MSA Safety Incorporated, the global pioneer in the development, manufacture, and supply of safety products that protect people and facility infrastructures announced it has established a joint development agreement with Perspective Robotics AG of Zurich, Switzerland. Established in 2014, Perspective Robotics AG develops advanced situational awareness tools that utilise tethered drone technology for first responder applications under the brand name Fotokite. The two companies will co...
Motorola Solutions announced the newest addition to its video security and analytics portfolio, the Compass Decision Management System™ (Compass). Compass provides organisations with security intelligence that helps users prevent human error by outlining standard procedures, automating incident reporting, and highlighting key performance indicators to achieve effective and consistent outcomes. Real-time event response By enabling security managers to customize step-by-st...
Clare Controls, maker of the ClareOne wireless security and home automation system distributed exclusively by Snap One unveiled a range of new security solutions at ISC West 2021 in Booth #10053. Clare platform and products “Clare has changed the way home technology professionals install and manage security and smart home systems by creating an integrated ecosystem that meets the evolving needs of the market,” said Clint Choate, Snap One Security Market D...
Snap One, an industry source of A/V surveillance, control, networking, and remote management products for pros announced that it will demo a range of new products for security partners and conduct two high-value giveaways at ISC West Stand #10053. “The Snap One team is eager to physically meet with our Partners to demo the newest surveillance, smart home security control, power management, networking, and mounting solutions that can help them tackle more installs,” said Cl...
ConnectWise, the provider of business automation software for technology solution providers (TSPs), announces the launch of ConnectWise recover complete BDR, a comprehensive offering integrating multiple third-party backup vendors into the ConnectWise platform. With this offering, TSPs gain a powerful service management console to monitor and manage all their BDR solutions, reducing complexities like duplicated processes as well as significant management overhead. In addition, TSPs will be able...
The FLIR A500f and A700f Advanced Smart Sensor ruggedised thermal cameras feature high-temperature detection for extreme environments paired with on-camera analytics and alarm capabilities – ideal for industrial early fire detection or outdoor condition monitoring applications. Along with enhanced spot, area, line, polygon, and polyline analytic functions that improve the definition of areas of interest and object curvatures, the A500f/A700f can help commercial and industrial organization...
In the AIoT era, the world is getting smarter. Everything is going to have an online “ID” and then connected into a vast net of IoT devices, like a laptop computer, a mobile phone, a connected thermostat, or a network security camera. Cybersecurity in the AIoT era According to a Markets and Markets report, IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, currently, there are no unified global technical standards for IoT, especially in terms of communications. This results in inefficient data management and reduced interoperability mechanism and ultimately may cause reduced security in the IoT network. The global Internet of Things (IoT) security market size is expected to grow from USD 12.5 billion in 2020 to USD 36.6 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 23.9%. Importance of cybersecurity Various vertical industries store unprecedented amounts of data on devices like IP cameras and NVRs Dahua Technology, a video-centric smart IoT solution and service provider, believes cybersecurity is of vital strategic importance in the age of AIoT. In various vertical industries, such as traffic, banking & finance, hospital, and critical infrastructure, organisations collect, process, and store unprecedented amounts of data on devices like IP cameras and NVRs. A significant portion of that data can be sensitive or private information, which can be prone to cyber-attacks and the situation, is getting worse because there are more devices than people. As a security solution provider, Dahua Technology continuously invests in cybersecurity and actively copes with network security issues. Continuous investment & active coping Committed to becoming a leader in cybersecurity and privacy protection in the global security industry, Dahua Technology has been developing and exploiting cybersecurity for nearly 10 years. The company keeps investing about 10% of its annual sales revenue in R&D every year, including cybersecurity. In addition, the company put together a professional team of nearly 100 personnel to focus on cybersecurity issues. With rich experience and sufficient resources, Dahua Technology promises to be positive, open, cooperative, and responsible when it comes to cybersecurity. Dahua Technology cybersecurity approach 1. Organisational structure In order to achieve better efficiency and effectiveness, Dahua Technology operates a comprehensive system to cope with all cybersecurity-related issues. The system, led by the cybersecurity committee, also contains a cybersecurity & data protection compliance group, cybersecurity institute, and product security incident response team (PSIRT). The cybersecurity committee, above all departments or teams, can call resources from the whole company, from the R&D centre to the legal department, supply chain, overseas business department, etc. when necessary. Cybersecurity Institute is in charge of building the sSDLC process and implementing the process to all Dahua product series, making sure that all Dahua products are strong against cyberattacks. 