From asphalt to apps, Bosch has implemented a connected security solution for the Frechen truck stop near the A1 to protect people and freight from assaults. The modern parking area near Cologne now has around 40 parking spaces that meet the high-security standards of the Transported Asset Protection Association’s (TAPA) according to the Level 2 certificate and are therefore particularly secured. From now on, forwarding companies can book these via the Bosch Secure Truck Parking app...
Following a successful US launch, global aviation services group Air Partner launches Tour Protect in the UK, the first COVID-19 travel protection programme for the touring music and entertainment sector. As ‘Freedom Day’ looms fast on the 19th of July, the music and entertainment industries are gearing up for everyone’s safe return to stadiums, arenas and clubs. Despite the exciting prospect of enjoying life free of restrictions, living with COVID-19 ensures safety will remai...
Thermal imaging specialist Thermoteknix has been awarded a contract to supply the UK Ministry of Defence (MoD) with its ClipIR XD-E Thermal Clip-on systems (TCOS). The first phase of units, in excess of £3 million, will be delivered within the next 12 months under the TCOS program with options to procure additional units over the life of the contract. Provides situational awareness The ClipIR XD-E systems will deliver enhanced situational awareness and increased threat detection capabil...
As Carnival Cruise Lines welcomes Mardi Gras, its first ship powered by liquid natural gas, to Port Canaveral this Friday morning, every business sector that supports the cruise industry, as well as eager passengers, welcome the resumption of cruising in the United States this summer. Celebrity Cruises will offer the first cruise ship conducting passenger operations since the shut-down, with Celebrity EDGE set to sail on June 26th, 2021 from Port Everglades. Terminal security services “...
The Security Industry Association (SIA) has announced the agenda and speaker lineup for Part 2 of the 2021 SIA GovSummit, its annual public policy and government security technology conference. SIA GovSummit 2021 is being held as a three-part virtual conference, the first of which took place on April 28, with Parts 2 and 3 taking place on June 9 and Sept 21, 2021, respectively. SIA GovSummit 2021 Part 2 Each year, SIA GovSummit brings together government security leaders with private industry...
Organisations around the world sent an unprecedented number of people home during 2020 to work and attend school remotely, many of them with Chromebook laptops whose shipments more than doubled year over year. HID Global, identity solutions company, is helping organisations bring these people and their Chromebooks back to a hybrid work and classroom environment using its HID HydrantID Account Certificate Manager (ACM) digital certificate management offering. Seamless connections Accordi...
Ping Identity, the Intelligent Identity solution for the enterprise, has centralised Identity Access Management (IAM) for over 300,000 DB Schenker employees, contractors, partners, and customers. The successful project, conducted in partnership with iC Consult, streamlined the management of critical security policies and enhanced secure access and authentication to business applications. Secure authentication service DB Schenker is one of the world’s leading global logistics providers, with 2,100 locations and more than 76,900 employees across the world; it supports the exchange of goods through land transport, worldwide air, and ocean freight. After identifying the need for a more secure and modern authentication service, DB Schenker saw an opportunity to accelerate a digital transformation initiative and provide more streamlined access to resources for its workforce, partners, and customers. Expanding IAM “The goal was to extend our existing identity and access management (IAM) infrastructure to secure employee access and take advantage of the cloud,” said James Naughton, Head of Identity Management at DB Schenker. “In the past, we needed to invest significant time and resources to develop integrations, but now we simply configure the system and can deliver technically complete interaction in 30 minutes, decreasing effort by 75%.” Centralised identity management DB Schenker used Ping Identity to deliver a consolidated and centralised identity management service Working closely with iC Consult, IAM consultant, and systems integrator, DB Schenker used Ping Identity to provide the authentication and authorisation capabilities needed to deliver a consolidated and centralised identity management service. The project utilised PingFederate, PingAccess, PingID, PingOne, and PingDirectory, impacted over 300,000 identities, and involved the migration of 50 business applications to the new authentication service. Two-step authentication “DB Schenker’s identity team can now centrally manage critical security policies and control access and authentication to their applications,” Naughton explained. “The addition of FIDO2-enabled risk-based two-step authentication allows us to provide an even higher level of security for access to the DB Schenker IT landscape, creating peace of mind for both our team, partners, and customers.” Identity journey “This is only the beginning of the identity journey for DB Schenker,” said Emma Maslen, VP, and general manager of Ping Identity, EMEA & APAC. “We will continue to seek new ways to push the boundaries of identity and provide MFA to every employee to improve workforce productivity.”
