Business security systems
The physical security specialist, Technocover, has successfully passed its annual Achilles UVDB (Utilities Vendor Database) verify audit, achieving 100% across all assessment categories. The company’s management and onsite operations were subject to two days of detailed inspection by Achilles auditors in gaining registration to Verify Category B2. Achilles UVDB Verify is a rigorous pre-qualification scheme for the UK utilities sector, which assesses organisations against high standards of...
ExtraHop, globally renowned provider of cloud-native network detection and response solutions, has announced a new integration with Amazon Web Services (AWS) that automates the isolation of compromised Amazon Elastic Compute Cloud (EC2) instances and empowers security operations teams to create a wide range of customisable response automations, from quarantining and blocking to ticketing and tagging. ExtraHop Reveal(x) Cloud Alongside the new automation capability, ExtraHop Reveal(x) Cloud off...
It is an exciting time at German intelligent video company MOBOTIX, which has launched a next-generation platform that builds on their legacy of video at the edge while opening up the system to third-party partners that can build even more capabilities. MOBOTIX unveiled the new M7 platform and M73 camera at the MOBOTIX Global Partner Conference in Mainz, Germany, in October. MOBOTIX M7 is a powerful, decentralised and secure modular IoT-video system based on deep learning modules. The feedback...
Security companies provide a type of service that tends to go unnoticed except when it’s missed. Businesses, banks, stores, event organisers and VIPs are their main clients. Their demand is increasing, mostly due to the expansion that Southern California has experienced in the latest years. Small cities and towns are increasingly growing every day, mostly due to internal migration and the high prices of rent in Los Angeles County. Veteran Los Angeles security company HillQuest Security kn...
Allied Universal®, a security and facility services company in North America, acquires APG Security - a South Amboy, New Jersey - based company offering manned guarding and investigative services on a national level. Terms of the deal were not disclosed. “APG Security’s talented management team has built a reputable business offering top-of-the-line security services on a national level,” said Steve Jones, CEO of Allied Universal. “This acquisition is part of our lon...
In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialised than in most other areas of business and commerce. The banks...
The National Security Inspectorate’s (NSI) consultation on its new draft Code of Practice, NCP 119, for the provision of labour in the security and events sector has provoked a positive response from approved companies and labour providers. NSI has welcomed the positive comment on the draft Code which will help to shape its direction and implementation. Margaret Durr, Head of Field Operations (Services), NSI, said: “I would like to thank all of those who took the time to review the Code and share their views. These views are valuable to ensure the new Code will provide buyers with an assurance their security guarding providers are of a suitable standard, operate as responsible employers and so minimise the security risk associated with labour provision (sometimes referred to as agency labour)." Shield NSI approved companies “Over-extended labour supply chains and lack of professionalism amongst labour providers risk infiltration of rogue labour, damaging the quality of service provided, and bringing the industry into disrepute. This Code will help shield NSI approved companies and their clients from those risks, and contribute to the safety and security of the public.” NSI is currently reviewing all comments and amendments will be made where appropriate. The new Code of Practice will come into effect in early 2020.