2. Security development lifecycle Dahua adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security Dahua Technology adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security. During the security design phase, STRIDE + Attack Tree + PIA is adapted to improve threat modeling. During the security realisation phase, OWASP top 10 and over 150 CWEs are used to achieve static code analysis. During the security test phase, over 20 tools within 7 fields are applied to realise the multiple security testing. CompTIA PenTest+/Security+ are used to carry out professional penetration testing, while compliance ISO 30111&290147 and MITRE org CAN are followed during vulnerability management after the products are sold. 3. Emergency response system Cooperation with professionals from across the globe is a great way to improve vulnerability detection. Therefore, Dahua Cybersecurity Center (DHCC) is established to solve cybersecurity issues with security vulnerability reporting, announcement/notice, and cybersecurity knowledge sharing with our global customer base in order to provide them with more robust and secure products/solutions. Product Security Incident Response Team (PSIRT) is an integral part of DHCC. Composed of professionals ranging from marketing, supply chain, service, and legal representatives, PSIRT is responsible for receiving, processing, and disclosing Dahua product and solution-related security vulnerabilities. Team members are on duty 7 days a week and guarantee to respond to an emergency within 48 hours. End-user, partner, supplier, government agency, industry association, and independent researchers are encouraged to report potential risk or vulnerability to PSIRT by email. 4. Personal data & privacy protection Dahua Technology also attaches great importance to personal data & privacy protection. Complying with applicable laws and regulations such as EU’s General Data Protection Regulation, EDPB’s Guidelines on the concepts of controller and processor in the GDPR, ETSI EN 303645’s Cyber Security for Consumer Internet of Things: Baseline Requirements as well as US’s California Consumer Privacy Act, the company established the Personal Data & Privacy Protection Standard. The standard stipulates that privacy protection methods such as de-identification, data encryption, and systematic access control, privacy-friendly setting are fully adapted to the complete data life cycle all the way from the collection, transmitting, storage to sharing, copying, and deleting. In addition, working with world-renowned third-party institutions, Dahua Technology has received Protected Privacy IoT Product Certification and ETSI Certification from TÜV Rheinland, as well as ISO 27018 Certification and ISO 27701 Certification from BSI, which help demonstrating its capability in managing personal information and compliance with privacy regulations around the world. 5. Continuously iterating security baseline The security baseline built a security element layout of "AAA+CIA+P", a systematic protection framework Centered on the core principles of Security by Design and Security by Default, the Dahua security baseline initiative taps into product safety technology to provide users with adequate safety guarantees. Based on and practicing the security and privacy design principles, the security baseline builds a security element layout of "AAA+CIA+P", forming a systematic protection framework covering physical security, system security, application security, data security, network security, and privacy protection. 7 versions of baseline and 100+ principles have been developed to adapt Authentication, Authorisation, Audit, Confidentiality, Integrity, Availability, and Privacy protection deeply into the product quality assurance system, making sure that all Dahua products enjoy the factory default security. 6. Product security centre In order to help users clearly understand the security status and capabilities of the device, the product security centre will assist users to conveniently and quickly set up the right security configuration to suit the scenarios. General security capabilities include privacy protection (face occlusion, information hiding, etc.), video encryption, security alarm, trusted protection, CA certification management, key management service, attack defense, and so on. 7. Cybersecurity ecosystem Adhering to openness and cooperation, Dahua Technology keeps cooperating with international authoritative security institutions to jointly build a secure ecosystem. By rich & in-depth communicating and cooperation with institutions like TÜV Rheinland, BSI, DNV·GL, Intertek EWA-Canada, and bright sight security lab, the company stays advanced its security capabilities and systems. In a widely networked world of IoT, cybersecurity challenges are pretty much a universal sore spot for companies globally. Dahua Technology, in the business of keeping people safe, takes cybersecurity seriously from head to toe. With a mindset that emphasises cybersecurity and all the resources that it can allocate to establish, carry out and strengthen the cybersecurity approach, Dahua Technology plans to stay positive, open, responsible and improving for the matter of cybersecurity.
