College security
PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of EAGL Technology to its Managed Security Service Provider Program (MSSP). EAGL Technology is a manufacturer of indoor/outdoor IoT wireless gunshot sensors, as well as sensors that can detect vape, car collisions, flood waters and critical infrastructure failures. Active shooter threat detection “EAGL produces solutions that address today’s real-world securi...
Understanding access control technology has surpassed its core application as a security tool and is helping protect individuals from infection, Anviz has announced the release of a strategic addition to its product line, Go Touchless - FaceDeep 5 and FaceDeep 5 IRT face recognition terminals. Safely Returning to work and school during the post COVID-19 pandemic period leaves people with a key question - With what health and safety precautions? AI-based facial recognition terminal Anviz has i...
Dahua Technology, a front-runner video-centric smart IoT solution and service provider, is proud to announce that the Dahua Global Virtual Innovation Centre is now available to its global customers. By demonstrating its latest technologies, products and solutions through an online virtual showroom, the centre can support customers in designing excellent security systems. Due to the drastic impact of COVID-19, people are having difficulties in gaining access and experiencing the development of p...
SALTO Systems, front-runners in wire-free networked, wireless, cloud and smartphone-based access control solutions; announce that the SALTO Neo electronic cylinder is their latest product to gain the coveted BSI Enhanced Level IoT Kitemark™ for access control systems. Designed for doors where fitting an electronic escutcheon is not possible or required, the compact SALTO Neo Cylinder can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors, and m...
The Genetec Channel Partner program has partnered with Credly to award verified digital badges to European channel partners who complete Genetec certification courses. Badges provide an easy way to share and validate the skills, experience and technical knowledge. Digital badges are the best tool to highlight Genetec certifications and achievements on the website, social media, profiles and more. Think of the badges as a bonus for the hard work—there's no extra cost involved. What is a d...
Genetec Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it is broadening its portfolio of FICAM-(Federal Identity, Credential and Access Management) certified options for its Security Center Synergis™ access control system with the support of Veridt Stealth access control readers. Traditionally, the options for Federal Government organisations to replace a non-FICAM compliant system or to secure a new...
News
Heald Ltd., a global innovator in the field of perimeter security technology and one of the major manufacturers of quality security equipment in the United Kingdom, has announced a new partnership agreement with university technical college, Ron Dearing UTC. Since being founded over 30 years ago, the Hornsea-based manufacturer has worked closely with various educational institutions including Hornsea School and Language College, Humberside Engineering Training Association, Beverley College, Hull Training and the University of Hull by providing career insight talks, work experience opportunities, apprenticeships and ongoing learning for their existing employees. Heald - Ron Dearing UTC partnership This new partnership with Hull-based Ron Dearing UTC will provide new opportunities for students to undertake internships and work experience placements with Heald with the potential for longer-term employment opportunities. With many different engineering disciplines within the company, Heald hopes to help guide learning at Ron Dearing UTC to include their specific engineering requirements, which will enable new employees to progress much quicker into full-time employment from apprenticeships or trainee levels, there by benefitting both the individual’s career progression and the business offering. Glenn Jensen, Senior Assistant Principal for Employer Engagement and Head of Engineering at Ron Dearing UTC said “It’s a great credit to Heald that, during such difficult times, they continue to see the importance of investing in their future employees.” Bridging skills gaps in the engineering and digital sectors Having this new partnership helps us to continue to bridge skills gaps in the engineering and digital sectors" Glenn adds, “It’s invaluable for us to have realistic client briefs when working on projects linked to industry and these play a key role in expanding our students’ skill sets. Having this new partnership helps us to continue to bridge skills gaps in the engineering and digital sectors.” Managing Director of Heald Ltd., Debbie Heald MBE said, “I only recently became aware of Ron Dearing UTC, but after discovering more about what they do and their approach to learning, it seemed a natural fit.” Facilitating students engagement with employers Debbie adds, “With education settings and student’s learning facing significant disruption in recent months, engaging with local schools, colleges and universities is vital to ensure students are able to access meaningful engagement with employers.” She further stated, “In turn, this not only helps them to decide on what they wish to do post-education but it also helps them to transition into their chosen career path, and as a result, can be an excellent recruitment pipeline for those businesses who do engage. We’re very excited about our new partnership with Ron Dearing UTC and we’re looking forward to working with local individuals who are passionate about engineering in every field.”