Security and Safety Things GmbH has announced the launch of its second App Challenge to spur additional creative development in video analytic applications. Through April 26, 2021, participating developers have the opportunity to submit proposals for apps to address specific security, safety and business optimisation use cases in the retail, transportation, stadiums and entertainment, and healthcare verticals. S&ST open camera OS and IoT platform The apps will be designed to run on smart cameras using the S&ST open camera OS and IoT platform The apps will be designed to run on smart cameras using the Security & Safety Things open camera operating system (OS) and S&ST open IoT platform, which enables cameras to run a variety of applications simultaneously, in order to perform different functions. The camera OS is based on the developer-friendly Android Open Source Project (AOSP). “While many vertical markets share a core set of operational needs, individual organisations also have unique requirements based on the nuances of their location, customer base or other circumstances,” said Adam Wynne, Head of the Security & Safety Things Innovation Accelerator based in Pittsburgh. Adam Wynne adds, “We are calling on the collective creativity and unique perspectives of the developer community to help solve distinct customer challenges, whether that’s a standalone solution or one based on a combination of different applications.” Creating innovative video analytic applications For this year’s challenge, a variety of system integrators responded to an S&ST survey asking for customer needs and challenges in the four vertical market categories. Based on this feedback, developers will be tasked with creating innovative video analytic applications to address a host of different use cases, including: Unmanned aerial detection for drones and other flying objects in stadiums, or during large events. Suspicious behaviour analytics for the detection of fighting or stealing. Customer conversion and ‘out of stock’ analytics in retails spaces. Cargo protection for the detection of vandalism and theft in parking lots and other facilities. Hygiene and PPE checks in healthcare facilities, as well as anomaly detection for unusual behaviour in elder-care facilities. ESCON 2021 Three winners will be chosen by a jury of 20 prominent system integrators Three winners will be chosen by a jury of 20 prominent system integrators and will be awarded individual prizes of 10,000€ (Euros) each. Winners will also be invited to showcase their solution at the Security & Safety Things (S&ST) booth at an upcoming event, ESCON 2021, depending on the COVID-19 situation. All participating developers will be able to benefit from various co-marketing opportunities with Security & Safety Things GmbH, throughout the duration of the App Challenge. App Challenge The winning apps from the 2020 App Challenge provided solutions for retail and commercial buildings, transportation and smart city, and manufacturing and logistics categories. Overall, the challenge resulted in 20+ new applications being added to the Security & Safety Things Application Store. How it works: Developers can submit multiple proposals for more than one vertical by April 26, 2021. Proposals will be reviewed and the most promising will be chosen by the Jury to proceed with development. Developers will have from April 29 to July 31, 2021, to create their solution(s). Once developed, the app will need to be uploaded to the Application Store by July 31, 2021. S&ST and the jury will test and review the apps. Winners will be chosen by the end of August, 2021. Developers can apply for the App Challenge by submitting their proposals latest by April 26, 2021 on the app challenge page on Security and Safety Things GmbH’s official website.
The Protege Group, a prominent securities transportation specialist in Brazil, has specified its first fully automatic transmission as part of a pilot project to evaluate new armoured cash transport trucks. Two armoured high-value cargo light trucks, a Volkswagen 9.160CE and a Mercedes-Benz 915 E, have been equipped with an Allison 2000 Series™ transmissions. The trial of fully automatic transmissions is designed to make the company’s operations more efficient and productive by improving vehicle agility and robustness, and by extending the life of the transmission and engine components. They are exceeding the company's expectations. Investment and automatic transmissions "The Protege Group invests heavily in the well-being and safety of its employees, and automatic transmissions greatly reduce the physical and mental wear on the driver," explains Nelson Dias, Automotive Engineering Manager at the Protege Group. "The state of alertness for a prompt reaction in any critical situation is a fundamental condition for good work in our segment." Manual transmission gears “Automatic trucks have been shown to be less stressful for drivers and for the respective working teams, as they are not subject to the swings so common during the shifting in manual transmission gears,” said Dias. “The teams are unanimous that there is less physical wear and tear throughout the workday.” Shorter vehicle downtime Another finding of the Protege Group’s trial is shorter vehicle downtime. Automatic transmissions do not require clutch systems maintenance, which is common in manual transmissions. In addition, they provide a more homogeneous operation of the powertrain, avoiding engine overdrive while acting as auxiliaries to the brake system. Allison 2000 Series Allison 2000 Series automatic transmissions are designed to equip light commercial vehicles for both cargo and public transport applications. They can be equipped with a Power Take-Off (PTO) output and have six gears, including overdrive, which guarantees a more agile and simpler operation. They also have advanced Allison 5th Generation electronic controls, which improve productivity and efficiency strategies as per the needs of the vehicle.