ASSA ABLOY Group brands Corbin Russwin and SARGENT announce the release of their highly anticipated premium bored lock that is certified to surpass ANSI/BHMA Grade 1 requirements, making it ideal for use in some of the most challenging environments. Marketed as the Corbin Russwin CLX3300 Series and SARGENT 10X Line, the lock offers superior vandalism resistance as evidenced when it successfully maintained egress in the face of more than 3,100 in-lb. locked lever torque – 2.6 times ANSI/BHMA requirements. Easy installation The lock chassis design supports all cylinder formats – from fixed to interchangeable core – to minimise user inventory stocking requirements. It is particularly suited to retrofit projects because it is not only easier and faster to install than other standard bored locks, it also incorporates fewer parts, which translates to less maintenance. Durable, impact resistance The bored lock incorporates a patent-pending push-turn button that adjusts to accommodate a door thickness “We are excited to offer our customers a bored lock that surpasses expectations for strength and durability in so many ways,” said Lori Brown, Locks Category Product Manager, ASSA ABLOY Opening Solutions. “When it comes to lever pull and sag, latch retraction, and vertical impact resistance, this lock consistently exceeds ANSI/BHMA A156.2 requirements – in some cases by as much as 20 times, so users can expect consistent performance for the life of the product.” Result of testing the locks The premium bored lock exhibited the following outcomes during ANSI/BHMA A156.2 testing: Maintained egress while withstanding 3,100 in-lb. locked lever torque (2.6x requirement) Prevented entry against 1,600 lbs. offset lever pull (8x requirement) Prevented entry against 100 vertical impacts (20x requirement) Maintained latch retraction under 100 lb. preload (2x requirement), ensuring consistent operation in warped doors In addition, independent return springs enabled the lock to exceed Grade 1 cycle requirements without lever sag. Push-turn button The premium bored lock is available in an array of finishes and a variety of decorative levers, so, when choosing a bored lock, architects and designers never have to sacrifice style for strength. In addition, it incorporates a patent-pending push-turn button that adjusts to accommodate door thickness. As an added measure, the innovative design of the push-turn button also effectively prevents damage that can occur if the button strikes a doorstop or wall. To uphold occupant health and wellness, an optional MicroShield® antimicrobial coating inhibits the growth of bacteria for the life of the product.
ReliaQuest, a global company in cyber security, announced the appointment of Kara Wilson to its Board of Directors and Alex Bender as its Chief Marketing Officer. “Providing world-class cyber security capabilities requires a world-class team, working together with the common goal of building trust and confidence for businesses of all sizes and sectors,” said Brian Murphy, ReliaQuest CEO and co-founder. “It is a great honour for me to bring both Kara and Alex on board during this exciting chapter for ReliaQuest, as their combined leadership and experience is already helping shape our future operations and strategy to best serve our customers and prospects across the globe.” Kara Wilson With more than 25 years of experience in driving go-to-market strategies for both large and medium companies and hyper-growth startups, Kara Wilson has played an integral role in growing some of the most influential technology companies, including Okta, FireEye, Rubrik, and Cisco. She also currently serves as a board member for a number of companies including Paychex, KnowBe4, OneStream, and OutSystems in conjunction with her Senior Advisor role at KKR & Co. Establishing company position “With over 70% of IT and security teams planning to budget for XDR over the next 6-12 months, ReliaQuest is uniquely positioned to transform this market,” said Wilson. “Providing a highly capable and essential cyber security solution is only half the battle - motivating people and establishing loyalty in a competitive market is the key differentiator and ReliaQuest got this right from the beginning. I look forward to my continued involvement in helping ReliaQuest scale its business.” Alex Bender Over his 20-year career, Alex Bender has established a track record of driving growth in both revenue and brand marketing for some of the most influential cyber brands including Tripwire, McAfee, Archer Technologies, RSA, and Mimecast (MIME) where he recently served as SVP of Global Marketing. In his new role, Bender will be spearheading ReliaQuest’s global brand and revenue marketing growth strategies as the organisation expands its operations to meet the industry’s increasing demand for unified extended detection and response (XDR) security solutions. Transforming Security “At ReliaQuest, we are delivering a unified detection, investigation, and response approach for top Fortune 1000 organisations that are transforming security operations by delivering the right data, from the right systems at the right time, making security teams more efficient and focused to take decisive action,” said Bender. “I am truly honoured to be joining ReliaQuest and working with an extremely talented team that is laser-focused on extending the company’s rapid growth trajectory as we build business resilience and security confidence on a global scale.”
Device Authority, a global front-runner in Identity and Access Management (IAM) for the Internet of Things (IoT), announced KeyScaler for Azure Sphere in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Azure Sphere brings together Microsoft’s expertise in cloud, software and silicon to provide a security foundation and connectivity to create intelligent secure products and accelerate the adoption of IoT at scale. Device Authority’s KeyScaler for Azure Sphere software platform has the ability to leverage this initial security foundation by enabling Azure Sphere devices to connect to KeyScaler and provide them with operational certificates to automate and secure device enrolment to the Azure IoT platform. Automate certificate management Device Authority continues to see an increase in the demand for security and management integrations with Microsoft Azure when customers are building and deploying their IoT strategy. KeyScaler for Azure Sphere has the required functionality to automate certificate management for Azure Sphere devices. These devices need to connect to different constituents including Microsoft and non-Microsoft assets in operations. KeyScaler is a key component in this ecosystem to extend the trust and automation and if required can support certificate-based authentication for any additional IoT applications. “We are delighted to launch our KeyScaler for Azure Sphere offering on Azure Marketplace today. We have worked closely with the Azure Sphere team to help solve their customer’s challenges with security lifecycle management, and now customers and partners can consume KeyScaler for Azure Sphere directly through Azure Marketplace as they develop their IoT projects,” said Darron Antill, CEO of Device Authority.