Konica Minolta is making the next big advance in intelligent video technology by launching the MOBOTIX 7 smart solution platform and the M73 IoT camera that uses it. The latest generation of MOBOTIX video cameras offers a whole new set of functions plus application solutions based on deep learning, opening up new possibilities far beyond traditional video security. The M73 comes with more than 15 apps integrated into its camera software, which can be used to optimise business processes in practically any industry. Integrated facial recognition MOBOTIX 7 is the by far powerful and decentralised and secure modular IoT video system" "MOBOTIX 7 is the by far powerful and decentralised and secure modular IoT video system based on ‘Made in Germany’ and Deep Learning modules, jointly developed with Konica Minolta" explains Gary Fletcher-Moore, Head of Sales – Intelligent Video Solutions, Konica Minolta Business Solutions (UK) Limited. "With the MOBOTIX 7 platform and its new range of intelligent apps we will revolutionise numerous IoT processes for our customers." By combining image sensors and environmental sensors with AI-based analytics, industrial enterprises can increase their production efficiency and improve preventive maintenance or fire prevention measures. For transport applications, the integrated facial recognition, traffic monitoring and object recognition capabilities ensure that drivers are immediately aware of hazards, thus improving road safety for drivers, passengers and other road users. High-quality professional market The new MOBOTIX M73 IoT camera features high-octane processor technology, meaning it easily provides the latest state of the art in camera performance, such as 4K resolution at 30 fps or 120 dB WDR (Wide Dynamic Range). Only high-quality professional market and partner solutions are integrated In keeping with current demands, the camera is also highly energy efficient: despite a total power consumption of less than 25 watts (PoE+), each M73 is a complete video system that features 8-GB DVR as standard — so no additional servers or storage devices are required. The pre-installed apps come with a 30-day free trial, after which users can purchase a license for each app as required. Only high-quality professional market and partner solutions are integrated, all of which have been tested and certified by MOBOTIX as meeting the highest standards in terms of quality and cyber security. Intelligent video monitoring This opens up countless applications for use — for example, one of the MOBOTIX camera apps can detect when a building is in danger of becoming overcrowded. In this case, the camera immediately and automatically triggers a diversion for any further persons wishing to enter the building, thus reliably preventing accidents and panic. There are no limits to the applications the camera can be used for There are no limits to the applications the camera can be used for, and the solution platform is particularly suitable for sectors such as building engineering, energy, civil engineering, industry and production, public services, retail, healthcare, and education. The examples given above show that intelligent video monitoring means much more than simply recording footage and analysing it. Highest level of cybersecurity Together with MOBOTIX, Konica Minolta aims to develop a multitude of other solutions based on artificial intelligence to help predict events and facilitate the early introduction of effective countermeasures aimed at protecting the environment, buildings, systems, people or animals. The MOBOTIX 7 and M73 provide apps with functions such as the ability to recognise faces, characteristics, age, mood or sex, as well as specialised custom solutions. "MOBOTIX 7 meets the requirements of a wide range of industries, including transport, retail, industry and public services, as well as fire prevention," says Gary Fletcher-Moore, adding: "The MOBOTIX systems had to have the highest level of cybersecurity in order to be released on the market in accordance with global standards such as ONVIF."
Ignition Technology announced a distribution partnership with Chronicle, now part of Google Cloud, to establish and support Chronicle’s channel partner community in the UK, Ireland and Nordics. Ignition Technology is the first value added distribution partner for Chronicle’s Backstory. Backstory is a global security telemetry platform for investigation and threat hunting, built on core Google infrastructure. Customers upload their security telemetry to a private instance within the Backstory cloud platform, and then use the platform to understand the details of an attack, at the speed of search. Technical expertise and channel engagement “Ignition Technology has demonstrated a successful track record of introducing and supporting new vendors with disruptive technologies across the European market,” said Magali Bohn, Head of Partnerships for Chronicle. “As our first distributor, we are impressed by Ignition’s technical expertise and channel engagement. We look forward to working closely with Ignition Technology to grow our new channel community in the UK, Ireland and Nordics.” Everybody is looking for solutions that disrupt traditional approaches to an existing challenge “Everybody is looking for solutions that truly disrupt traditional approaches to an existing challenge, both commercially and technologically,” says Sean Remnant, Chief Strategy Officer at Ignition Technology. “To be able to hunt for threats you need all potentially relevant data, and we see customers producing hundreds of terabytes per day along with a need to access potentially petabytes of historical information instantly." Disruptive pricing model "Backstory changes the rules through a commercial offering with a disruptive pricing model for massive data, delivering sub-second search even at large volumes. Backstory is a true game-changer for customers and the channel,” Remnant adds. As part of its value-added distribution agreement, Ignition provides pre-sales and technical enablement to channel partners to quickly demonstrate value to customers. Initial partner recruitment will focus on security specialists with expertise across a broad range of enterprise and vertical markets. Ignition Technology and Chronicle will be participating in the upcoming Google Cloud Next ’19 UK, November 20-21 at ExCeL, London.