Acquisition of business units of South African electronics and solution provider to complement HENSOLDT’s portfolio and expand footprint in Africa. HENSOLDT South Africa has signed an agreement to acquire the Air Traffic Management (ATM) and Defence & Security business units of Tellumat. The acquisition will see HENSOLDT further expand its portfolio as well as its presence in Africa. The agreement was signed by Rynier van der Watt, Managing Director of HENSOLDT South Africa and Andrew Connold, CEO of Tellumat, during a virtual ceremony hosted by HENSOLDT at its offices in Pretoria on 26 June. Defence electronics providers The transaction will be effective as soon as all regulatory approvals have been obtained. “With this transaction we are combining the activities of two defence electronics providers and strengthening our position as a defence, security and electronics brand in South Africa,” Van der Watt said. “The complementary product portfolios of HENSOLDT South Africa and Tellumat create a complete sensor solutions offering, that is in line with that of the HENSOLDT Group,” Van der Watt added that, “We will create new products and services that will build upon the significant expertise that is being acquired.” Air Traffic Management portfolio includes the supply, installation and maintenance of radar HENSOLDT South Africa and Tellumat have business areas that complement each other, including sensors and communications, particularly for unmanned aerial vehicles and other airborne intelligence, surveillance and reconnaissance (ISR) applications. The acquired activities represent a workforce of more than 100 people across offices in Cape Town and Pretoria, with demonstrated expertise in a range of capabilities complementing HENSOLDT South Africa’s offering. Air Traffic Management Tellumat’s defence and security portfolio covers identification friend or foe (IFF) systems, tactical communications (including radio and video links), and unmanned aerial vehicle (UAV) systems, including a full suite of data links and avionics. Its Air Traffic Management portfolio includes the supply, installation and maintenance of radar, navigational, voice communication and runway lighting systems for military and civilian airports. Tellumat was established in 1963 as Plessey South Africa, and became Tellumat in 1998 Tellumat was established in 1963 as Plessey South Africa, and became Tellumat in 1998. Over the decades it has built up vast skills and experience that have created a rich history and heritage. “While this new relationship advances the legacy of Tellumat’s well-proven and innovative products, services and solutions, it also further expands the sales reach of the acquired business units through the global footprint of the HENSOLDT Group,” Connold said. The transaction is in line with HENSOLDT South Africa’s aims to see targeted growth and expansion as the company focusses on both the local and international markets. Since HENSOLDT South Africa was formed in September 2019 as the brand housing HENSOLDT Optronics and GEW, it remains deeply committed to investing in the growth of its footprint in South Africa and the acquisition of the Tellumat business units is an example of that commitment. Expand global footprint Celia Pelaz, HENSOLDT Group Executive responsible for South Africa said that, “This acquisition is a further step in the HENSOLDT Group’s commitment to continue to invest in South Africa and to grow HENSOLDT South Africa as one of its home countries,” Pelaz added that, “We are leveraging the power of the HENSOLDT brand to expand its global footprint and open new market opportunities for the South African business.” The Tellumat transaction proves that HENSOLDT South Africa is well positioned to achieve its goal of becoming the sensor solution and defence electronics house in the region. HENSOLDT believes that international investment and cooperation utilising local infrastructure, skills and capacity is a proven recipe for local economic growth and business success.
Aqua Security, the platform provider for securing cloud native applications and infrastructure, announced that its open source Trivy vulnerability scanner is now available as an integrated option in several widely deployed cloud native platforms. Trivy is a comprehensive and easy-to-use open source vulnerability scanner for container images. Since its introduction 10 months ago, the project has gained a broad following among open source community members who have tagged it with more than 3,300 GitHub stars. Unlike other open source scanners, Trivy covers both OS packages and language-specific dependencies and is extremely easy to integrate into organisations’ software development pipelines. Integrated scanning option Trivy is now available under the Apache 2 license, allowing royalty-free use, modification, and distribution of the software. Trivy will be included as the default scanner in Harbour, a popular open source container image registry project under the Cloud Native Computing Foundation, and in addition, the widely used container platforms Docker and Mirantis Docker Enterprise will make Trivy available as an integrated scanning option for their deployments. “Trivy takes container image scanning to higher levels of usability and performance. With frequent feature and vulnerability database updates and its comprehensive vulnerability scanning, it is the perfect complement to Harbour. In fact, we made it the default scanner option for Harbour registry users in the upcoming v2.0 release because of these capabilities,” said Michael Michael, Harbour Maintainer and Director of Product Management at VMware. “With Trivy, Harbor users can easily and quickly scan their container images for vulnerabilities on an ongoing basis.” Flexible container management platform technology After evaluating several leading options for open source vulnerability scanning, Trivy really stood out" “Trivy is a container image scanner that is so incredibly easy to use and fast to scan,” added Justin Cormack, Security Lead at Docker and a member of the CNCF Technical Oversight Committee. “It suddenly means that vulnerability scanning becomes easy to integrate into your daily routine, scripts and CI, which is the way it should be” "After evaluating several leading options for open source vulnerability scanning, Trivy really stood out,” said Milind Gadre, VP of Engineering at Mirantis. “Mirantis will enable Trivy as an integrated component that's verified as compatible with the Docker Trusted Registry included in our Docker Enterprise solution. We're extremely excited to extend our leadership in secure, flexible container management platform technology for organisations with challenging security and compliance concerns.” Cloud security posture management Liz Rice, VP Open Source Engineering at Aqua and Chair of the Cloud Native Computing Foundation’s (CNCF) Technical Oversight Committee (TOC) leads the team of dedicated open source developers at Aqua who work on the company’s open source software and also actively contribute to other community projects. “Our team is excited by the level of interest in and adoption of Trivy, and this increases our determination to make Trivy the most widely adopted open source solution for container vulnerability scanning.” said Rice. Trivy is part of Aqua’s portfolio of open source cloud native security projects, including: kube-bench: Winner of the 2018 InfoWorld Bossie Awards, kube-bench automatically determines whether Kubernetes is configured according to recommendations in the CIS Kubernetes benchmark. kube-hunter: Penetration testing tool searches for weaknesses in Kubernetes clusters so administrators, operators and security teams can identify and address any issues before attackers are able to exploit them. Tracee: Traces events in containers using eBPF, a kernel technology that lets users run custom programs within the kernel itself. CloudSploit: Provides cloud security posture management (CSPM), evaluating cloud account and service configurations against security best practices. kubectl-who-can: An extension to the standard kubectl tool that simplifies queries about Kubernetes role-based access control (RBAC) configuration.