Alarm.com is connecting your car and home through its integrated security platform to help people stay informed about their vehicle’s status and unlock more home automation capabilities. Alarm.com Connected Car, developed in collaboration with vehicle telematics solutions pioneer CalAmp, offers all the benefits of a vehicle monitoring solution plus the unique benefit of deep integration with the Alarm.com smart home security system. Vehicle insights, notifications and home automation features are all accessible through one interface – the Alarm.com mobile app. “We’re excited to extend the technology and benefits of Alarm.com to include cars,” said Alarm.com Chief Product Officer Dan Kerzner. “Connected Car, like the rest of our offering, helps people monitor and manage the things they care about most on a unified platform with a seamless user experience. Adding cars is another step forward in our ongoing commitment to helping our partners improve the lives and safety of their customers.” About Connected Car Compatible with most cars manufactured since 1996, the Connected Car device plugs into a vehicle’s OBD-II port for easy self-installation, reducing the need for costly truck rolls to add the device. Connected Car uses a dedicated cellular connection and has a battery backup, so it communicates with the home system and end-user, even when the vehicle’s engine is off. With CalAmp’s telematics technology integrated with the solution, users can create rules so they receive Alarm.com notifications about specific vehicle details or activity, such as: Diagnostics and potential repairs (check engine light on, low battery or low fuel) Driving Behavior (sudden acceleration, hard braking, excessive speeding) Unexpected Movement (vehicle moves while the engine is off, indicating it may have been towed, crashed into, or stolen) Automated rules and reminders Connected Car trigger automation rules and reminders via user’s existing Alarm.com-powered smart home security system Vehicles with Connected Car installed can be added to a user’s existing Alarm.com-powered smart home security system to trigger automation rules and reminders using the vehicle’s location. For example, lights turn on and the temperature adjusts as a driver arrives home. Or, alerts are sent to a driver’s mobile device if they leave without closing the garage door or locking the front door of their home. Authority Statements “I love having my home and car connected through one system and the consistency of Connected Car,” said Taylor Proudfit, COO at Titan Alarm in Phoenix, Ariz. “It's always on and works really well with the Z-Wave rules that I created to turn on the lights when my car pulls into the driveway. This takes security technology to a whole different level.” “We are very excited to be partnering with Alarm.com,” said Jeff Gardner, President and CEO of CalAmp. “By integrating CalAmp’s innovative telematics technology, Alarm.com customers now have seamless access to real-time information that will improve driver safety, enhance vehicle security and allow customers to stay on top of vehicle maintenance needs.” Connected Car is available through authorised Alarm.com service providers in the U.S. and Canada as a standalone solution or add-on to an existing Alarm.com-powered system.
Exabeam, the security analytics and automation company, announced a partnership with Snowflake, the Data Cloud company, to augment Snowflake data lakes with Exabeam security analytics and automation. The partnership enables organisations to identify risks and respond swiftly to incidents across their entire business ecosystem. The COVID-19 pandemic has accelerated digital transformation, expediting the move to the cloud and increasing demand for improved productivity and efficacy through automation. Organisations can now quickly move data and security to the cloud by migrating to Snowflake Data Cloud and Exabeam SaaS Cloud. Automating workflow Security teams can quickly detect, investigate and respond to complex threats with the help of analytics and automation skills By adding the analytics and automation capabilities of Exabeam to the data stored within Snowflake, security teams can quickly and efficiently detect, investigate and respond to complex threats. The combination of both solutions advances an organisation’s security posture by automating the entire workflow from data collection through response, enabling fast and consistent outcomes. Cloud-based security analytics “With demand for cloud technology surging amid the shift to remote working, we proudly welcome Snowflake to our partner network,” said Adam Geller, Chief Product Officer, Exabeam. “Using the combination of the Exabeam Cloud Connector for Snowflake with Exabeam Advanced Analytics, joint customers can easily apply intelligence and automation capabilities to their data stored within Snowflake's platform. This addresses the increasing market need for cloud-based security analytics on third-party logs sent to Snowflake.” Identifying cyberthreats “Security data continues to grow in size and complexity, and a fragmented architecture keeps many organisations struggling to mobilise it for protecting the enterprise,” said Omer Singer, Head of Cybersecurity Strategy at Snowflake. “Snowflake’s unique architecture eliminates data silos, providing organisations a single scalable and cost-effective platform for all their data, while Exabeam’s security analytics adds intelligence and automation to strengthen an organisation’s ability to identify and respond to cyberthreats across subsidiaries, geographies and public cloud providers.” Case study In 2020, several large-scale corporate data breaches centered around compromised credentials of cloud-based data stores. In one example, more than 5 million guests of Marriott hotels were impacted when cybercriminals stole the login credentials of Marriott employees, likely through phishing or credential stuffing. The information was then used to siphon personal customer details such as birth dates, contact information, as well as hotel and airline loyalty program accounts. Technical integration Exabeam provides real-time mapping of logs stored within Snowflake and attributes all activity and behaviour to users and devices Combining Exabeam’s security analytics with Snowflake’s data platform can provide protection against credential-based attacks, including insider threats. The technical integration between the Exabeam SaaS Cloud and Snowflake Data Cloud is done through the new Exabeam Cloud Connector for Snowflake, which allows for easy ingestion of data stored in Snowflake. Exabeam provides continuous, real-time mapping of logs stored within Snowflake and attributes all activity and behaviour to users and devices. This attribution, with additional data and context, provides visibility into abnormal or risky activity to detect malicious insiders or attacks involving compromised credentials. As a new addition to the 40-plus existing Exabeam Cloud Connectors, the Cloud Connector for Snowflake also allows for monitoring of Snowflake audit logs in Exabeam Advanced Analytics to detect anomalous account behaviours within the application itself. Assisting security operations “The proliferation of data is central to all businesses, and so is the need to guard against malicious attacks – especially now, as enterprises rely so heavily on data clouds like Snowflake,” added Chris Stewart, Senior Director, Business Development for Exabeam. “This partnership advances our mission to assist security operations teams in quickly detecting, investigating and responding to incidents throughout the enterprise.”