Suprema ID., globally renowned provider of biometrics and identity solutions, has announced that its best-selling RealScan Series, including RealScan-G10 and RealScan-D are now compatible with secunet biomiddle. secunet biomiddle platform The secunet biomiddle is an intermediate platform for biometric systems and eIDs The secunet biomiddle is an intermediate platform for biometric systems and eIDs, enabling the modular use of biometric system components and card readers in various biometric or eID applications. Both functions are provided via one interface. Biometric hardware- and software-components are embedded and used by the secunet biomiddle via an integrated BioAPI 2.1 framework, according to ISO/IEC 19784-1. The secunet biomiddle communicates with client applications via a SOAP interface, which makes the middleware independent of system platforms and programming languages. Therefore, the secunet biomiddle is easily and quickly integrated into existing infrastructures and already the linchpin in many regulatory and border control projects. Fingerprint Live Scanners “It is our great pleasure having achieved integration of our proven Fingerprint Live Scanners into the secunet biomiddle, a reliable platform for many opportunities that are currently ongoing. With its award-winning live fingerprint detection based on deep-learning and versatile performances offering Multi-OS (operating system) for various environments, it is expected that we could join various global projects simultaneously such as the Biometrics based EU Entry-Exit System (EES) for Stronger and Smarter Borders for the European Union using secunet biomiddle that is recognised internationally as the reference implementation and preferred architecture for the use of biometrics in connection with official ID documents,” said Bogun Park, CEO at Suprema ID. Suprema ID is a globally renowned provider of biometrics and ID solutions. By combining the world’s renowned biometric algorithm with superior engineering, Suprema ID continually designs and develops high-tech identity products and solutions. Suprema ID’s extensive range of portfolio includes fingerprint enrollment scanners, fingerprint authentication scanners, fingerprint embedded modules and ePassport readers.
TrackTik’s Advanced Break Management solution gives security organisations peace of mind by making it easier to comply with changing break rules and legislation – and reduce legal and financial risk – while simultaneously increasing workforce flexibility and guard productivity. Back Office Suite Powered by TrackTik’s Back Office Suite, this breakthrough solution enables multiple meal and rest break rules to be created instantaneously, and alerts can be set so guards are always made aware of breaks for best performance. With an automatic audit trail, features include: an at-a-glance overview of guard break schedules; simplified scheduling according to positions rather than individuals; break reminders and overriding features for changes and exceptions, so both schedulers and guards are informed and empowered; and integration of information with payments and billing for streamlined operations.
ExtraHop, a pioneer in cloud-native network detection and response, announced a new integration between ExtraHop® Reveal(x) and Google Cloud Platform (GCP) via the new packet mirroring feature announced by GCP at Google NEXT ‘19 UK. Google Cloud’s new Packet Mirroring feature enables Reveal(x) to passively and agentlessly analyse network traffic within GCP to provide robust, real-time threat detection, investigation, and response. Cloud computing Traffic visibility is critical to prevent security breaches and attacks as networks grow in complexity" Armed with this visibility, security teams can protect data and workloads in Google Cloud and expand control across the entire hybrid attack surface. Reveal(x) for GCP automatically discovers, classifies, and maps dependencies between workloads, and applies advanced machine learning to surface the most critical threats. Equipped with this information, GCP customers can rapidly identify, investigate, and respond to threats, fulfilling their obligations under the shared responsibility model. "Ulta Beauty is a company built on seeing possibilities. It's informed everything from our in-store shopping experience to how we build our business – including the technology that supports it," said Diane Brown, senior director of IT risk management and CISO at Ulta Beauty. "In cloud computing, we see the ability to grow faster and deliver more 'wow' experiences to our customers. The new integration between ExtraHop Reveal(x) and Google Cloud's new packet mirroring accelerates our cloud adoption by giving us the visibility we need to secure our applications and protect our most precious asset, our customers." Full threat visibility Through the integration with GCP packet mirroring, ExtraHop Reveal(x) provides full threat visibility, detection, and response across cloud and hybrid workloads. Full Packet Analysis: Reveal(x) leverages GCP Packet Mirroring to capture payloads and headers, enabling in-depth analysis and threat hunting. Machine learning at the application layer provides immediate detection of difficult-to-spot activity, including exfiltration. Encrypted Payload Visibility: Reveal(x) decrypts SSL/TLS-encrypted traffic at line rate, including cipher suites supporting perfect forward secrecy, providing complete visibility into all communications, including encrypted malicious traffic. Augmented Investigation: Reveal(x) for GCP automates several early investigation steps to provide analysts with workflows that can be completed in clicks, enabling quick and confident response. Detect network intrusions "Traffic visibility is critical to prevent security breaches and attacks as networks grow in complexity," said Mahesh Narayanan, product manager at Google Cloud. “With Packet Mirroring, our customers now have a way to proactively detect network intrusions, analyse, and diagnose application performance issues for both Compute Engine and Google Kubernetes Engine, across all regions and machine types." "Traditional security tools are falling short and new thinking is needed for hybrid enterprises today," said Jesse Rothstein, CTO and co-founder at ExtraHop. “Reveal(x) for GCP Packet Mirroring provides security teams with unparalleled network visibility and cloud-scale machine learning for detection and automated response across your business's complex attack surface.” ExtraHop Reveal(x) for GCP is now available in alpha.