ISC West, a converged security event in the United States, introduces the lineup for its 2020 SIA Education@ISC sessions, in collaboration with premier partner the Security Industry Association (SIA). Together, SIA and ISC West will be making educational sessions available during ISC West, taking place March 17-20, 2020, (SIA Education@ISC: March 17-19 | Exhibit Hall: March 18-20) at the Sands Expo in Las Vegas, Nevada. The comprehensive programme includes nearly 100 accredited sessions covering a range of industry topics, such as connected security, unmanned systems, smart cities, loss prevention and supply chain and more, designed to provide the necessary knowledge security professionals require to prevent threats and make a real-world impact in an increasingly converged security landscape. SIA Education@ISC session snapshot Day 1 Keynote: Wednesday, March 18, 8:30-9:30 a.m. Scaling enterprise risk management at the speed of global transportation: Charles Burns, Head of Security – new mobility, Uber, will explain how Uber navigates a challenging landscape by using technology to enable their business, secure company assets and ensure the safety of riders and drivers globally. Day 2 Keynote: Thursday, March 19, 8:30-9:30 a.m. On the edge of transformation: Securing a connected future with IoT (Brought to you by Amazon Web Services (AWS)) Michael MacKenzie, General Manager, Amazon IoT Connectivity & Control at AWS, will explain how AWS IoT enables organisations to protect the evolving security-focused Internet of Things ecosystem, built on the rapidly progressing marketplace underscored by the convergence of our digital and physical worlds, in order to secure the connected world of tomorrow. Safety and security “I dreamed a dream”: Leading in the smart/safe/connected city revolution There are millions of devices already deployed in cities across the country and around the world. With billions more coming, those devices have a significant impact on the delivery of a range of services including safety and security. In this session, there will be a discussion of how to form a smart/safe/connected city strike force to create a positive business environment and mitigate public safety threats. Security on the ledge: Transforming Willis Tower, an American icon For a U.S. Department of Homeland Security (DHS) SAFETY Act designated site, balancing the demands of the building’s distinction with the competitive leasing market and trends toward open, collaborative workspaces is a challenging feat. This session will explore how the design team weaves physical security and technologies into the renovation, embracing a five-star operational experience in this high-population, high-throughput symbol of Chicago. Capitalise on robotics technology How robotics enables cyber security with a human touch Access control is a vital element of any cyber security program – it can tell you who has badged into the system, but not who is actually on the premises. Integrating robots with a security team can capitalise on robotics technology with the human factor to help security managers know who is in the facility after hours and to help protect an organisation from cyber breaches. Diversity & inclusion in the security industry: User’s Questions Answered! Does a user know the meaning of (and the difference between) “diversity” and “inclusion”? Do they know how diversity and inclusion (D&I) can contribute to their business goals and help achieve competitive advantage? This session will explore how the topics of D&I are important to the success of the security industry now and in the future. First responder operations DHS town hall meeting at ISC West: Enhancing security and doing business at the speed of life DHS is changing the way it does business in areas of contracting, tech-scouting and experimentation and seeks new ideas and partners to enhance security and accelerate technology solutions. This meeting will explore what DHS is doing today to release old constraints to ensure things like passenger checkpoints, cargo container screening and first responder operations. “Each year, our goal is to keep our finger on the pulse of the converged security issues driving our industry forward and provide our attendees with the education they need to deal with the complex security threats they’re faced with every day,” said Will Wise, Group Vice President, Security Portfolio at Reed Exhibitions. Loss prevention and supply chain Attendees will hear from Jaime Paris Boisvert, General Manager for Siemens Smart Infrastructure" “In 2020, we’re emphasising on major trends, such as unmanned security and smart cities, while introducing new programming on topics attendees have asked to see incorporated, such as loss prevention and supply chain. We’re evolving to meet the educational needs of our audience.” In addition to the nearly 100 education sessions, ISC West and SIA will be holding the SIA Women in Security Forum Breakfast at ISC West, brought to you by Siemens, on Friday, March 20. Attendees will hear from Jaime Paris Boisvert, General Manager for Siemens Smart Infrastructure, and have the opportunity to network with their peers during the complimentary breakfast. Cutting-edge sessions “SIA and ISC West deliver the most robust and compelling educational programming possible through the SIA Education@ISC West conference program,” said Dr. Elli Voorhees, Director of Education and training at SIA. “Each year, SIA volunteers review many expert conference proposals to determine the most cutting-edge sessions and topics that will drive success for the industry.” Registration for ISC West is officially open. Exhibit Hall registration includes access to all the featured exhibits: Connected Security, Drones & Robotics, Emerging Tech, Loss Prevention & Supply Chain, Public Safety and Smart Home (sponsored by Alarm.com).