Exabeam, the security analytics and automation company, announced a partnership with Snowflake, the Data Cloud company, to augment Snowflake data lakes with Exabeam security analytics and automation. The partnership enables organisations to identify risks and respond swiftly to incidents across their entire business ecosystem. The COVID-19 pandemic has accelerated digital transformation, expediting the move to the cloud and increasing demand for improved productivity and efficacy through automation. Organisations can now quickly move data and security to the cloud by migrating to Snowflake Data Cloud and Exabeam SaaS Cloud. Automating workflow Security teams can quickly detect, investigate and respond to complex threats with the help of analytics and automation skills By adding the analytics and automation capabilities of Exabeam to the data stored within Snowflake, security teams can quickly and efficiently detect, investigate and respond to complex threats. The combination of both solutions advances an organisation’s security posture by automating the entire workflow from data collection through response, enabling fast and consistent outcomes. Cloud-based security analytics “With demand for cloud technology surging amid the shift to remote working, we proudly welcome Snowflake to our partner network,” said Adam Geller, Chief Product Officer, Exabeam. “Using the combination of the Exabeam Cloud Connector for Snowflake with Exabeam Advanced Analytics, joint customers can easily apply intelligence and automation capabilities to their data stored within Snowflake's platform. This addresses the increasing market need for cloud-based security analytics on third-party logs sent to Snowflake.” Identifying cyberthreats “Security data continues to grow in size and complexity, and a fragmented architecture keeps many organisations struggling to mobilise it for protecting the enterprise,” said Omer Singer, Head of Cybersecurity Strategy at Snowflake. “Snowflake’s unique architecture eliminates data silos, providing organisations a single scalable and cost-effective platform for all their data, while Exabeam’s security analytics adds intelligence and automation to strengthen an organisation’s ability to identify and respond to cyberthreats across subsidiaries, geographies and public cloud providers.” Case study In 2020, several large-scale corporate data breaches centered around compromised credentials of cloud-based data stores. In one example, more than 5 million guests of Marriott hotels were impacted when cybercriminals stole the login credentials of Marriott employees, likely through phishing or credential stuffing. The information was then used to siphon personal customer details such as birth dates, contact information, as well as hotel and airline loyalty program accounts. Technical integration Exabeam provides real-time mapping of logs stored within Snowflake and attributes all activity and behaviour to users and devices Combining Exabeam’s security analytics with Snowflake’s data platform can provide protection against credential-based attacks, including insider threats. The technical integration between the Exabeam SaaS Cloud and Snowflake Data Cloud is done through the new Exabeam Cloud Connector for Snowflake, which allows for easy ingestion of data stored in Snowflake. Exabeam provides continuous, real-time mapping of logs stored within Snowflake and attributes all activity and behaviour to users and devices. This attribution, with additional data and context, provides visibility into abnormal or risky activity to detect malicious insiders or attacks involving compromised credentials. As a new addition to the 40-plus existing Exabeam Cloud Connectors, the Cloud Connector for Snowflake also allows for monitoring of Snowflake audit logs in Exabeam Advanced Analytics to detect anomalous account behaviours within the application itself. Assisting security operations “The proliferation of data is central to all businesses, and so is the need to guard against malicious attacks – especially now, as enterprises rely so heavily on data clouds like Snowflake,” added Chris Stewart, Senior Director, Business Development for Exabeam. “This partnership advances our mission to assist security operations teams in quickly detecting, investigating and responding to incidents throughout the enterprise.”
A new range of Wisenet Public View Monitors (PVMs) equipped with a built-in SSL connected 2-megapixel camera have been introduced to help retailers deter fraudsters and shoplifters. Offering a choice of 10”, 27” and 32” monitors, the 3 new PVMs are designed to be located at store entrances, shopping aisles, till points or self-checkout pay points. With an SD/SDHC/SDXC slot that can facilitate up to 512GB of data storage, the PVMs provide store management with the opportunity to display a slide show which can include supplier adverts, own-brand product promotions and special offers. A default blinking recording in progress message is superimposed over the displayed graphics to let would be thieves know they are on camera, with operators having the option to customise the message and configure its size, colour, opaqueness and positioning on the monitor. Face detection Face and motion detection feature can be configured to switch the display to live view to make people aware they are being watched Supported by the Wisenet WAVE and SSM video management platforms as well as Wisenet NVRs, the ONVIF Conformant PVMs can be programmed so that images captured by the cameras are either continuously recorded or when prompted to do so by built-in face or motion detection video analytics. The face and motion detection feature can also be configured to switch the display to live view to make people aware they are being watched, as they will be able to see themselves on the monitor as they enter a store or walk down a shopping aisle. The display reverts to the slide show after a specified number of seconds. The PVMs, which can be integrated with tagging (EAS) systems to record images of people who might be leaving the store with stolen items, also provide support for the AI-Masking, AI-Bio, AI-Face-Detect and AI-Occupancy video analytics applications, developed by Hanwha Techwin’s technology partner, A.I. Tech. Video evidence Regardless of whether they are displaying live images or a slide show, or the monitor has been turned off by someone using a remote control, the PVMs will continuously stream images to a control room where they can be viewed via video management software (VMS), as well as continue to be recorded on an on-site or remotely located NVR. The ultra-low light capabilities of the new PVMs, together with Wide Dynamic Range (WDR) technology performing at up to 150dB, enables the built-in camera to capture clear, sharp images in strongly contrasting light conditions at, for example, store entrances where strong sunlight may be streaming in. Power over Ethernet All three PVMs can be powered by 12V DC, with the Wisenet SMT-1030PV also offering the option to utilise Power over Ethernet (PoE+) if there isn’t an existing power supply close to where the PVM is being installed. A single cable of up to 100m is all that is needed to provide both powers to the SMT-1030PV and for network communications. The three new Wisenet PVMs, which can be mounted by using standard VESA brackets, are as follows: SMT-1030PV: 10” monitor with LED backlight and 1024 x 600 display resolution. SMT-2730PV: 27” monitor with LED backlight, HDMI input and Full HD display. SMT-3230PV: 32” monitor with LED backlight, HDMI input and Full HD display. Loss prevention strategy “With retailers increasingly relying on PVMs to play an important role within their strategic approach to loss prevention, we have designed our new models to make it quick and easy, as well as cost-effective, to deploy them across a large number of stores,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “As the only PVMs available which, for cyber security and data protection purposes, are supplied with a complete built-in SSL connected camera, they eliminate the need for system integrators to install and connect a separate supporting camera, which some other manufacturers’ PVMs require." "By building in an intuitive user interface, we have also made it extremely easy for busy store managers to take full advantage of the PVM’s functionality, including the ability to utilise the monitor for advertisement and signage using the slide show mode.”
