Central Monitoring
Armis®, the agentless device security platform, and Viakoo®, a pioneer in automated IoT cyber hygiene, announce a partnership that brings together IoT device discovery and remediation. The number of connected Enterprise IoT devices used in workplaces across all industries is exploding. Experts say that by 2025, one should expect more than 40 billion of these devices interwoven into our everyday lives. And although these devices help improve efficiency and reliability, they lack the mana...
DICE Corporation (The New DICE Corporation) is empowering security integration companies with Matrix Integrator, a cloud-based video event monitoring, surveillance, and alarm notification suite for any video system, anywhere, and at any time. Interactive video monitoring For the first time, security integrators can directly provide end-users with automatic and managed interactive video monitoring services, while also controlling their business operations at the same time. “In the p...
Growing concern about deep-fake videos will make it increasingly important to be able to demonstrate the integrity of video evidence, warns South Korea’s largest in-country video tech manufacturer IDIS. Rapid advances in digital video manipulation techniques, and a rise in alleged deep-fake celebrity videos being reported in the news, will put pressure on both video tech users and on prosecutors to demonstrate the integrity of any footage they use. Internal disciplinary proceedings &ldq...
Netwatch Group, a pioneer comprised of NMC, CalAtlantic, and Netwatch; has announced the appointment of Justin Wilmas, President, Netwatch North America. In this role, Justin will be responsible for all video monitoring businesses from CalAtlantic and Netwatch in North America, as well as video monitoring from the NMC dealer channel. Netwatch has also announced the appointment of Rochelle Thompson as Chief Marketing Officer. In this role, Rochelle will be responsible for overseeing marketing op...
FLIR Systems announces the availability of two premium visible-camera options as part of its full lineup of Quasar™ security cameras. Designed for use in demanding indoor and outdoor environments, the new FLIR Quasar Premium Mini-dome and Quasar Premium bullet deliver the forensic image quality, tight integration, and advanced cybersecurity features required for critical infrastructure sites, remote facilities, or large areas requiring close monitoring. The new Quasar Premium lineup offer...
Check Point Software Technologies Ltd, a provider of cybersecurity solutions globally, announces the results of an independently commissioned study conducted by Forrester Consulting which analyses the Total Economic Impact (TEI) and benefits that enterprises deploying Check Point’s CloudGuard Cloud Network Security solution can realise. The study found that CloudGuard repaid its initial investment in under 3 months, with a 169% ROI over 3 years through higher staff productivity, reduced b...
News
Fenix Monitoring, an approved NSI Gold Alarm Receiving Centre (ARC), has entered into a new partnership with OPTEX to support its customers in providing state-of-the-art security response services. The business, founded in 2018 by Managing Director, Carl Meason, will harness the reliability and performance of OPTEX’s Intelligent Visual Monitoring solution to extend its services to provide visually verified alarms, enhancing security by capturing genuine alarms while filtering out nuisance alarms in a diverse range of environments. OPTEX – Fenix Monitoring partnership Fenix Monitoring, which provides CCTV, intruder and lone worker monitoring solutions, has built its reputation on the principles of digital innovation, data analysis and customer-driven experience. These principles provide cutting edge security products and services to the monitoring market, culminating with being recognised as British Security Industry Association (BSIA) SME business of the year 2020. Carl Meason believes the partnership with OPTEX will enable Fenix to significantly enhance their product offering to its customers. Carl Meason said “Fenix Monitoring continues its mission of partnering with the most innovative companies out there, and delivering products and services that are industry leading. In joining forces with OPTEX, we have added another technology partner that can help us build the very best monitoring solutions for our customers.” OPTEX Intelligent Visual Monitoring solution OPTEX’s Intelligent Visual Monitoring Solution offers a number of key benefits, including privacy mode" Carl adds, “OPTEX’s Intelligent Visual Monitoring Solution offers a number of key benefits, especially in relation to its privacy mode which means we will only see a silhouette when an alarm is activated. The homeowner or end-user can then lift this privacy feature, should the alarm be genuine and the person monitoring can see exactly what is going on.” Benjamin Linklater, Sales Director at OPTEX Europe, is looking forward to the new partnership with Fenix Monitoring. He said, “We are very pleased to welcome Fenix to the network of monitoring centres offering our cloud-based visual monitoring solution. Fenix is an agile, technology-focused security company constantly looking for new solutions to solve their customers’ issues.” Intruder and CCTV technologies installed on single site The OPTEX Intelligent Visual Monitoring solution enables separate intruder and CCTV technologies installed on the same site, but acting independently, to be connected using the OPTEX Bridge and create one, seamless, integrated and intelligent visual monitoring solution. Intruder alarms can now be visually verified within seconds, without impacting the integrity of the technology installed or its grade. When an alarm occurs, a signal is instantly sent to the ARC whose operator can view images pre and post the alarm event via a dedicated portal to determine whether the alarm is genuine.