AI has opened doors to many transformation opportunities and increasingly minimised many risks -- personal and economic -- that are alarming today. And illicit trade is one of those pains AI can offer a promising solution against. Illicit trade is a serious threat and problem that affects governments and societies on every level. While governments lose financial funds in tax revenues, thriving businesses are losing potential customers, and customers are getting tricked into purchasing counterfeit, low-quality products. Transnational organised crime generates revenue of $2.2 trillion through transnational criminal organisations, complicit corrupt facilitators, and other threat areas. The list of criminal activities is long and involves such horrific crimes as trafficking of narcotics, opioids, arms, humans, fake medicines and other counterfeit and pirated goods; illegal tobacco and alcohol; illegally-harvested timber, wildlife, and fish; pillaged oil, diamonds, gold, and other natural resources and precious minerals; stolen antiquities; and other contraband or valuable items sold across streets, social media, online marketplaces, and the dark web. In short, illicit trade is a contributing cause to large-scale insecurity and instability across markets. AI-driven technologies Here is where revolutionary AI-driven technologies come in, with their capability to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. There are a few ways that AI can support the ongoing fight against illicit trade on a global scale in a tangible way. Transnational organised crime generates revenue of $2.2 trillion For financial transactions at risk of fraud and money laundering, tracking has become an increasing headache if done manually. As a solution to this labour-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents -- often billions of pages of documents -- in a short period of time. Among these documents widely in circulation, most have an unstructured and inconsistent format -- from invoices to insurance documentation -- are a complex system to tackle; in this whirlwind of pages, the likelihood of non-compliant and misrepresented figures to go by unnoticed. But this is also where AI can thrive as solutions become a necessity, enhancing humans’ capabilities of identifying fraud risks in the early stages. Relying on natural language processing, the technology can begin interpreting the text from the scanned and digitised documents in order to process trade information at high speed. In this context, AI-powered solutions are capable of comparing, contrasting document information and identify anomalies worth looking into further. By automating a large portion of the process, AI-driven technology allows the staff to focus on more pressing, high-involvement issues that require human judgement while saving time on the time-consuming manual work of analysing documents by hand. Identifying covert interactions between criminals As criminal networks become increasingly intricate in their illegal operations, cutting-edge AI technology is crucial in the battle against it. In 2019, EU launched a project with the goal to deploy advanced AI technology and robots to identify smuggling across the borders of Portugal, Estonia, Italy, Greece, Bulgaria, Romania and Hungary. With the help of AI, it will be possible to send drones and autonomous vehicles to the most dubious border areas in order to enforce border control and detect smugglers quickly and efficiently. Illicit trade triggers a chain reaction of negative impact across industries, governments and individuals The issues the EU is trying to address through the project include drug and weapon smuggling, as well as human trafficking. From tight border control tracking crossings to communication monitoring to identify covert interactions between criminals on both sides of the border, the project is one among many that will expand the scope of solutions to the illicit trade problems today. AI’s contribution is significant on many levels: from predicting crime and threats to safeguarding public health and safety (in face of human trafficking, counterfeit medicines, and toxic products), these are simply inklings of major shifts that AI technology promises for the future of the battle against illicit trade. So why is fighting illicit trade so crucial? Here are a few reasons why AI’s role in fighting this global issue is crucial. In a world where customers run the risk of being deceived and tricked into buying counterfeit products, companies who provide the original products suffer through the loss of revenue and market share. The same companies are also robbed of their intellectual property and proprietary data. Furthermore, people who are employed in these companies run the risk of losing their jobs as a result of revenue and market share loss. And finally, the last straw is the loss of brand integrity and reputation to the need to compete with low-quality, sometimes even dangerous counterfeit products. Just like a domino effect, illicit trade triggers a chain reaction of negative impact across industries, governments and individuals. And it’s time for AI to step in and stop it.
The customer is involved in shipping and transportation at a local port, responsible for docking ships, offloading, storage, and distribution of cargo. Due to the nature of their business, coupled with the constraints and logistics of their physical geography, the property is tightly regulated as to who can, or cannot gain access. In addition to their internal regulations and protocols, they are subject to directives and requirements of the Department of Homeland Security along with the Department of transportation. As the port expands both in acreage and volume, being able to more thoroughly and accurately identify personnel as they ‘come and go’ becomes increasingly vital. Challenges As Securiteam began its discovery and design process, two major issues need to be accounted for: Transportation workers are required to carry a TWIC card, which serves as a means to validate an individual who may be attempting to enter a port area. The TWIC card utilises FIPS technology, a level of data encoding that contains more information than with a standard Weigand output. This data would then be displayed on a monitor at 2 attended guard stations to provide staff with a method of visual verification. The means of Transportation Worker validation would only serve as a first step in the organisation’s overall Physical Access Control System (PACS) deployment. The actual comprehensive access control system would not be installed for 18 months from the completion of the initial phase. The factors, combined with additional “wants” of the stakeholders (centralised remote management, ease of operation, database migration, video integration, etc…) meant that whatever system installed would by necessity have to be scalable nationally as well as locally. This could not be treated as a standard “6 doors” access control system. The chosen solution would require creativity as well as technical skill to successfully configure. Linus based access control solution Securiteam utilised a Linux-based, embedded access control solution along with FIPS-compliant readers Because of the requirements for conclusive validation of identification, Securiteam utilised a Linux-based, embedded access control solution along with FIPS-compliant readers. These initial appliances have been combined with a server interface to a national TWIC holder database ensuring that the information received by guards at the point of port access is as current and accurate aspossible. This initial phase has since been incorporated into an overall port access control system which serves not only to validate but to regulate who is granted access where and under what conditions. Scalable Having used the system for over 2 years, the client is extremely pleased with how the initial deployment has exceeded their original requirements and expectations. The scalability of the overall solution has ensured that further deployment can proceed without additional investment in infrastructure or software. Additionally, the database, along with permissions and allowances, can be managed remotely at the corporate headquarters. Data upgrades The end-user is that the server is eligible for firmware upgrades when improved technology is available Finally, the infrastructure will enable the rollout of similar design solutions at other port locations within the area and nationwide. As a person is entered into the system, they can be granted access at any site within the network. Another benefit for the end-user is that the server is eligible for firmware upgrades when improved technology is available for distribution, ensuring that their technology is never out of date. Finally, the company was able to pass along to the customer the lower installation costs and economies of scale available with an IP-based solution. As a result, less of their investment dollar went toward labor costs and expendables such as wire and hardware associated with older, less technologically advanced, analog systems, and more was invested in the flexibility of the technology.