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful applications of intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting human presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.
The way we purchase services and products is changing. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. This approach has come from the consumer realisation that it is the outcome that is important rather than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products. With the physical security industry becoming ever more integrated – and truly open systems now a reality – there is every reason to assume this service-lead trend will come to dominate the way our industry interacts with its clients as well. Interest in service-based security There is a significant change of mindset that the security industry needs to embrace before a large-scale move to Security as a Service can take place. Like many technology sectors in the past, security providers have focussed on ‘shifting boxes’ as their definitive sales model. This approach was especially prevalent when proprietary systems were the mainstay of the security industry. Essentially, if the customer wanted more services they simply bought a new product. This was a straightforward and economic sales approach for manufacturers and installers alike.The security industry needs to embrace a change of mindset before a move to SaaS can take place The flexibility of integrated and open technology has changed the way consumers view their purchase, so it shouldn’t be any surprise that there is increased interest in a service-based approach. Customer choice equates to a change of focus and interest, with physical products being eclipsed by the benefits of the overall solution. We have already seen these changes in other technology areas, notably with smart devices and general IT systems. Cloud-based services put the onus on the result rather than which device the user chooses. This approach is even starting to manifest in areas that couldn’t have been predicted in the past, such as the car industry for example. Consumers are focusing more on the overall costs and convenience of buying a car over the specific specification of the vehicle. Equally, urban dwellers don’t necessarily want the hassle and expense of owning and parking their own vehicle anymore. If you don’t use it every day, it can make more sense to rent a vehicle only when you travel beyond public transport. For these consumers the car has become a service item for a specific journey. Benefits for end users At the heart of this approach is the simple equation that consumers have a need and suppliers need to provide the most cost-effective, and easiest, solution. At the same time, the security operator may not necessarily want to know (or care) what specification the system has, they just want it to perform the task as required. By discussing with consumers, we can ensure we work even more closely with them to provide the expert support they need and deserve Most security buyers will identify the specific business needs and their budget to achieve this. This is where a service approach really comes into its own. Customers need expert advice on a solution for their requirements which takes away the stress of finding the right products/systems. In the past there was always a risk of purchasing an unsuitable solution, which could potentially be disastrous. The other issue was having to budget for a big capital expenditure for a large installation and then having to find further resources once an upgrade was due when systems went end of life. Most businesses find it far easier to pay a sensible monthly or annual fee that is predictable and can easily be budgeted for. A service model makes this far easier to achieve. Benefits of a service sales model As well as the benefits for end users, there are considerable benefits for security providers too. Rather than simply ‘shifting boxes’ and enduring the inevitable sales peaks and toughs this creates; a service sales model allows manufacturers and installers to enjoy a more stable business model. You don’t have to win new business with every product, but rather sell ongoing services for a set period. Its highly likely that the whole security industry will start to take this approach over the next few years. Manufacturers are already well aware of this shift in customer expectations and are changing their approach to meet demands.There are major opportunities on offer in return for a change of perspective in the security industry With the service and leasing approach already firmly entrenched in other industries, this is well proven in a consumer market. The airline industry is a great example. Manufacturers understand that airlines need flexibility to upscale and downscale operations and therefore whole aircraft and even individual key components (such as engines or seating) can be leased as required. Using this approach, airlines can concentrate on what customers demand and not worry about the logistics of doing this. Manufacturers and leasing businesses provide assurances and guarantees of service time for aircraft and engines, taking care of the servicing and maintenance to ensure this delivery. This approach is just as well suited for the provision of security systems. Servicing the future security market Undoubtedly there are major opportunities on offer in return for a change of perspective in the security industry. However, this will involve substantial changes in some quarters to ensure the business model is aligned with the market. Overall, the security industry needs to not only develop the right systems for the market, but also to deliver them in the right way as well. This will ensure we work even more closely with customers to provide the expert support they need and deserve.