ASIS International, the association for security management professionals, announces that since the launch of the program in November 2020, the ASIS Foundation has awarded more than 120 COVID-19 support grants to its global membership. This is a major component of the association’s efforts to address the global economic climate and those security communities hit hardest by the pandemic. The ASIS Foundation Board of Trustees approved $100,000 in grants to be awarded to ASIS members in need, encouraging individuals who had been financially impacted by the pandemic to apply for a grant to renew their ASIS membership free of charge or to receive a complimentary online certification study program. Facing unprecedented challenges Grant applications are reviewed by ASIS staff and all application materials remain confidential This program will continue through March 2021. Grant applications are reviewed by ASIS staff and all application materials remain confidential. “Giving back to the security community is what the ASIS Foundation does best,” said Brian Allen, CPP, Chair, ASIS Foundation Board of Trustees. “We recognise that security professionals around the world have faced unprecedented challenges and need support. I thank my fellow ASIS Foundation board members for their agility in addressing the challenges faced by our members throughout the world.” Highlights from the program thus far include: 124 grants awarded to date, to recipients in 27 countries 76% of grants received were used for the renewal of ASIS membership 50% of grant recipients are located outside of the United States 24% of grants received were used for certification review courses Higher medical bills Recipients’ stories range from those who got COVID-19 themselves and now face high medical bills, to those who have endured pay cuts up to even 50 percent, those who have been furloughed for a month or more, or those who have lost their jobs all together. Applicants come from a variety of positions—from front-line to senior level and business owners. Many worked in event security, hotels, airlines, and other industries that have been very hard-hit by the pandemic. “This is a great example of ASIS leaving no security professional behind during these challenging times,” stated John Petruzzi, Jr, CPP, President, ASIS International. “On behalf of our members in 158 countries, I would like to thank the leadership of the ASIS Foundation for their support of our global network of security professionals.”
Dahua Technology, a video-centric smart IoT solution and service provider, released its core product launch at the 2021 kick off meeting. Interpreting its mission of Enabling a Safer Society and Smarter Living, the company launched: WizSense/WizMind series which focus on the AI value transmission; HDCVI 6.0 Plus that offers continued advancement in over-coax technology, and Full-colour 2.0 which provides excellent performance under extreme low light conditions, driving innovation to an AIoT future. Video surveillance market The recent technological development is driving the industry into an AIoT era. However, the real and feasible applications and the values that the applications can bring to end users are the key driving forces. As a product and solution provider, Dahua Technology not only launches the technologies, but also focuses on addressing and solving users’ pain points. AI and deep learning are being adopted in various end-use applications The global attention to AI is soaring. According to Marketsandmarkets, the global video surveillance market size is expected to grow from USD 45.5 billion in 2020 to USD 74.6 billion by 2025, at a CAGR of 10.4%. Developments related to technological advancements like AI and deep learning have increased the need for launching new and innovative products to tackle the security crisis at every level. AI and deep learning are being adopted in various end-use applications, providing opportunities for the video surveillance market. Intelligent target search To better classify and present its AI products and solutions, and accurately deliver the value of AI to its customers, Dahua Technology released the channel series WizSense and project series WizMind last year. In 2021, these two series will continue to evolve, demonstrating the innovation and strength that Dahua Technology has in the field of AI. Focusing on human and vehicle, the WizSense series is an ideal choice for small and medium-sized application scenarios such as villas, shops, warehouses, exclusion areas, and personal outdoor properties like fish ponds and orchards. With limited budgets, owners/managers of these properties often face the lack of important features such as human/vehicles recognition, intelligent target search, etc. in their security systems. Now with WizSense, these dilemmas are gone. Powerful intelligent functions WizSense provides accurate alarm for human and vehicle with an improved animals filtering rate Featuring SMD 3.0, AI coding and Active deterrence, the WizSense series products and solutions provide powerful intelligent functions, simple configuration and a wide range of products, making AI inclusive for everyone. Powered by upgraded Smart Motion Detection