FLIR was selected to provide intelligent dual-vision cameras with embedded Automatic Incident Detection (AID) to be installed in the new Hundvåg and Eiganes tunnels in Norway. The cameras alert tunnel operators on a variety of possible traffic incidents, including stopped vehicles, lost cargo, and pedestrians, allowing emergency services to react fast. The Ryfast project Norway has complex geography. The many fjords, glaciers, and mountains make traveling without natural obstacles a challenge, which is why the country has so many tunnels. The Ryfast project is one of the country’s most recent additions in tunnel infrastructure, running from the city of Stavanger to the municipality of Strand. It is also Norway’s largest road project to date. The Ryfast project consists of three tunnels. The 14.4 km Ryfylke tunnel, running from the village of Tau to the isle of Hundvåg, was opened in December 2019. The 5.5 km Hundvåg tunnel, from Hundvåg to Stavanger, was opened in April 2020. The latter tunnel connects with the 3.7 km Eiganes tunnel, which runs beneath the city of Stavanger, as part of the E39 coastal highway. Safety in dense traffic Trafsys again selected FLIR Systems to deliver the AID camera technology When the Norwegian Public Roads Administration (NPRA) and tunnel contractor were looking for a reliable tunnel safety system for the Hundvåg and Eiganes tunnels, they intended to uphold the same high safety standards the organisation is known for. This is especially critical given the dense traffic situation in the twin-bore tunnels - 10,000 and 35,000 daily vehicles for the Hundvåg and Eiganes tunnels respectively. For both tunnels, Nordic system integrator Trafsys was selected to supply the Traffic Control & Monitoring system, video surveillance (CCTV), and Automatic Incident Detection (AID), among other things. Trafsys again selected FLIR Systems to deliver the AID camera technology, based on both companies’ many years of experience in tunnel safety projects. FLIR’s detection systems “We were already convinced of the stability of FLIR’s incident detection systems because we have been using them in previous tunnel projects,” says Knut-Olav Bjelland, Department Manager at Trafsys, AS. “FLIR’s powerful detection algorithms on visual traffic cameras have proven their performance in tunnel projects worldwide. With FLIR’s dual-vision cameras, we were able to combine the company’s proven video analytics with the power of thermal imaging.” Visual and thermal in one camera In total, 332 FLIR cameras have been installed in the Hundvåg and Eiganes tunnels combined Trafsys chose FLIR’s ITS Series Dual AID cameras, which combine a thermal and visual camera with FLIR’s advanced video analytics. In total, 332 FLIR cameras have been installed in the Hundvåg and Eiganes tunnels combined. With the thermal imaging camera, the FLIR ITS Series Dual AID provides critical information on traffic incidents, including stopped vehicles, sudden speed drops, wrong-way drivers, pedestrians, fallen objects, and starting fires. Operators also use the high-resolution (640 x 512 pixels) thermal image to verify the incident and to see where the incident took place. The use of thermal imaging cameras has especially proven valuable for tunnel entrances and exits. There, shadows or direct sunlight could obstruct the view of the visible-light camera and therefore disturb traffic detection. Because they detect heat, not light, thermal cameras have no issues with these phenomena and as a result, they can detect traffic 24/7, in all weather conditions. Detection and performance “When you look at the complex topography of the Hundvåg and Eiganes tunnels, a camera system like the FLIR ITS Series Dual AID is the most efficient technology choice,” says Knut-Olav. “And with the many bends and turns in both tunnels, you need appropriate detection systems at many different positions.” “The cameras’ daily performance is excellent,” says Anders Helle, Construction/Maintenance Manager at NPRA. “We can clearly see the detected incidents on the thermal image in our control room, which reduces the time to understand the situation and speeds up our decision-making process. Based on the system’s reliability, performance, and low unwanted alarm rate, we would definitely recommend the FLIR dual-vision camera for automatic incident detection.” Providing safety in tunnels “We are honoured to be selected for this major tunnel safety project,” says Sukhdev Bhogal, Business Development Director at FLIR Systems. “It is the first time that our FLIR ITS Dual AID cameras have been deployed in such large numbers, and we are looking forward to making more tunnels in the region a safer place to travel through.” Safety is critical, given the dense traffic situation in the twin-bore tunnels - 10,000 and 35,000 daily vehicles for the Hundvåg and Eiganes tunnels respectively. Early fire detection The dual cameras’ fire detection functionality demonstrates the early detection capability within seconds “Apart from the great detection performance we are used to from FLIR, having a combined visual and thermal camera from one vendor has nothing but benefits,” says Knut-Olav. “Combining both cameras into one detection unit makes it a very compact solution, and cabling is also much simpler.” The dual cameras’ fire detection functionality has also been switched on to demonstrate the early detection capability within seconds of the appearance of visible flames. This could be crucial for tunnel operators to close the tunnel fast and take the necessary decisions in the case of a fire. The thermal technology from FLIR ITS also allows seeing through the smoke. This allows operators to detect the presence of pedestrians and vehicles in a smoke-filled traffic tunnel. The fire detection functionality was already demonstrated when a car caught fire in the Hundvåg tunnel in July 2020. The FLIR ITS Dual thermal AID camera picked up the fire within 7 seconds after visible flames appeared, following its first alert for a stopped vehicle and pedestrians.