The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realisation of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staff The advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organisations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
Teleste will provide an on-board solution to Alstom for the Marseille metro network in France, ordered by the Aix Marseille Provence Metropole, AMP. Teleste’s deliveries will include onboard TFT displays as well as systems for passenger information, public address, CCTV, and wireless train-to-ground functions for 38 4-car driverless metro trains, with an option for an additional 5 vehicles. The system deployments will start in 2021, and the first trains will enter into service in 2024. Flexibility and efficiency in metros “Introducing automated services to metro networks will increase flexibility and efficiency in operation, while also setting high requirements for the train technology, especially when it comes to real-time train to the ground transmission of audio, video, and passenger information content.” “Our onboard systems are well-equipped to meet the challenge by enabling reliable, real-time connectivity between moving trains and the ground system, reinforced by seamless integration also with third-party systems." "We are pleased that Alstom selected our solution for their project and are looking forward to providing a safe and smooth travel experience for the passengers of Metro Marseille,” commented Jarkko Vehkala, Head of the Rolling Stock Manufacturers business line at Teleste. Driverless metro operations Teleste’s on-board solution seamlessly supports fully automated, driverless metro operations Teleste’s on-board solution has been designed for the seamless support of fully automated, driverless metro operations, which will be taken into use in the Marseille metro by the end of 2026. This means that the trains will then be controlled without any staff on board from the operator’s train control system, and a reliable interface between the new and legacy systems will be deployed. Seamless remote operations Teleste’s solution meets the requirements by seamlessly combining onboard systems such as a public address, CCTV, and the delivery of passenger information with an advanced train-to-ground transmission system. This allows the operator to manage onboard operations remotely while, for example, getting 24/7 access to live camera views from the metro cars to ensure the safety and security of passengers during their journey. Also automatic and manual offload of video recordings, system diagnostics as well as automatic updates, and version control of the train software are enabled. With interfaces to third-party systems, the solution also empowers seamless operation of the onboard functionalities as part of larger transport ecosystems.
A Japan based technological enterprise is working towards the formation of a technology corporate group. The company’s technologically advanced products include a diverse range of products that are used on land, sea, air and even space. The company offers a range of environmental and recycling plants, industrial plants to automobile and infrastructure equipment. And at every step, Kawasaki pays the utmost attention to humankind and the environment. This century old company has been able to establish a firm foundation as a technological enterprise. The company’s automobile division, which makes it one of the pioneer automobile companies, is spread on a global scale. Crystal clear images They also wanted to monitor how the employees interacted with customers, cleanliness of the premises The company having franchise stores operated by respective owners in India was concerned about the consistency in branding and customer service across these stores. They wanted a solution that could enable them to view the stores from a central location, specially the front end where their premium vehicles were displayed. They also wanted to monitor how the employees interacted with customers, cleanliness of the premises, whether the products were displayed in the right order, branding in the store and other process compliances. But at the same time, they did not want to invest in recorders as the numbers of cameras at individual locations were very limited. Matrix installed high resolution IP cameras at each store. These cameras provided crystal clear images of every corner of the store. This enabled the company to monitor every aspect of brand management such as order of vehicles, customer service, cleanliness, behaviour of employees, etc. Geographically separated locations A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to itCameras were installed at each location based on the requirement and connected to a network switch with the help of CAT6 cables. Since there was a private connectivity between all the geographically separated locations of the company, all cameras at various locations were configured locally with VPN functionality (same class of IP address), and were viewed at a central location without port forwarding. A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to it. This allowed streams from all twelve locations to be viewed on a single screen. In this way, Matrix helped the automobile giant maintain process compliance in its stores throughout the country. Centralised Control Better Brand Management Elimination of Compliance Check Costs Enhanced Security Employee Discipline Matrix products used: SATATYA CIBR13FL40CW: 1.3MP IP BULLET CAMERA SATATYA CIDR13FL40CW: 1.3MP IP DOME CAMERA SATATYA NVR24P: 24-CHANNEL NETWORK VIDEO RECORDER WITH 6TB STORAGE SUPPORT