technology (SMD 3.0), WizSense provides accurate alarm for human and vehicle with an improved animals filtering rate, allowing users to focus on what really matters. It also offers cameras with warning light and siren, as well as real-time push notification on mobile phones to help users deter intruders and eliminate potential risks. Moreover, it also comes with Intelligent Target Search function that allows users to search targets by alarm trigger type, significantly improving target search efficiency and saving users’ time and labour costs. AI-Powered smart solutions Aiming at empowering verticals with AI technology, the WizMind series is, on the other hand, competitive in providing accurate, reliable and comprehensive AI-powered smart solutions to a variety of vertical industries, including safe city, rail transit, traffic management, judiciary, building, retail, energy, etc. With adequate budgets, projects from these industries can enjoy the convenience brought by advanced AI functionalities and high-level customisation. Powered by AI chipsets and deep learning algorithms, WizMind features many technical highlights, including video metadata, face recognition, privacy protection, wide area security, illegal parking, ANPR, thermal imaging, object monitoring, etc. Providing comprehensive human-oriented solutions, WizMind enables rapid and precise reaction on what matters. In addition, it also features a more precise and effective AI search function to locate targets, generating various human data for further business analysis. Deep learning algorithms HDCVI 6.0 Plus takes a step further by developing coaxial HD video surveillance system Boasting multiple vehicle-based AI solutions, it provides more attributes of vehicles for easy control, quick search and business analysis. What’s more, WizMind combines deep learning algorithms with thermal imaging technology to help users achieve ultra-long distance monitoring in harsh environments, non-contact temperature monitoring and early fire prevention. As a Dahua Technology’s well-known patented technology, HDCVI continues to evolve to protect customers’ investments. In 2021, with the continuous boost in the inclusiveness of AI XVR, as well as the optimisation and innovation of the front-end cameras, HDCVI 6.0 Plus takes a step further by developing coaxial HD video surveillance system that maintains its easy-to-use features, leading the Over-Coax AI Evolution. High definition image Featuring Real 5MP, Super Adapt and Enhanced AI, HDCVI 6.0 Plus series is recommended for small & medium sized scenarios like shops, warehouses, streets, etc. These scenarios have high requirements on high definition image and effective identification of targets, but often face budget constraints. Commercialised first by Dahua Technology, the Real 5MP camera provides 5MP high definition with 16:9 video output that features superior clarity and undistorted image quality. Super Adapt, another innovative technology that Dahua Technology proposed and realised first, enables camera to automatically recognise and adjust to various monitoring environments such as indoor, outdoor or intense lighting, providing preferable image performance. Enhanced AI functions offer accurate alarm for both human and vehicle as well as quick target search, changing post-query into pre-prevention to enhance security efficiency. Comprehensive product system Full-colour 2.0 features a comprehensive product system and AI applications that can serve a broader customer base As one of the company’s key focus, Full-colour this year will enter into a 2.0 era. Full-colour 2.0 features a comprehensive product system and AI applications that can serve a broader customer base. Based upon the technological strength of Dahua Technology, 4K and zoom technologies are newly introduced to Full-colour 2.0 to bring high performance. For customers who have adequate budget and requires high image quality, they will surely enjoy the quality experience brought by Full-colour 2.0. For customers who have limited budgets, Full-colour 2.0 also provides products with balance price and performance. Meanwhile, AI-powered functionalities like Active Deterrence, Perimeter Protection and AI Search are of vital importance in pre-event deterrence, during-event interference and after-event backtracking, reflecting the essence of the Full-colour slogan Colourful View Ever, Dark World Never. Smart integrated security solutions Dahua Full-colour 2.0 series can be deployed in scenarios with low-Iight condition such as streets, parks, villas, etc. as it guarantees coloured monitoring 24/7. By helping users obtain the coloured details of people and cars in dark environment, it improves retrieval efficiency and provides convenience for event evidence collection. The 2021 core product launch of Dahua Technology is the combined result of customer needs and technological development. Committed to its mission of ‘Enabling a Safer Society and Smarter Living,’ Dahua Technology will continue to adhere the core value of ‘customer-cantered’ and provide the market with smart integrated security solutions, systems, and services to create value for city operations, corporate management, and consumers.