Leonardo is pleased to announce that Miami-Dade Fire Rescue (MDFR) has taken delivery of its first AW139 helicopter. The October 13 handoff included a small ceremony at Miami Executive Airport (TMB) in Miami-Dade County, Florida. Officials from the County, including Mayor Carlos A. Giménez, spoke at the event. “As a former firefighter, I’ve been very impressed with this world-class search-and-rescue helicopter,” said Mayor Giménez, adding “Replacing antiquated helicopters, the AW139 is a vital addition to Miami-Dade Fire Rescue’s fleet. They will provide a heightened level of safety and security for our Fire Rescue workers and those whose lives they work to save.” AW139 aircrafts delivered to MDFR MDFR ordered four AW139 aircraft in December 2019 for fire suppression, EMS, search and rescue missions Miami-Dade Fire Rescue (MDFR) ordered four AW139 aircraft in December 2019 for fire suppression, emergency medical services (EMS), and search and rescue missions. Each helicopter features a cargo hook, rescue hoist and Bambi bucket. The remaining three aircraft are expected to be delivered by the end of 2020. MDFR protects people, property, and the environment by providing proactive responsive professional and humanitarian fire rescue services essential to public health, safety and well-being. Miami-Dade Fire Rescue Miami-Dade Fire Rescue (MDFR) operates 71 fire-rescue stations within unincorporated Miami-Dade County and serves 29 municipalities. Due to the impressive scope of its rescue operations, Miami-Dade Air Rescue frequently provides mutual aid support to neighbouring counties including Monroe, Collier, Broward and Lee. Miami-Dade is the most populous county in Florida with over 2.7 million people and more than 2,000 square miles (larger than the US states of Rhode Island and Delaware). From the coral reefs to the Everglades the unique subtropical environment of South Florida makes this area unlike any other in the United States. Fire suppression, EMS, search and rescue operations With over 1000 deliveries to date, the AW139 is the most successful global helicopter program in the last 15 years. More than 280 operators in over 70 countries use the AW139 for a wide variety of missions including fire suppression, emergency medical service, search and rescue, security/ law enforcement, energy services, and private transport. Leonardo is committed to serving and protecting communities around the world, contributing to their sustainable growth by being in the forefront in next generation technologies. Partnering with governments, private organisations and industries for the best security and safety capabilities is a cornerstone of the Leonardo’s BeTomorrow2030 Strategic Plan. In the United States, AW139 customers include the Los Angeles Fire Department (LAFD), New Jersey and Maryland States Police Departments, among many others. The US Air Force (USAF) will soon introduce the AW139-based Boeing MH-139 to replace the UH-1N fleet.
With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network during a time of social distancing. IT professionals can quickly review the cyber posture data in case of a cyber-breach. Razberi Monitor™ provides secure, remote visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Remote monitoring The tool simplifies the monitoring and support of a multi-site enterprise security system, predicts and prevents problems for security professionals while providing a centralised view that benefits both IT and Physical Security departments. We have listened to the surveillance industry and created our software platform to enhance relationships" According to Tom Galvin, Chief Product Officer, Razberi Technologies, "We have listened to the surveillance industry and created our software platform to enhance relationships and align Physical Security and IT departments. Razberi Monitor allows security professionals to be proactive by predicting problems." Aligning network and surveillance departments Razberi Monitor's software platform, paired with Razberi's video recording and switch appliances, has enabled Tropical Shipping to save on the cost of sending maintenance crews to check on potential issues in their US and Caribbean facilities. "Our network is highly distributed across the US and Caribbean with up to 125 users viewing camera feeds at one time. Razberi Monitor has helped us increase our camera uptime assurance and align our network and surveillance departments," said Chad Nelson, Director of Security, Facilities and Cargo Compliance, Tropical Shipping. "They now have a clear view of all operations, and it puts me in the driver's seat to be able to provide specific alerts to each port remotely, quickly and more efficiently than sending a tech to troubleshoot."