The COVID-19 pandemic has changed the way one lives their lives and the way one does business. Restrictions have been implemented to protect ones health, affecting one as individuals and the operations of the healthcare systems, companies, organisations and schools, as well as public and private institutions. Many new behaviours, such as physical distancing, virtual meetings and improved hygiene measures, will most likely linger as one gradually gets back to normal. With smart solutions, one can help each other stick to the new routines. Axis tried and tested solutions are designed to increase security and maximise business performance and operational efficiency. In addition, they offer improved safety – never more important than in times of a pandemic. They allow us to carry on with ones daily business while protecting ourselves and the people around us. Solutions range from touchless access to buildings, public address systems for voice messages and reminders, remote communication to keep physical distance to crowd and occupancy management to monitor and control the flow of people. They also include live streaming and broadcasting to keep operations running, as well as remote services to manage sites from a distance - solutions that support safe behaviours over time. Touchless access control With AXIS Visitor Access there is no need to open doors, visitors will get a QR code instead of an access card to be allowed into a building A system for touchless access control makes it easier to comply with physical distancing and increased hygiene requirements. With AXIS Visitor Access there is no need to physically open doors to trusted visitors or buzz them in – visitors will get a QR code instead of an access card to be allowed into a building. They can be granted access at specific times, and should someone change the schedule or cancel, it is possible to revoke or adjust their access as needed. This way, one is always completely in control, knowing when the visitor has arrived and left the building. Public address systems With public address systems, you can manage messages and updates in environments like schools, retail stores, hotels, public buildings and city environments. These include scheduled regular reminders, event-triggered announcements or live voice messages when a situation arises that requires immediate action. It is, for example, possible to run a recurrent message in scheduled intervals to remind people to wash their hands and use hand sanitizers as well as to keep physical distance or to stay at home when they are feeling sick. Event-triggered announcements can be used to tell people that an entrance now has become an exit and that they need to enter through another door, or to inform them that the maximum number of people allowed in a certain area has been reached and that they cannot enter right now. Live voice messages are used when a situation arises that requires immediate action, for example, to remind people to keep physical distance when a room or site is getting too crowded. Remote communication To meet the requirements of physical distancing, it is possible to communicate remotely and get a visual status, grant access from a distance and make live announcements. Axis network door stations let you speak with visitors face-to-face from remote locations, offering secure, hassle-free access to premises for employees and known visitors. Door stations can be used as information points or as emergency phones within a larger area like a city, park, or a school or as a flexible alternative to traditional front desk receptions. They also allow hospital staff to monitor and communicate with patients without having to enter the room. This means fewer changes into protective clothing and reduced use of protective equipment for the staff – without compromising patient safety. Have a look at Axis cooperation with the Nemours Children's Hospital in Orlando, Florida, to see how it works. Crowd control AXIS People Counter counts the number of people who enter and exit a building or site, and when they do it By not allowing too many people in one place at the same time, it is easier to follow physical distancing restrictions. Systems for people counting, crowd control and occupancy estimation help manage visitor traffic. For example, by setting thresholds it’s possible to handle how many people are allowed in a certain space at a time. They can also be used to trigger actions, such as cleaning, stopping the flow of people, calling for extra staff to manage queues etc. AXIS People Counter counts the number of people who enter and exit a building or site, and when they do it. By analysing the numbers, it is easy to plan accordingly, make informed decisions, take immediate action, improve services and operational efficiency. It can also be used to trigger an action – for example, to set up a number-based alert to trigger the desired action when a certain number of people have entered the premises. Occupancy estimation AXIS Occupancy Estimator provides real-time data on how many people are present in a building or site. It is possible to synchronise multiple units within a building and add additional cameras anytime. Remote configuration, management and monitoring make it easy to view statistics from several cameras and locations at the same time, while AXIS Queue Monitor is a cost-efficient application for queue management and analysis. It provides real-time data that can help identify where bottlenecks occur, understands service-cycle timing and improves visitors' overall experience in stores, hotels, public buildings, banks