Technological Innovations Group (TIG), the technology sales agency in the EMEA region offering integrated automation and control solutions for smart spaces, is pleased to announce that it is now able to offer Power Distribution Units (PDU) from GUDE that integrate with Crestron Home systems. This means users can now remotely control and monitor smart space devices in residential settings. As an official partner of Crestron, GUDE has developed and now offers drivers that allow their IP power strips to be integrated into Crestron Home, an advanced operating system for managing smart home systems. Remote power switch GUDE has worked with certified Crestron Master programmers at Ultamation Inc to develop the Crestron Home compatible drivers for their PDUs, which offer seamless and simple controls to manage one or multiple rooms, remotely or on the premises. They can also easily see the current status of the connected devices, receive automatic alerts in case of irregularities In practice this means that the owner of a remote power switch from GUDE can use Crestron Home on their mobile device in order to switch on, switch off or reboot devices such as media players, satellite boxes or routers. They can also easily see the current status of the connected devices, receive automatic alerts in case of irregularities and check and control their energy consumption. Energy saving strategies Once in operation, the advantages of Crestron Home in conjunction with a GUDE remote power switch are multiple, including fail-safe power cycling of connected devices that helps applications to get back on their feet when they have hung up. This is either automatically via watchdog monitoring or by remote access via Crestron Home. Additionally, it's possible to add sensors to the PDU to monitor temperature, humidity and air pressure. This allows critical conditions to be avoided in advance, through preventive measures. Integrated energy meters in the IP power switches also allow for precise measurement of power consumption and enable energy saving strategies to be included in the integration.
Alarm.com has developed the first cellular sensor with virtually no range limitations for monitoring valuable property and assets. The Alarm.com Flex IO™, a battery-powered device that is weatherproofed for outdoor durability, uses the latest LTE-M technology to operate anywhere there is LTE coverage and without a panel, hub or even Wi-Fi. The one-of-a-kind sensor works as a standalone solution or as an expansion of a person’s existing Alarm.com-powered system. The Flex IO™ sensor sets up in seconds and can be attached to almost anything to help people keep an eye on doors, gates, sheds, barns, detached garages, guest houses and other access points around their property. Expected battery life In addition, the wired magna-loop input option keeps users informed if freestanding items, like a motorcycle or lawn mower, are moved. “I’m extremely impressed by the Flex IO sensor after testing it as both an outdoor gate sensor and with the wired loop,” said Charles Hadsell, CEO of ePropertyCare. The Alarm.com Flex IO has an expected battery life of more than two years “The use cases for it seem almost limitless. Many of our customers come to us looking for help securing and monitoring things in areas outside the reach of their existing system. The Flex IO sensor is what we’ve needed to solve those challenges. I think it’s going to be a big hit because there’s nothing else like it on the market.” The Alarm.com Flex IO has an expected battery life of more than two years and seamlessly integrates with the existing Alarm.com ecosystem of connected smart home devices. Smart property monitoring Subscribers can stay informed about pertinent activity detected by the Flex IO sensor through real-time notifications and customisable alerts configured through the Alarm.com mobile app. “The Flex IO sensor expands the boundaries of smart property monitoring while redefining the uses for an activity sensor,” said Alison Slavin, co-founder and senior vice president at Alarm.com. “It’s an extremely versatile solution that’s ready for the challenge of what home or business owners want to monitor without being restricted by location.” The Alarm.com Flex IO offers enhanced awareness for property owners, one of the key elements of security. As a standalone solution, Flex IO also can be used in other applications where consumer needs have gone unmet due to range restrictions. The device is currently available through authorised Alarm.com partners. Flex IO is a trademark of Alarm.com.