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorised parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorised personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilisers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organisation Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organisation, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertise,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realising wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialised services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the programme, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertise”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernise legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
March Networks, a video security and video-based business intelligence provider, announces that the rapidly growing U.S. convenience store chain Yesway has selected its Searchlight for Retail solution for advanced video surveillance and analytics. Yesway is currently deploying March Networks Searchlight for Retail in 136 locations across Iowa, Kansas, Oklahoma, Missouri, Texas, Nebraska, New Mexico, South Dakota and Wyoming. The c-store chain, which is operated by an affiliate of Brookwood Financial Partners, LLC, is expanding across the U.S. and plans to standardise on March Networks as it moves forward. Asset protection investigations Brandon Pohlman, Yesway Safety & Asset Protection Manager, said the company selected Searchlight for its scalability and centralised management features as well as its powerful exception-based reporting capabilities. Through its combination of high-quality video surveillance, point-of-sale (POS) transaction data and analytics, Searchlight helps Yesway visually monitor operations at all of its sites and quickly analyse transaction data for anomalies. “Having our video surveillance, POS data and analytics together on one easy-to-use platform is a huge advantage for Yesway,” said Pohlman. Using the software, the c-store can rapidly search and sort all of its transactions and match them with corresponding video clips. The company can also group higher-risk transaction types like refunds and assign risk factors to its stores based on the number of these transactions. “The insights uncovered by Searchlight have helped Yesway reduce its shrink levels and improve the speed and efficiency of asset protection investigations,” Pohlman said. Advanced system management software Yesway is also deploying March Networks 8000 Series Hybrid NVRs for reliable video recording In addition to asset protection, Searchlight also delivers valuable business intelligence through the integration of video analytics including people counting, queue length and dwell time. Several different Yesway departments use Searchlight’s information to monitor operations, merchandising and customer service across the organisation. Iverify, a full-service interactive security company and March Networks certified partner, managed the Yesway installation. Marty Brakel, Iverify National Account Manager, said March Networks’ products are ideal for the c-store market. “March Networks Searchlight is a professional-grade solution for customers like Yesway that need robust loss prevention tools and the ability to manage hundreds of locations simultaneously,” said Brakel. In addition to Searchlight, Yesway is also deploying March Networks 8000 Series Hybrid NVRs for reliable video recording, and March Networks SE2 Series IP Cameras for high-quality video capture. It is managing the solution with March Networks Command Enterprise, advanced system management software that simplifies multi-site video management. Improve customer satisfaction “With March Networks’ complete solution for c-stores, organisations like Yesway can cut losses and improve customer satisfaction as well as operational efficiency,” said Net Payne, Chief Sales & Marketing Officer, March Networks. "Because Searchlight is also available as a hosted service, c-stores and other retailers can enjoy all the benefits of this powerful solution for a low monthly fee. They can have peace of mind knowing that March Networks’ trained professionals are monitoring and maintaining the health of the video system on their behalf.”
Ciudad Ros Casares has become one of the most important business parks in Valencia, Spain. It is a unique commercial and residential construction, which responds to the new business and networking requirements. The intercommunication system chosen by the project managers is the MEET IP System from FERMAX, because of its high performance and integration features as well as the security offered by MEET. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader. Residential management software The project has a total of 245 apartments in 2 buildings, with two outdoor panels per building plus a concierge service managed with MEET's residential management software. The chosen outdoor entry panel is the MILO Digital Touch Panel and the 245 apartments are equipped with the MIO 7'' Monitor. The project is equipped with high technological features and qualities of different types, large leisure and green areas, general and specialised services and an excellent geo-strategic location. This commercial condominium includes offices, stores, a business centre, spaces built to organising events and apartments for rent. The installation of Fermax MEET system started in January 2019.