Airports are transportation hubs often located within close proximity to hotels, eateries, retail stores and sports venues. For this reason, large airports can have thousands of people approach their perimeter each day. With such a high throughput of people, security technology that detects and deters external threats is essential. When it comes to intrusion detection systems, there are several technology options, including buried pressure sensor cables, fibre optic sensors and behavioural analytics. However, an effective solution seeing increased adoption recently are thermal imaging cameras with built-in analytics. Lessons can be learned from integration firms like Ojo Technology, who oversaw the deployment of a FLIR perimeter intrusion detection system (PIDS) at Norman Y. Mineta San Jose International Airport (SJC) in 2017. Here are four advantages of thermal cameras that Ken Castle, vice president of business development at Ojo, described based on the SJC deployment. Video analysis and monitoring Thermal cameras produce images based on heat signatures rather than light. Consequently, thermal cameras capture video in total darkness, see through foliage and perform in adverse weather conditions like rain, wind and smoke. Thermal cameras provide a significant advantage for airports. As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images “The combination of darkness and distance demands a different solution, one that can be provided by thermal imaging cameras,” said Castle. “These need no auxiliary illumination, and their field of view can extend for hundreds of feet.” Low false alarm rates As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images ideal for video analytics, detection and classification. “With thermal cameras, the embedded analytics can immediately distinguish between an animal at 50 yards and a human at 300 yards, following their direction of movement,” Castle explained when discussing the PIDS project at SJC. Visual proof to provide qualified alerts Deploying thermal cameras in a PIDS project provides video verification for each alert. Thermal cameras provide the data and visual confirmations that are lacking from traditional fibre-based ‘shaker fence’ systems" “Thermal cameras provide the data and visual confirmations that are lacking from so-called traditional fibre-based ‘shaker fence’ systems, which generate alarms when objects strike a fence or something creates vibration,” Castle said. “The problem is that such alerts could be caused by dogs, wildlife, bicyclists bumping into the fence, tree branches or winds — none of which pose security threats. Those incidents then need to be independently confirmed by cameras. That takes extra steps and therefore consumes what could be valuable time.” Long-range detection and flexible coverage Airport perimeter solutions must have the ability to monitor vast exterior areas, from the parking lot to the terminal to the tarmac to the hundreds of portals in between. Thermal cameras provide that long-range monitoring capability. Castle reiterated this point when describing the FLIR solution deployed at SJC. “The FLIR perimeter camera system is designed to identify any attempted breaches by individuals who might try to gain access to the tarmac or aircraft from outside of the airport boundaries,” Castle said. “It also provides ongoing visibility of vehicle and cycling traffic along the outer fence line, as well as the movement of aircraft, cargo loaders, delivery trucks and service vehicles within the perimeter. Bottom line is that the safety of passengers, airline employees and service workers is greatly enhanced.”
Denmark’s Evotec chose Idesco readers to complete their cargo securing system they had designed for transport companies’ vehicles. Evotec’s system does more than merely preventing cargo theft. Drivers also feel more secure when delivering because hijack risks are also reduced. This is because cargo is robustly secured when drivers leave vehicles behind. Idesco 8 CD 2.0 DESFire readers Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles Danish cargo companies had been struggling with regular delivery cargo thefts. Drivers did not feel secure when delivering and financial losses were growing. Evotec decided to develop a novel vehicle security solution for cargo companies. As part of their solution, Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles. Idesco readers have since been installed on several hundred Danish cargo trucks and vans. Early in their design process, Evotec had seen a clear need to strictly limit access to vehicle’s cargo space to authenticated personnel only. They had known RFID technology could provide accurate, secure user identification and authentication. They learned that Idesco’s MIFARE DESFire readers, paired with 128-bit AES-encrypted DESFire transponders, would easily repel transponder hacking or cloning. Best of all, they learned Idesco designed many of its readers for installing outdoors, reliably resisting impacts, moisture, dirt and temperature extremes. Security Key Management service Idesco’s Security Key Management service saved Evotec extensive time and resources"Bo Schønning, Evotec Aps CEO, described the subsequent cooperation of Idesco with his company, “We got great assistance in choosing the correct solution for our system”. In addition to coded readers, Evotec ApS also subscribed to Idesco’s convenient Security Key Management Service for ensure compatibility with every vehicle’s readers. Since DESFire demands readers and transponders be encoded with matching security keys, Idesco’s Security Key Management service saved Evotec extensive time and resources, freeing them to focus exclusively on installations for their customers’ vehicles without worrying about managing DESFire keys themselves. “We feel safe when Idesco handles this data for our customers”, says Bo Schønning. The cargo drivers of Evotec’s customers are assigned vehicle specific transponders to carry, which open the cargo space when presented to the reader guarding it. For increased security, the driver cabin locks automatically when the cargo space unlocks. Additionally, cargo doors automatically lock when they close and will remain locked when the vehicle’s engine is running. The system works equally well in vehicles equipped with liftgates. Opening the vehicle’s driver cabin with the ignition key doesn’t affect its cargo space: it remains continuously locked. If needed, a vehicle’s cargo space could be opened remotely via fleet management software. If a transponder is stolen, a vehicle’s readers can be reprogrammed to not recognise the transponders. Fleet management and vehicle tracking Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes. The fleet software’s online tracking and route reporting also provides cargo companies a powerful fuel control ability that can reduce fleet costs. “This system has significantly increased drivers’ security at work while reducing costs caused by theft”, notes Bo Schønning, CEO, Evotec ApS. “Fuel costs have also been reduced, as the cars aren’t left idling anymore. It is easier to control the fleet, and our customers can also follow the quality of deliveries with this system”, he continues.” RFID technology Founded in 1989, Idesco is an experienced company in the field of RFID technology. From the very beginning, Idesco was a pioneer in using RFID, deploying it for identification in industrial applications. Down through the years Idesco continued expanding its reputation as a pioneer provider by innovating numerous technological alternatives and multiple technologies for a variety of different application areas. Every day, Idesco devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory control systems.