The Protege Group, a prominent securities transportation specialist in Brazil, has specified its first fully automatic transmission as part of a pilot project to evaluate new armoured cash transport trucks. Two armoured high-value cargo light trucks, a Volkswagen 9.160CE and a Mercedes-Benz 915 E, have been equipped with an Allison 2000 Series™ transmissions. The trial of fully automatic transmissions is designed to make the company’s operations more efficient and productive by improving vehicle agility and robustness, and by extending the life of the transmission and engine components. They are exceeding the company's expectations. Investment and automatic transmissions "The Protege Group invests heavily in the well-being and safety of its employees, and automatic transmissions greatly reduce the physical and mental wear on the driver," explains Nelson Dias, Automotive Engineering Manager at the Protege Group. "The state of alertness for a prompt reaction in any critical situation is a fundamental condition for good work in our segment." Manual transmission gears “Automatic trucks have been shown to be less stressful for drivers and for the respective working teams, as they are not subject to the swings so common during the shifting in manual transmission gears,” said Dias. “The teams are unanimous that there is less physical wear and tear throughout the workday.” Shorter vehicle downtime Another finding of the Protege Group’s trial is shorter vehicle downtime. Automatic transmissions do not require clutch systems maintenance, which is common in manual transmissions. In addition, they provide a more homogeneous operation of the powertrain, avoiding engine overdrive while acting as auxiliaries to the brake system. Allison 2000 Series Allison 2000 Series automatic transmissions are designed to equip light commercial vehicles for both cargo and public transport applications. They can be equipped with a Power Take-Off (PTO) output and have six gears, including overdrive, which guarantees a more agile and simpler operation. They also have advanced Allison 5th Generation electronic controls, which improve productivity and efficiency strategies as per the needs of the vehicle.


Expert commentary
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyse more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analysed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analysing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as licence plate reading, behavioural analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fibre-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Security beat
As the new Chief Executive Officer of Milestone Systems, Thomas Jensen pledges to continue the company’s focus on protecting people and assets and to help organisations gain insight and optimise their business processes. Seeking to fulfil Milestone’s mission to ‘Make the World See,’ Jensen will maintain Milestone’s approach of being an open video management system (VMS) platform and having an open company culture. End-user communities “I will also be working to expand Milestone’s VMS into new areas and applications —for example, to monitor beach erosion as the climate continues to warm up around the world,” says Jensen. “I believe the future of VMS is about bridging the gap between security and applications that go beyond security.” Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel. His experience as a generalist – extending beyond IT – enables understanding of the business side of things in addition to the skills, strengths and motivations of the people who work at Milestone, its channel, partner networks and the end-user communities. People-first approach “One crucial thing my career taught me is the importance of your team members,” he says. “A former manager once told me that success is the sum of the success of your team. And, luckily, Milestone already has a strong culture and people-first approach. This is one of the things that attracted me to this job.” The new CEO plans to spend his first 90 days building relationships and getting to know the company and the team members. He will be present in conversations with all Milestone people as well as partners and system integrators. “I want to ensure there is continuity and resilience so that my joining Milestone is a seamless transition,” Jensen says. “Furthermore, my focus will be to further build on the strengths of Milestone to create long-term sustainable growth.” Video-enabled insights Jensen sees security through two lenses: on one hand, protecting people and property, and on the other, providing video-enabled insights for public and private companies to be able to make better decisions. On the protection side, businesses have room to grow as technologies move to provide more affordable, more powerful, and more interoperable solutions. A transformative element in the future evolution of video management is the cloud Regarding video-enabled insights, there is great potential, and Milestone is forging deeper relationships with partners and system integrators of important verticals such as cities, education, transportation, and retail. A transformative element in the future evolution of video management is the cloud, which will advance the deployment of technologies across the board. Best software integrations “I will be spending time working with our organisation and partners to evolve Milestone’s cloud strategy and cloud partnerships to address the opportunities that lie ahead,” says Jensen. “I also think that Milestone’s belief in being open and giving integrators and