The 9th BRICS Summit was successfully held in Xiamen, China from September 3rd-5th, 2017, where leaders of the five member-countries were in attendance. Building on its success in providing a comprehensive security solution for the G20 Hangzhou Summit in 2016, the 9th BRICS Summit was yet another accomplishment for Dahua. The 2017 BRICS Xiamen Summit demanded high-level protection for national leaders from Brazil, Russia, India, China, and South Africa. As Xiamen’s city centre is located on an island, the security system required comprehensive surveillance of all roads leading into the area, also known as the “Four Bridges and One Tunnel” network.Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras Protection through Dahua technology In addition to roads leading into the city, routes to and from the airport, hotels, and the Xiamen International Conference & Exhibition Center needed to be protected as well. A solution of this proportion would also require an advanced, automated, and centralised system to ensure efficient, coordinated responses. With its cutting-edge IP camera, video cloud, network storage, and transmission technologies, Dahua was up to the task of securing Xiamen and the BRICS venues. In total, Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras, and many other advanced Dahua products and services used in various areas of the city. The BRICS security command centre, administered by the Public Security Department of the Xiamen, was fitted with a Dahua visual emergency dispatch and command system. The centre’s large display wall was stitched together with Dahua edgeless HD LED panels, enabling a complete picture of all units under command center control during the meeting, greatly simplifying control and responses. The security system surrounding the Xiamen International Conference & Exhibition Center as well as the visual emergency dispatch and command system in the security command center both adopted a full range of Dahua video surveillance and display solutions. Dahua employed advanced technologies such as intelligent analysis and big data, to increase the efficiency of emergency command and management capabilities Live video security on the road A customised Dahua Mobile Solution with GPS positioning and in-vehicle wireless image transmission system was installed on 228 patrol cars and 72 special cars from the Xiamen Public Security Bureau, which was used to clear the way for Summit leaders. This provided the command centre with a continuous live overview of all areas while providing support for the handling of various emergencies. Dahua contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints In order to secure “Four Bridges and One Tunnel” access points, Dahua employed advanced technologies such as intelligent analysis, big data, and video analytics to significantly increase the efficiency of emergency command and information technology management capabilities, providing uninterrupted HD video surveillance and smart road event monitoring on bridges and tunnels. In addition, Dahua also contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints. In surrounding Haicang and Jimei districts, Dahua constructed video surveillance on routes and sites which held key activities in the city, achieving full coverage of places such as guarded routes, main roads, key sites, as well as surrounding areas and regions of elevated risk. Dahua securing public safety Dahua also played a role in safeguarding conference-related affairs such as catering, accommodation, and travel. The hotels in which leaders stayed in and surrounding areas were upgraded to HD systems in a short amount of time, making sure the leaders were secure while they rested during the Summit. The mobile law enforcement surveillance system assisted the Xiamen Market Supervision Commission in guaranteeing the provision of safe food during the Summit. The three day BRICS Summit concluded without a hitch. National leaders and their delegations were able to smoothly move about the city and attend the conference while Dahua products prevented threats through a vast network of smart video technologies. In addition, the large-scale project significantly upgraded Xiamen’s city surveillance system and provided a long-term foundation for not only public security-related operations, but also broader public projects such as the Xiamen Wireless Image Transmission System.
The Sinan Erdem Dome is the largest multi-purpose indoor venue in Turkey. Located in Istanbul, the dome has a seating capacity of up to 22,500, and hosts a number of events, including concerts, tennis matches, and basketball games. Strengthening stadium security Upon being chosen to host a number of games during the European Basketball Championships 2017, the chief European men’s international basketball competition held biannually, the Sinan Erdem Dome looked to strengthen their security system. The dome’s large-scale presented high-surveillance requirements such as support for 64 split-screens, hundreds of cameras, and a back-end storage and management infrastructure that could support the entire system. Dahua provided the dome with a complete, high-end monitoring system that included a total of over 600 IP, speed dome, and ANPR cameras on the front-end, and NVRs, video walls, video matrix devices, and related control accessories on the back-end. Smart detection technologies The dome’s surveillance system was constructed with the latest cutting-edge technology To better protect the stadium from a variety of threats, the solution employed a number of smart detection technologies such as intelligent analysis, which includes motion detection, tripwire, intrusion, and smart-tracking functionality. ANPR was also utilised, which recognises licence plates numbers and checks them against a central whitelist and blacklist. Plate records are also stored on NVR devices and can be searched through by security officers. In less than a week, the local team completed installation, testing, and customer training, and the dome was fully ready to securely host international sporting events. Protecting all corners In under a week, the dome’s surveillance system was constructed with the latest cutting-edge technology, increasing its appeal to international events seeking venues. Dahua smart technologies automated a great number of surveillance operations, such as automatic car-barrier operation enabled by ANPR camera integration, thus greatly reducing the strain on security workers. Every corner of the stadium was covered by Dahua cameras providing high definition video, ensuring zero blind spots and optimal detail collection. In addition, Dahua showcased its customer-centric philosophy through supplying high-quality customisation, technical support, operation training, and after-sales service, which guaranteed the expertise of system operators as well as long-term reliability and quick issue resolution.