Located in the Southern Vietnamese metropolis of Ho Chi Minh City, the Deutsches Haus office tower is a symbol of cooperation between Germany and Vietnam. Opened in September 2017, it is the country’s first building to earn LEED (leadership in energy and environmental design) Platinum environmental certification and serves as a cultural, commercial and diplomatic hub in the region. Next to the Consulate General of the Federal Republic of Germany the 25-story building with a 40,000-square-meters floor area is home to regional offices of international firms such as VISA, Adidas, Schneider Electric, and Bosch Vietnam. As premium amenities, Deutsches Haus also features a gourmet cafe, multifunctional conference and events area, health club, and rooftop restaurant. Creating a challenging security environment Deutsches Haus needs to meet the highest security demands: All security systems, including security guard teams From a security manager’s perspective, this multi-use blend of diplomacy, business, and leisure facilities – in a building fully accessible to the public – creates a challenging security environment. As the seat of the Consulate General of the Federal Republic of Germany, Deutsches Haus needs to meet the highest security demands: All security systems, including security guard teams, have to be approved by the Federal Foreign Office of Germany. Adding to the challenge, Deutsches Haus is located opposite from the Consulate General of the United States of America – and in close vicinity to the Consulate General of France and the British Consulate General – on a busy intersection between two main streets. Therefore, monitoring pedestrians and automobile traffic on the building’s perimeter is just as crucial to end-to-end security as tracking public and high-security areas on the inside. Detecting security events automatically In search of an adequate video security solution, the team at Deutsches Haus knew that high-definition cameras alone would not suffice. The reason: When several hundred cameras are required to secure an area of this size, personnel tend to be overwhelmed by the amount of video feeds. After only 20 minutes, the average operator misses 90 percent of important scenes, as studies have proven. Bosch experts covered the building and its perimeter with network security cameras For this reason, modern IP security cameras feature Intelligent Video Analytics – using algorithms and AI-based image recognition – to support operators by detecting security events automatically. Bosch experts covered the building and its perimeter with network security cameras featuring built-in Intelligent Video Analytics. Indoor areas like the entrance doors, reception area, lobby, café, as well as parking garages and corridors to the fire escape staircases are monitored by over 170 DINION IP starlight 7000 HD and FLEXIDOME IP panoramic 7000 MP cameras. Alerting security personnel of illicit behaviour The building’s elevators are also protected by Bosch cameras. Thanks to built-in-intelligence, IP cameras automatically alert security personnel of illicit behaviour, for instance persons accessing restricted areas. The building’s perimeter and parking lot are safeguarded outdoor-approved AUTODOME IP starlight 7000 HD cameras with pan-tilt-zoom (PTZ) capabilities. Integrated with a third-party solution to open barriers for authorised vehicles, the cameras can automatically track moving objects such as cars and pedestrians – and warn personnel of threats – with their 30x zoom lens while obtaining images under low light conditions via Bosch starlight technology combined with Intelligent Video Analytics. As a key requisite, the networked cameras are able to withstand the city’s four-month rain period and prove resistant to vandalism. Enhancing safety of building occupants The staff can easily announce and notify a building guest about a forgotten purse which was left in the café PAVIRO, the Public Address and Voice Evacuation system of Bosch was installed in the building for the safety of building occupants. The PAVIRO solution makes it possible for occupants to feel safe in the building while enjoying high quality music and excellent Public Address speech intelligibility. The staff can easily announce and notify a building guest about a forgotten purse which was left in the café. To make building evacuations as efficient as possible, the PAVIRO solution provides phased evacuation: automated messages direct occupants to immediate safety. Next to this, building occupants and guests can also enjoy high-quality music in the rooftop restaurant, café, health club and event areas which of course contributes to the nice building atmosphere. Providing government-grade security For the building owner, PAVIRO can establish long-term cost-saving and minimise total cost of ownership. The system is especially eco-friendly because less amplifiers are needed due to power-load sharing of the amplifier architecture, which in turn requires fewer batteries. Since opening day, the Bosch system has provided government-grade security at Deutsches Haus in Ho Chi Minh City. “I am proud to have Bosch both as a tenant and as a brand who secures Deutsches Haus with their high quality and reliable video security cameras and sound systems,” added Ryan Lower, Property Director, Colliers International – Deutsches Haus. While meeting the challenge of securing diplomatic and enterprise assets in a publicly accessible building, the future-proof solution provides an important reference in this dynamic market.