end-users the freedom to choose the best software integrations available in the market is a philosophy that we've held dear from the very beginning — and this will become critical in the future as VMS solutions continue to evolve.” Safer business environment As the COVID-19 pandemic has raged on, Milestone Systems has continued its operation as usual, deploying safety measurements as needed to protect both employees and the partners they work with. COVID-19 has impacted everyone, every business and every government and organisation around the world, says Jensen. We’re working with our partners to design a safer business environment with VMS-enabled solutions" “I think it taught us all a lesson in empathy and how we need to respect differences in behaviour, regulations and compliance, customs and even each other,” he says. “At Milestone, we’re working with our partners to design a safer business environment with VMS-enabled solutions for social distancing, queue management, and contact tracing.” Creating security solutions “The past 50 years of digital technology and the past 20 years of IP technology have taught us that technologies eventually converge, and in some cases merge,” says Jensen. “Sometimes functions merge and channels converge, other times it’s the networks that come closer together, but none of this is absolute and universal.” “This is why we need to listen and learn from each other and be respectful of differences in the industry and the channel—particularly cultural and regional differences.” Jensen adds: “The technology company of the future — which I believe Milestone is becoming — will not dictate solutions but will instead partner with IT and security stakeholders to create security solutions that meet each customer’s unique challenge and environment.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertise,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realising wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialised services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the programme, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertise”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Case studies
Johan Cruijff ArenA will utilise innovative video analytics to improve visitor flow, optimise parking utilisation and offer fans an anonymous way to provide feedback about the stadium experience, among other uses. The Security & Safety Things IoT platform for smart cameras will integrate into the ArenA’s operational software to provide key insights into stadium operations and ongoing health and safety measures, especially useful since the pandemic. The partnership will provide a potential model for other organisations looking to deploy technology solutions to safely reopen. IoT platform for smart cameras Security and Safety Things GmbH and the Johan Cruijff ArenA are partnering up and will deploy S&STs IoT platform for smart surveillance cameras to enhance overall fan experience, optimise ArenA operations and increase visitor security and privacy. The ArenA is home to AFC Ajax and the internationally renowned Amsterdam Innovation ArenA (AIA), a living lab established by the ArenA and the City of Amsterdam to enable development and testing of innovative stadium and smart city solutions. Security & Safety Things IoT platform S&ST IoT platform and network of cameras is integrated into the ArenA’s dashboard software The Security & Safety Things (S&ST) IoT platform and network of cameras is integrated into the ArenA’s dashboard software to provide information and analysis for safety and security as well optimisation of stadium operations and visitor engagement. “Every technology selected for our innovation environment is strategic because of the potential benefits not only to our ArenA, but to the City of Amsterdam and other stadiums and large event venues seeking technological solutions to help to re-open safely and operate their facility more intelligently,” said Sander van Stiphout, Director International, Johan Cruijff ArenA. Sander van Stiphout adds, “The unique flexibility of the Security & Safety Things approach enables us to simultaneously deploy COVID-19 health and safety analytics along with business optimisation tools and easily re-equip the cameras with other analytic applications as our needs change.” AI-enabled video analytic applications A series of smart cameras on the S&ST IoT platform are installed in key areas throughout the stadium. Using specialised, Artificial Intelligence-enabled video analytic applications from the S&ST Application Store that run directly on each camera, each device will provide the ArenA with valuable operational insights. When the stadium reopens, crowd detection analytics will monitor social distancing compliance and visitor flow around entrances and food or merchandise kiosks. License plate recognition cameras will assist with real-time occupancy monitoring for parking and traffic flow optimisation. Queue detection applications Queue detection applications can be employed to reduce visitor wait times by directing fans to less busy areas and by providing the insights required to optimise staffing levels at peak times. In one specific area, a camera also provides the ability for visitors to provide feedback about their stadium experience in an anonymous and contact-free way by detecting the visual of a ‘thumbs-up’ or ‘thumbs-down’ from a visitor, collecting only the rating without disrupting people flow. Smart camera platform We’re honoured to be joining the Johan Cruijff ArenA as an innovation partner" “The flexibility of our smart camera