The Salzburg Festival is considered the world’s finest drama and classical music festival. Siemens has equipped the specially built opera houses with state-of-the-art technology with advanced systems to ensure the perfect balance of comfort, safety and security. Founded in 1920 by theatre director and producer Max Reinhardt, the Salzburg Festival has grown into a cultural event of international stature. Today nearly 260,000 visitors attend the 14 performance venues where over 200 events take place each year. Cutting-edge technology ensures utmost comfort, maximum safety and security, as well as first-class acoustics. The facilities are equipped with building automation, sound systems, stage management consoles, fire detection technology, access control and evacuation systems. Advanced fire safety and access control The fire detection system delivers maximum safety. Over 1,800 detectors monitor the many different areas throughout the festival halls. Linear detectors, flame detectors and smoke extraction systems offer high level protection of the audience and stage areas. Festival managers also have the advantage of central control and an integrated guard tour system. In an emergency, everyone on site is given clear instructions via a voice alarm system on how to exit the building safely and securely. A Siport access control system ensures that only authorised personnel gain access to the secure areas of the festival halls. Approximately 7,000 photo ID cards are issued across the site every summer across the workforce to personnel such as performers, stage technicians and administrative staff. The photo ID cards cannot be counterfeited as a special security overlay with holographic printing prevents tampering. The same card is also used for time and attendance and cashless vending in the cafeteria. Cameras enable the stage manager to monitor the stage area and other key locations Monitoring and managing safety and security The stage manager is in charge of the overall coordination at the festival. This includes a wide range of procedures such as monitoring the action on stage, alerting performers in their dressing room and issuing light signals. During the performance, all the threads converge on a specially designed stage manager console, complete with touch screen for maximum ease of use. Cameras enable the stage manager to monitor the stage area and other key locations. In an emergency, the stage manager can contact the relevant services and first responders as well as organise safe evacuation over the public-address system. More than 300 loudspeaker circuits were installed for these tasks in the Mozart House and the Felsenreitschule alone. The Great Festival Hall is still being modernised, however once the work is finalised, approximately 400 loudspeaker circuits will ensure smooth operations in this one venue. Digital sound system network A digital network was set up to improve the acoustics in the festival halls. The sound systems and all the required components for the stage and audience arena were also provided by Siemens. Fibre-optic cables transmit all the audio data and control information digitally to the three venues. The system uses a digital time division multiplex process. Each one of the base units used has an audio data bus with 256 time slots, which carry 256 signals simultaneously. Computer-controlled loudspeakers and equalisers ensure that every audience member hears the sound not only at the same time but at the same quality. The system is self-diagnostic and as soon as a malfunction occurs, it sends relevant information to the appropriate personnel. All stakeholders benefit from the new technology; the management team, employees, performers, and audiences Climate control system Precise control of the interior temperature and humidity is particularly important in a festival hall, so that both audiences and artists can experience the performance in comfort. To achieve this objective, Siemens designed a sophisticated climate control system using natural resources. The Alm River flows under the city of Salzburg and cold water is rerouted underneath the Great Festival Hall and used for air conditioning to maintain a temperature of 23 degrees Celsius and a humidity of 55 per cent in the concert hall. This automation system also controls ventilation and delivers fresh air to the concert halls continuously and quietly. A management station monitors more than 6,000 data points and will report the slightest disruption or deviation from the specified values to ensure continuity. Integrated technology solutions With a unique, integrated solution that monitors room temperature, humidity, acoustics, stage manager systems, fire detection and access control, Siemens has added considerably to the safety, security and comfort of the internationally renowned Salzburg Festival. The cutting-edge technology guarantees the best acoustics, optimal room temperature and climate, reliable fire safety, controlled access and state-of-the-art evacuation. All stakeholders benefit from the new technology; the management team, employees, performers, and audiences.
The gates that give access to the campus are equipped with Nedap long range vehicle identification readersHindustan Unilever Limited (HUL), the largest Fast Moving Consumer Goods Company in India, has chosen Nedap's security management system AEOS to secure its new corporate office in Mumbai.The Indian subsidiary of Unilever recently moved its corporate office within the city of Mumbai to a new ultramodern campus, which is spread over 12.5 acres of land and will house over 1600 employees. The campus offers various facilities to employees including convenience stores, a library, a food court, an occupational health centre, a gym and a day care centre. The idea behind the move was to integrate various business processes under ‘One HUL Campus' and to concentrate the divisions of the organisation in one place.Considering that a state-of-the-art campus needs a state-of-the-art security solution, HUL decided to choose Nedap AEOS as the company's security management system. To make sure that the company's intelligence is well protected, approximately 120 doors are secured with AEOS, whereas the gates that give access to the campus are equipped with Nedap long range vehicle identification readers. Furthermore, AEOS visitor management has been implemented including the pre-registration of visitors by HUL employees. The AEOS system was implemented by Nedap's business partner in Mumbai.Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, says: "This project perfectly shows the extensive possibilities of the AEOS system. Thanks to its open architecture, the functionality of AEOS is freely configurable, creating a very flexible system that can be easily adjusted to changing security needs."
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?