etc. Live streaming and broadcasting Always a practical solution, but especially useful when there are travel and meeting restrictions in force, live streaming and broadcasting make it possible to share information with a broader audience in auditoriums, classrooms and places of worship, for example, while adhering to requirements for physical distancing. And since it minimises unnecessary travel, this is also environmentally sustainable. Remote services Axis Secure Remote Access simplifies the installation of remote access to surveillance systems Remote services make it easier to follow physical distancing restrictions and avoid unnecessary visits to a site, using remote connection, planning and device management. Security installers and system administrators can avoid a physical visit to the site but still successfully design a surveillance system, connect to remote cameras, manage devices, upgrade firmware or renew certificates. AXIS Device Manager is a highly effective on-premise tool that promotes physical distancing by allowing remote monitoring of all devices. Security installers and system administrators can manage all major installation, security and maintenance tasks remotely. It is compatible with most Axis network cameras, access control and audio devices, and allows for management of multiple sites from one central location, including updates of product firmware and certificate management and renewal. The Axis Secure Remote Access is a service that significantly simplifies the installation of remote access to surveillance systems. It is a technology that makes it possible for a smartphone or PC client to access Axis network cameras when the client and the cameras are located on different local networks. Connecting to remote cameras can be a challenge, especially when the cameras are located behind routers or firewalls. Once enabled it is automatically configured and removes the need for manual port-forwarding and router configuration. Impact for the short- and long-term Axis offers innovative and available solutions that increase security and maximise business performance and operational efficiency, and, above all, allow one to carry on with ones daily business while protecting oneselves and the people around – today and tomorrow.
LenelS2 announced a strategic agreement with Bosch Building Technologies to resell Bosch IP cameras in North America and Europe. As a result of the agreement, end-users will have access to the complete Bosch IP camera portfolio through LenelS2’s Value-Added Resellers (VARs). The Bosch IP camera portfolio integrates with all LenelS2™ video management solutions to enhance critical video analytics capabilities that help protect people and assets and optimise building health and efficiency. The integrated solution joins the Carrier Healthy Buildings Program suite of offerings to help deliver healthier, safer, more efficient and productive indoor environments. LenelS2, a front-runner in advanced security systems and services, is a part of Carrier Global Corporation, a foremost provider of healthy, safe and sustainable building and cold chain solutions. Video surveillance solutions The relationship provides a convenient, single source for LenelS2 VARs to procure and build their video surveillance solutions. VARs will be able to leverage a unified support infrastructure for products across both company product lines. LenelS2 and Bosch are developing tighter integrations between products to enable advanced features for future product releases. Camera integration with VMS Bosch cameras integrate with all LenelS2™ OnGuard® and NetBox™ ecosystem video management solutions including LenelS2 NVR (LNVR), UltraView, VRx™ and NetVR™. Bosch cameras also integrate with Milestone XProtect® in support of LenelS2 and Milestone’s distribution agreement. Healthy building solutions “Bosch Building Technologies is a longtime partner and member of the LenelS2 OpenAccess Alliance Program (OAAP), so this was a natural step to take,” said Jeff Stanek, president, LenelS2. “This alliance further supports our commitment to providing open platforms and comprehensive Healthy Buildings solutions, enabling our customers to select the best solutions for their security needs.” Bosch camera portfolio Camera Portfolio includes a wide array of products integrated with advanced video analytics, hardware & software cyber security The Bosch camera portfolio is feature-rich, reliable and includes a wide array of products from small form factors ideal for offices to cameras designed for industrial applications such as utility and transportation infrastructure. Bosch cameras also incorporate advanced video analytics, bandwidth management features, hardware and software cyber security. Bosch cameras feature a full library of essential and intelligent analytics capabilities that can proactively detect a variety of objects and events, which helps to create healthier, safer workspaces. LenelS2 VARs & Bosch devices “By providing direct access to our portfolio of IP cameras, this collaboration makes it easier for LenelS2 VARs to meet the needs and requirements of end-users with intelligent Bosch devices,” says Tanja Rueckert, president, Bosch Building Technologies. “This agreement will enable innovative solutions made possible with features like built-in video analytics, tighter product integrations and greater choice for customers.” Combine industry experience LenelS2 and Bosch have decades of combined industry experience in providing customers with proven security solutions. Bosch Building Technologies has been a part of the LenelS2 OAAP since 2010.