platform and the ArenA’s mission of innovation are very well matched to produce the intelligence necessary to address real world issues of privacy, health and safety but also new and creative ideas for stadium and event management,” said Hartmut Schaper, Chief Executive Officer (CEO), Security & Safety Things GmbH. Hartmut adds, “We’re honoured to be joining the Johan Cruijff ArenA as an innovation partner and to help them provide a seamless and safe visitor experience.” Smart surveillance camera system The camera system and how it is used complies with all European and Dutch privacy regulations. Furthermore, there are various advantages to this camera system, when it comes to privacy. These cameras are equipped with powerful processors that analyse the images directly on the camera, reducing the need for a constant video stream to be passed on to a central location, where it can be monitored or further processed. Instead, the cameras can be configured to send only the information about relevant events such as when a long queue is forming, groups of people gather too closely, or individuals are not wearing face coverings as required. Only then will respective images be passed along. This reduces the processing of visitors’ personal information to an absolute minimum as opposed to a traditional set-up where all footage is transmitted and centrally processed at all times.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc. (Genetec), a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. Genetec Security Center The three-year project, which is expected to be completed by the end of 2023, will see Genetec Security Center, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract for Changi Airport Group was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights that Genetec Security Center is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
For the jewellery business owner, ensuring the highest level of security has always been a top priority. VIVOTEK, the IP surveillance provider, has built up a rigorous surveillance system for Peyrelongue Chronos, a well-known luxury boutique offering high-end jewellery in Mexico, to monitor their precious products without any blind spots and to prevent robbery or theft. Peyrelongue Chronos has recently remodelled its facilities, including an overall of the video surveillance system. In search of the best solution to meet demands for both outside and inside the store, Peyrelongue Chronos found all of its requirements met by the wide range of VIVOTEK cameras. Harsh outdoor environment The 180-degree multi-sensor MS8391-EV was mounted on the facade of the boutique to maximize the field of view with 12-megapixel high-quality images and reduce the number of cameras required, thus cutting down installation costs. The camera is also ideal for the outdoors because of the robust housing that resists rain, dust and protects it from vandalism or tampering. The 180-degree multi-sensor MS8391-EV was mounted on the facade of the boutique To enhance the outdoor security of the building, two FD9360-H cameras were added to monitor the avenue in both directions and provide clear night views despite the harsh outdoor environment. Inside the Peyrelongue Chronos store, two of MS9390-HV, the most efficient panoramic network camera, were installed in the jewellery area to surveil all displays as well as all movements within them. Receiving alarm notification With its unique and stylish dual-sensor design, the MS9390-HV offers a 180-degree field of view and range of up to 20 metres, and is capable of maintaining a higher field of view (FOV) than traditional multi-sensor panoramic cameras using four sensors. Within the spacious and comfortable luxury watch area, two 12-megapixel fisheye cameras, the FE8191 and FE9191 were chosen to monitor the product showcases, delivering blind-spot-free 360-degree surround imaging of wide areas. Further enhancing performance, the FE9191 features AI-powered Video Content Analyses - Smart 360 VCA, including intrusion detection, crowd detection, and loitering detection, which enables the security staff to receive alarm notification for any notable event. Finally, for the shared area, such as aisles, entrances, and exits, the ability to capture high-quality images both in low light and high-contrast environments is a critical issue when selecting surveillance cameras. Providing quality service The most remarkable thing when working with VIVOTEK is technical support" The 5-megapixel and 2-megapixel dome cameras, FD9189-HM and FD8166A-N, were chosen precisely for this reason. The FD9189-HM is equipped with 30 metres range IR illuminators for enhanced night vision, and the FD8166A-N is armed with invisible 940nm IR illuminators and capable to see up to 6 metres in total darkness, making it a sure bet to meet all the surveillance requirements in transit zones within this renowned boutique. “Thanks to VIVOTEK’s high-level security system, we are confident that we can guarantee our clients the best experience from the moment they walk in. Peyrelongue Chronos feels secure with VIVOTEK’s surveillance solution while servicing clients,” pointed out Ana Lucía García, Marketing and PR Manager of Peyrelongue Chronos. “The most remarkable thing when working with VIVOTEK is technical support. They assisted me both pre-sale and post-sale to provide quality service to our customers. No matter what types of security issue my clients may have, I know I can solve it with VIVOTEK’s technology,” remarked Serafin Sanchez, Automatisation Server Manager and Integrator Certified by VIVOTEK.
