of its EchoGuard radar for radiolocation and radionavigation in the United States. FCC Equipment Authorisation allows the radar to be used throughout the US for ground, airspace surveillance The FCC Equipment Authorisation allows the radar to be used throughout the United States for ground and airspace surveillance applications that detect and track potential security threats with high accuracy and for ground-based airspace management applications that ensure safe navigation of commercial drone missions. Electronically Scanning Array radar Echodyne's innovative metamaterials technology and powerful software combine to create an electronically scanning array (ESA) radar in a compact, solid-state format at commercial price points for the very first time. The radar has been demonstrating award-winning performance for government, law enforcement, security, and UAS / UTM customers for some time via experimental licenses. "We are excited that EchoGuard has received this authorisation allowing its widespread adoption in the US," said Eben Frankenberg, CEO of Echodyne. "With the growing number of troubling drone incursions at airports, stadiums, and other facilities, there is tremendous demand for high-performance radar sensors. Tackling drone threats Eben adds, "Our innovative radar technology and software greatly increases the ability for security systems to accurately detect and track drone threats, as well as improves ground tracking of people, vehicles, and vessels. Our radar outperforms every other radar in its class, is priced for commercial markets, and has proven to be the best mid-range surveillance radar in the market." Features of the EchoGuard high-performance radar include: True electronic beam-steering with market-leading C-SWaP attributes; Long-range detection with high reliability and accurate tracking of multiple, concurrent air and ground targets; and Easy integration into sensor fusion and security systems for unmatched 3D situational awareness.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?