The Security Industry Association (SIA) has named five young security professionals as the recipients of the 2021 SIA RISE Scholarship, a programme offered through SIA’s RISE community, which supports the education and career development goals of young industry talent. Through this scholarship programme, open to SIA student members and RISE members who are employees at SIA member companies each awardee will receive a $3,000 scholarship to use toward continuing education and professional development courses, SIA programme offerings and/or other academic or education programmes. Scholarship funds can be used to expand knowledge in the areas of business, human resources (HR), information technology (IT), marketing, sales, project management, security engineering and/or risk management. Young security professionals “The 2021 SIA RISE Scholarship awardees are an extraordinary group of young security professionals who represent tomorrow’s industry leaders,” said SIA CEO Don Erickson. “SIA is proud to help foster the careers of these talented honourees, and I look forward to seeing their many accomplishments and successes to come.” Winners for the 2021 SIA RISE Scholarship Nadim Hammoud, Software Developer, Feenics As a key member of the software development at Feenics, Nadim Hammoud has contributed to multiple new features in production and bug fixes, built proofs of concept for prospective clients and contributed new tests to the automated testing of the company’s web API. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course and certification in AI He has a strong interest in the latest technologies, including cloud computing and machine learning. Prior to his time at Feenics, Hammoud served as a teaching assistant at Carleton University and held engineering and software development positions at Bertrandt and Tactical Technologies Inc. He holds bachelor’s degrees in computer science and biomedical and mechanical engineering from Carleton University. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course, a professional certification in the field of artificial intelligence and attendance at industry events. Olivia Peralta, Account Executive, Allegion In her role as an account executive at Allegion, Olivia Peralta works with teams around the world to plan and sell access control projects – from teaching the company’s security software to implementing hardware installations hosted on the cloud for physical security end-users. Prior to her time at Allegion, she served as an account executive at ISONAS Access Control and completed communications internships at Western Resource Advocates and the Oregon Natural Desert Association. She holds bachelor’s degrees in environmental sciences and communication and environmental studies from Northern Arizona University and a continuing education certification from Colorado Water Education’s Water Educator Network and is IPVM University Access Control certified. Peralta plans to use the scholarship funds toward earning SIA’s Certified Security Project Manager certification and pursuing an education that bridges the gap between strategy, design and product delivery. Matthew Rios, Regional Sales Manager, Axis Communications Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification In his role at Axis Communications, Matthew Rios promotes the use of IP video and Axis cameras to integrators, distributors, consultants and end-users and maintains fluid and enthusiastic relationships with current and prospective customers. Prior to his time at Axis Communications, Rios held sales management roles at Hanwha Techwin America, Honeywell and R&D Lock and Alarm. He holds master’s and bachelor’s degrees in cybersecurity from Fordham University and a bachelor’s degree in the homeland and corporate security from St. John’s University. Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification. Mary Sharp, HRA, Stanley Access Technologies As a key member of the HR team at Stanley Access Technologies, Mary Sharp is responsible for over 220 professional hourly, non-union service and install technicians and provides support on major change management and organisation redesign efforts and issues pertaining to team cohesiveness, dynamics and management. Prior to her time at Stanley Access Technologies, she held HR and administrative roles at Stanley Healthcare, Infrasource Underground Construction and Frontline Private Security. She holds a bachelor’s degree in ethics and public policy from the University of Iowa. Sharp will use the scholarship funds toward obtaining the Society for Human Resource Management’s SHRM-CP certification. Trevor Zuerlein, System Designer, VTI Security Zuerlein plans to use the scholarship funds to pursue further education in IT, become a member of (ISC)² and to earn CISSP credential Trevor Zuerlein started at VTI Security in 2017 as a security systems technician and now serves as a system engineer; Zuerlein is skilled in access control security systems, security cameras, computer repair, computer science, technical writing and AC/DC electronics. Before his time at VTI Security, he held IT and sales roles with Time Warner Cable, Mead Lumber and Archer Daniels Midland Company. Zuerlein holds an associate’s degree in information technology from Central Community College. He plans to use the scholarship funds to pursue further education in the IT field, become a member of (ISC)² and work toward his goal of earning the Certified Information Systems Security Professional credential. Networking events SIA RISE is a community that fosters the careers of young professionals in the security industry. In addition to awarding the annual SIA RISE Scholarship, SIA RISE offers fun networking events for young professionals, created the RISE Microlearning Series of mini-webinars on top professional development topics, hosts career growth webinars and trade show education tracks. Mentorship programme The recently launched the Talent Inclusion Mentorship Education (TIME) mentorship programme for early and mid-career professionals in the security industry and presents the annual AcceleRISE conference, an essential experience designed to ignite new thinking, strengthen leadership and sharpen business acumen in young security talent. RISE is available to all employees at SIA member companies who are young professionals under 40 or have been in the security industry for less than two years.


Expert commentary
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From kindergarten to university Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognises outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education. Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customised solution Chubb Sicli’s quality, capability, and security expertise provided a customised solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.