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organised at a grand scale at Nashik, Haridwar, Ujjain and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralised Monitoring Software (CMS)
Two museums, a single security environment. As a result, access management was eating up significant time and budget for the museums’ Technical and Security Manager. The solution for simpler access management was eCLIQ, an electronic locking system built around easy-to-fit cylinders and programmable, battery-powered keys. The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential — for both internal and external users. They needed a system able to cope easily with changes, site extensions and two-site operation; a solution which would remove the need to change all cylinders when an employee loses a key. Simplified access management Now the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders across the two sites. The eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights and schedules for external providers and contractors. A unified system manages access to both locations. Every authorised key-holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorised, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Monitoring service providers Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to both employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers — and their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. Fitting eCLIQ locking was simple and wire-free: museum staff performed the installation themselves. One training session with the admin software was sufficient to put them at ease with their new system. Efficient energy management Looking after eCLIQ components is also easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. AES encryption, rapid processing and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. “I am very happy with the eCLIQ solution,” says M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums. “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council to show the effectiveness and simplicity of the eCLIQ solution. Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
Leonardo delivered the first two M-345 jet trainer aircraft to the Italian Air Force, which to-date has ordered 18 units from a total requirement for up to 45 aircraft. The new type of jet trainer aircraft, designated T-345A by the Italian Air Force, will gradually replace the 137 MB-339s which have been in service since 1982. M-345 jet trainer aircraft Marco Zoff, Leonardo Aircraft Managing Director, said “Building on our heritage and expertise in jet trainers, the M-345 will allow our customers to achieve a significant improvement in training effectiveness while at the same time reducing operating costs. This first delivery to the Italian Air Force is a key milestone, the result of a longstanding and productive team working closely together with the operator.” The new M-345 jet trainer aircraft, designed to meet basic and basic-advanced training requirements, will complement the in-service M-346, which is used for advanced pilot training. Integrated training system Leonardo’s integrated training system developed around the M-345 platform is representative of the company’s technological leadership in training pilots to fly current and future generation aircraft. The system benefits from experience with, and technology developed for, the M-346, which includes a ‘Live Virtual Constructive’ capability. This allows aircraft which are flying live training missions to incorporate simulated ‘friend’ or ‘foe’ elements into scenarios, allowing the pilot to be exposed to the full range of possible operational situations. M-345 HET (High Efficiency Trainer) The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots The M-345 is a high-performance aircraft which supports a pilot’s transition from basic trainers to latest-generation fighters. The Italian Air Force’s acquisition of the new aircraft is an important step forward in the modernisation of its fleet, with the M-345 replacing the MB-339A in Air Force’s second and third military pilot training phases. The M-345 has also been chosen as the new aircraft of the Italian Air Force’s acrobatic team, the ‘Frecce Tricolori’. The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots. It also gives trainees the chance to fly an aircraft that features higher performance characteristics than other basic/advanced trainer aircraft currently in service around the world. Delivering high quality training at low cost The performance of the M-345 allows it to carry out the most demanding mission types found in a training syllabus, delivering high quality training at significantly lower cost. The M-345 cockpit architecture is the same as that of frontline fighters. The aircraft is also able to perform operational roles, thanks to an extended flight envelope, with a high-speed maneuvering capability even at high altitudes, modern avionics systems, high load capacity and performance. Health and Monitoring Usage System The M-345 is designed with a long life-cycle and a two-level approach to maintenance The M-345 is designed with a long life-cycle and a two-level approach to maintenance, eliminating the need for expensive general overhauls. The aircraft’s Health and Monitoring Usage System (HUMS) also contributes to a lower cost of ownership. A sophisticated on-board training simulator confers a number of benefits. For instance, M-345 pilots are able to plan maneuvers before live training, allowing for higher efficiency during flight. Mission Planning and Debriefing Station Trainees are also able to fly in formation with other pilots in the air and those training on the ground in simulators, via a real-time data-link. The aircraft’s Mission Planning and Debriefing Station (MPDS) allow trainees to analyse the missions they have just flown. The M-345’s engine is a Williams FJ44-4M-34 turbo fan optimised for military and aerobatic use. The cockpit is based on HOTAS (Hands-On-Throttle-And-Stick) controls and features a glass cockpit with a three-colour MFD (Multi-function Display) touch screen. The aircraft’s heads-up display is mirrored on a fourth screen in the rear seat.


Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?

How to ramp up perimeter security with license plate reader technology
Download
Solve access control challenges in the healthcare sector
Download
Getting the most value from Software Subscription Agreements
Download
Shifting trends in operation centers and control rooms for 2021
Download