HID Global, global provider of trusted identity solutions, has enabled BigWise, a global provider of wise solutions worldwide, to bring the security and convenience of biometrics to its retail and restaurant customers. BigWise went from concept to a pilot of its new biometric-enabled Stellar POS platform at a major customer within 30 days using the HID DigitalPersona fingerprint biometric solution. HID DigitalPersona fingerprint biometric solution HID’s fingerprint biometric solution significantly shortened our path for secure fingerprint biometric authentication" “HID’s fingerprint biometric solution significantly shortened our path for adding secure fingerprint biometric authentication services to our Stellar POS platform,” said Jose Rivas, founder and CEO, BigWise Corporation. He adds, “We were able to move very quickly to give our customers valuable new capabilities for stopping internal theft and fraud while simplifying employee access to the Point of Sale (POS) terminal. We expect our lead customer to roll out this new biometric-enabled Stellar POS solution in their operations in the very near future and are excited about the product’s broader market opportunities for us.” EikonTouch fingerprint biometric readers Taking advantage of DigitalPersona’s intuitive biometric software development tools, BigWise added fingerprint biometrics to their POS offering in a matter of weeks. The new solution allows customers the flexibility of choosing the HID Fingerprint biometric reader that meets their requirements, including the DigitalPersona 4500 and EikonTouch fingerprint readers. With the addition of fingerprint biometrics, Stellar POS gives organisations not only a more convenient way to login to their POS terminals but also allows them an effective way to stop labor hour fraud as well as POS theft due to unauthorised manager overrides and approvals. Stellar POS end-to-end solution “We are pleased to have helped BigWise complete this biometric authentication pilot and shorten time to market for its exciting new offering,” said Wladimir Alvarez, senior director of Sales LAM, Extended Access Technology Business Unit with HID Global. “In addition to securing their POS systems DigitalPersona fingerprint biometrics finally allows Bigwise customers to eliminate their dependence on insecure and costly passwords and swipe cards.” Stellar POS provides an end-to-end solution from the store floor or restaurant counter Stellar POS provides an end-to-end solution from the store floor or restaurant counterStellar POS provides an end-to-end solution from the store floor or restaurant counter through the full range of inventory, logistics and production processes and makes it easier to manage offers and promotions, loyalty programs, and accounting and treasury operations. BigWise sells the Stellar POS solution primarily in Colombia, Chile, Argentina and Peru. Identity management HID DigitalPersona biometric readers along with the DigitalPersona software development kit (SDK) solves security and identity management challenges for hundreds of millions of users around the world. To get developers off to a quick start, HID’s DigitalPersona developer kit includes hardware samples, downloadable royalty-free SDKs, sample code, documentation and membership in HID Global’s Crossmatch Developer WebPortal.
Bolloré Logistics is one of the top ten transport and logistics companies in the world. Its warehousing and logistics facility near Auckland Airport, New Zealand, has seen significant growth in recent years and often handles in excess of 2,000 items in a day. As a customs bonded warehouse, the location is subject to strict security requirements. All movements and processing in the warehouse must therefore be monitored closely, as the consequences of damage to facilities or loss of stock could be catastrophic. A combination of c25, v25 and i25 hemispheric cameras, along with several MOBOTIX Dual D15 cameras, provides complete coverage of the 6,600-square-meter site. The new system provides full visibility of the warehouse aisles to protect both employees and customers should an incident occur. Tool for risk management A security system that enables monitoring of business processes and guarantees the availability of historical footage can help companies avoid facing expensive compensation claims. As such, the MOBOTIX system is an invaluable tool for risk management, compliance enforcement and dispute resolution. The stream of metadata generated alongside the video feed cannot be manipulated, which ensures that the images will hold up in a court of law. Moreover, this kind of security system even helps save money: Some insurance companies reduce their premiums when this kind of system has been installed.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbour for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbour in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbour complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analysing people's behaviour. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?