Colleges and universities have been targeted in the last several weeks with a series of bomb threats received via campus printers and fax machines. Targeted institutions included Vanderbilt University, the University of Southern California, the University of Virginia and the University of Detroit Mercy, among others. Businesses were also among the targets. Around 100 organisations in all received print-outs, faxes or emails demanding that a $25,000 ransom be paid to a Brazilian citizen to avoid detonation of explosives allegedly planted on the sites. The police determined that the “form letter” threats were part of a hoax and not credible. The situation highlights the need to proactively secure access to printers in today’s networked world. SourceSecurity.com asked Ashish Malpani, Director, Embedded Solutions Product Marketing at HID Global, for insights from a technology perspective. SourceSecurity.com: What are the best practices for securing access to a printer? How widely employed are such practices (i.e., how vulnerable are most printers today?) Ashish Malpani: Most network printers in university environments are secured using several best practices. They include: Set a strong administrator password. Modern MFPs (multi-function printers) have a web interface for configuration and control. By default no password is set so it is important to set a strong admin password. Restrict network access to campus. Ensure that only campus IP addresses are able to access the printer. Disable unnecessary services. Disable services like FTP, Telnet, other network (and discovery) protocols, etc. Implement firmware updates. Securely dispose of MFPs. A recent scan at University of Nebraska at Lincoln found that, in spite of all security practices, 12 percent of printers still have open port and password issues. SourceSecurity.com: How can systems be set up to accommodate students who need access to printers from off campus (or outside the firewall)? Malpani: In the university environment, the need for off-campus print access is prevalent. One of the ways to enable this capability is to force students to connect to the university network using a virtual private network (VPN). However, this is inconvenient and doesn’t usually support printing on demand or printing from handheld devices and cloud storage. An effective way to address this issue is to deploy a secure printing solution, where the users are required to authenticate themselves before the print job is released to the printer from a centralised pool. The benefits of this approach are increased convenience and ability to print at any printer on the campus. However, most printer manufacturers support entering a PIN for authentication, and it is not necessarily secure or convenient when you want faster access. However, new innovations in secure printing have made the printers more identity-aware and rely on everyday devices such as mobile phones and wearables for authentication, resulting in secure and convenient access. SourceSecurity.com: Whose responsibility is the security of a printer? Should manufacturers be doing more to prevent unauthorised access to printers? What is the customer's role? Malpani: IT security staff is responsible for the security of the printer. Something as simple as a printer is expected to work right away after deployment. Manufacturers can do more to enforce security policies on the printer or provide modes that enforce stricter control by default. As a customer, it is critical to have print data security as part of security policy, to review the manufacturer’s recommendations for securely configuring a printer, and to find solutions that not only enhance the security but also provide convenience to end users. A compromised printer can be used to attack other applications, execute arbitrary malicious code or attack other systems SourceSecurity.com: What are some other ramifications of unsecured printers, beyond the printing of threatening materials as we have seen recently on college and university campuses? Malpani: Today’s MFPs are more than just printers. They are file servers, they can email, act as DHCP (Dynamic Host Configuration Protocol) servers, and have the capacity to hold large data sets. Unsecured printers risk misuse and data disclosure. In January of this year, a team of researchers from Ruhr-Universität Bochum in Germany exposed vulnerabilities of major MFPs, such as exploiting the PostScript and Printer Job Language (PJL) vulnerabilities to get access to the data on the printer’s files system and memory. SourceSecurity.com: How does the problem of unsecured printers relate to wider issues of network security (given that most printers are now networked)? What is the risk that printers might be vulnerable as an entry point to the larger network? Malpani: In addition, a compromised printer can be used to attack other applications, execute arbitrary malicious code or attack other systems (e.g., to launch a denial of service attack on the network). SourceSecurity.com: How does the risk of unsecured printers impact the business world or other markets (in addition to college campuses)? How are the security measures different in various environments? Malpani: The security challenges are the same in business environments but, other than the financial industry, most other businesses do not pay close attention to threat vectors emerging out of print data security. IT security departments are also concerned about network security, and the facilities worry about building security, paying little attention to the security of business systems like printers, elevators, HVAC systems etc. Businesses are increasingly turning to managed print service (MPS) providers to ensure compliance, data security as well as management of accessories like print cartridges. SourceSecurity.com: What's your best advice for customers in terms of what they should do to secure their printers? Malpani: First of all, know your customer, understand their needs and what capabilities they desire from the printing systems today. The next generation of students value convenience over privacy and security. So the IT departments across universities need to think about how to meet the needs of their customer while ensuring best practices for security and compliance. It is critical to develop a comprehensive security policy, a regular audit schedule, to secure printers according to manufacturer’s recommendation, and to invest in solutions like secure print that not only provide convenience but also enhance security. Identity-aware systems definitely handle the challenges more effectively than traditional practices going forward. So it is important that the solutions we invest in also take into account the future trends in authentication and printing. {##Poll35 - How strong are your company’s defenses against cyber threats?##}
The PASS guidelines don’t just point to specific technologies; they address security issues and help guide school administrators to make their schools safer and more secure From K-12 to college campuses, schools need integrated solutions and proactive measures to lessen the potential of active shooters while targeting general loss prevention and security. The good news is that technology is available to address nearly every threat and challenge, and systems integrators and others have upped their game, providing comprehensive, proactive consultations to the education market. According to the Institute of Education Sciences and National Center for Education Statistics (NCES), schools continue to use technology increasingly to address security and safety challenges. Overall, there has been an ongoing increase in the use of technology in schools. For example, the NCES cites the percentage of schools that used one or more security cameras to monitor the school in 2013–14 (75 percent) was higher than it was in 2009–10 (61 percent) with other technologies on the upswing as well. PASS takes holistic security approach Security industry organisations, such as the National Systems Contractors Association, Cedar Rapids, Iowa, and the Security Industry Association, Silver Spring, Maryland, are working to establish realistic and effective guidelines for school security. The Partner Alliance for Safer Schools (PASS), powered by NSCA and SIA, released its K-12 security guidelines in April 2015 at ISC West in Las Vegas in an effort to make technology easier to implement and help schools become safer. The PASS guidelines Define threats common to schools at each educational level Offer recommendations on parental and community involvement Detail a layered security approach that combats common threats and mitigates risks related to active shooters Provide information for integrators, school administrators, resource officers, and IT staff on technology-focused solutions like video surveillance, duress alarms, and electronic access control Deliver scalable/tiered measures that administrators can implement based on available resources and local risk levels Advance Technology, Scarborough, Maine, as well as other systems integration firms, manufacturers and consultants, is a PASS-endorsing organisation, according to Rob Simopoulos, President, working with the organisation and others to promote unified efforts. PASS recently updated the initial guidelines to include a new position statement on classroom barricade devices. "It's critical for us to be involved in programs such as PASS," says Simopoulos. "Working together as a united front in the industry, we can help schools become proactive and help them become better prepared." "The guidelines and assessment tools from PASS are not designed to simply point schools towards specific technology. They are designed to take a broader brushstroke to challenges and issues and help guide school administrators through the steps they can take in making their schools safer and more secure,” he adds. Programme gaining traction with schools According to Chuck Wilson, NSCA Executive Director and a Steering Committee Director for PASS, the response to the programme has been extremely positive, and it continues to gain traction. “We see this as a great educational tool, a resource, a way to start a technology roadmap, and a way for schools to build an attainable budget. We have been inundated with requests to download the PASS School Security guidelines, and they are beginning to be used in the field.” The next step is the creation and dissemination of a PASS assessment tool and tool kits that piggyback with the guidelines. “With the PASS assessment tool, integrators can work with school officials to find out what technology they have in place, what can be enhanced or modified to meet the guidelines,and what they can budget for. The PASS tool kits will be custom-designed for the specific audience; for example, for school administrators it might provide information on how to write a grant or respond to a school referendum bond targeting security,” Wilson says. The PASS Steering Committee will meet at ISC West 2016 to address those items.
Security beat
The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realisation of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staff The advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 saw 323 mass shooting incidents as of November. This number is 346 for the year 2017 and 382 for 2016, with ‘mass shooting’ defined as cases where four or more people are shot or killed in the same time period and location. A variety of gunfire detection solutions and other technology approaches seek to address the problem. ShotSpotter SiteSecure and ShotSpotter SecureCampus provide critical outdoor infrastructure protection against active shooter attacks. SiteSecure delivers critical information such as the number of shots fired, a detailed map of the airport or transportation facility, with the shooting location clearly identified. SiteSecure also provides law enforcement and transportation facility management with real-time information that can be useful to identify and address false alarms and reduce mass panic. Gunfire detection and precise shooter location ShotSpotter SecureCampus is a gunfire detection system designed to provide outdoor coverage at university and school campuses. Designed for college campuses and K-12 schools, SST SecureCampus provides gunfire detection, precise location, and number of shooters to first responders and school personnel, enabling faster response to an incident. Designed for college campuses and K-12 schools, ShotSpotter SecureCampus provides gunfire detection Data capture form to appear here! Gunshot detection can offer tremendous benefits in mitigating active shooting incidents occurring in a public facility or commercial environment. Data shows that active shooter attacks often begin outside a building and then progress indoors. Thus, the first line of defence for security professionals lies outside a facility, in a zone of protection surrounding it or comprising the entire outdoor area of a larger facility of many buildings. Audio solutions for perimeter security Video cameras are effective surveillance tools in the event of a shooting incident, but they are not able to capture everything. Deploying audio solutions can automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Audio analytics solutions for aggression and gunshot detection are some of the best security tools in the security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. End users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen Aggression detectors are capable of accurately recognising duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. Artificial intelligence to detect weapons A gunshot detector recognises firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. With the development of artificial intelligence (AI) in object recognition, AI weapons detection offers an efficient alternative to gunshot detection to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing camera systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Audio analytics, processed inside a video camera, are another approach that can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Detecting audio levels and alerting operators The first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom-configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of abnormal situations via event signals allowing the operator to take suitable measures Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Case studies
Trinity College Dublin is enhancing safety and support for staff and students by implementing SafeZone technology from CriticalArc. SafeZone technology Through this implementation, the university aims to deliver more rapid response to calls for assistance across all campus facilities, and to better assist students and staff working remotely, including those on placement overseas. When individuals call for assistance, in a wide range of situations, including those working alone out of hours, those with particular vulnerabilities and those with medical emergencies, the technology will enable responders to pin-point their precise location. Access with SafeZone mobile app Students and staff can check-in and use the service with the SafeZone mobile app Students and staff can check-in and use the service with the SafeZone mobile app, which puts them in immediate contact with the university’s support infrastructure. The technology will also make it easy for the responders to optimise response and to provide appropriate intervention in the event of an emergency. “During this challenging time for our students and staff, Trinity College Dublin is doing everything it can to ensure both the physical and mental well-being of everyone in our community. We are delighted to be introducing this advanced technology, as part of our support actions,” stated Trinity’s Head of Safety, Dr. Katharine Murray. Students and staff safety “It’s more important than ever for universities to keep in touch with their students and staff, to fulfill their duty of care and ensure that those who need help of any kind get the quickest possible response,” said Darren Chalmers-Stevens, Managing Director of CriticalArc. Darren adds, “We’re pleased to help Trinity College Dublin with a rapid implementation of SafeZone to help ensure the safety and well-being of students and staff.”
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Centre, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights Security Centre is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organised at a grand scale at Nashik, Haridwar, Ujjain and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralised Monitoring Software (CMS)
HID Global, the globally renowned company in trusted identity solutions, has announced that Bay State College safely brought its students back to its campuses in Boston and Taunton, Massachusetts using a digitised contact tracing solution that includes HID Bluetooth BEEKs Beacons to provide real-time location services. HID Bluetooth beacon The HID Bluetooth beacon is in the form of a simple badge holder that is used to carry existing ID badges for students, faculty, staff and guests. The beacons are part of a robust solution that makes it possible to quickly and easily perform contact tracing, removing the manual and time-consuming effort to identify who has been in contact with whom on campus. “Contact tracing is a key component for safely operating our campuses and considered by health departments to be one of the most important efforts to help slow the spread of COVID-19,” said Jeffrey E. Myers, Chief Information Officer with Bay State College. Contact tracing solution He adds, “HID BEEKS beacons are carried by each person on campus as part of our solution that enabled us to safely resume in-person classes and keep our campus operational should isolated parts of our community find themselves infected.” The HID BEEKS Bluetooth Low-Energy (BLE) beacons provide the starting data that Bay State College’s contact tracing solution uses to calculate the time, place, and proximity of faculty, staff, and students while on the college’s two campuses. HID BEEKs Beacons HID’s offering is part of a broader platform that provides smart building and optimisation capabilities" The information from the beacons enables college administrators to comply with state and local occupancy mandates and, when needed, rapidly respond to cases. Logs are maintained only for the 14-day period required for contact tracing, and the university has adopted strict privacy policy guidelines for data use and access. “We are very pleased that Bay State College has used HID BEEKs Beacons to help streamline and accelerate the often daunting task of contact tracing,” said Mark Robinton, Vice President of IoT Services at HID Global, adding "In addition to creating a completely digitised approach to this process, HID’s offering is part of a broader platform that provides smart building and optimisation capabilities that extend well beyond today’s pressing need to stem the spread of COVID-19.” HID Location Services HID BEEKS Beacons are part of a complete HID Location Services for Workplace Safety that also simplifies and streamlines how to manage social distancing. These workplace safety solutions build on the company’s comprehensive HID Location Services platform, deployed by Fortune 500 companies worldwide, to manage building occupancy, optimise office and facility space, improve energy efficiency and enhance security. The platform can also monitor assets as well as the condition and health of industrial equipment.
At the Inholland University of Applied Sciences, a rolling project to upgrade access control at all locations has been ongoing for several years. Typical of any large educational setting, the tension between remaining open and accessible on the one hand — and securing people, equipment and data on the other — is a critical factor. More than 500 Aperio wireless door locking devices have now been deployed at 7 separate Inholland campus sites. These battery-powered locks provide tested and trusted protection for the university’s most important areas and rooms, including offices and exam storage spaces. Aperio devices fit all kinds of interior openings, including wooden and glass doors, as well as fire doors. Aperio cylinders, escutcheons, handles and security locks have in-built RFID readers for installer and user convenience. Integration with Nedap AEOS access control system All Inholland’s new Aperio devices are fully and seamlessly integrated with the university’s Nedap AEOS access control system. A single credential allows users to unlock all authorised openings managed by the AEOS system — whether wired or Aperio-protected doors. Because Aperio locking devices are wireless, they were installed and initiated quickly — without disruption to Inholland buildings or their students’ working day. And choosing Aperio saved more than just time. A recent ASSA ABLOY benchmarking study finds installer labour costs are over 80% lower for wireless versus wired locks. The ongoing cost of running battery-operated wireless locks is also much lower than for equivalent wired electronic locks, which require an “always on” connection to mains electricity to maintain secure status. In addition, choosing Aperio gives Inholland the ability to roll out enhancements over time, as needs, budgets and priorities evolved. Aperio devices can be added and integrated gradually, with no need to replace existing systems. Inholland’s investment remains totally future-proofed. Programmable RFID credential Fitting Aperio wireless escutcheons and locks to critical doors ensures university staff, students, visitors and confidential information are safe without impacting site accessibility. Authorised users open relevant secure doors conveniently with a programmable RFID credential. Aperio’s inherent flexibility makes it easy to adjust any space’s level of protection at any time. So, locking status is regularly reconfigured as needs and usage evolves around the multi-site campus and university facilities. Smart building systems Based on their experience to date with Aperio, Inholland are already planning for the future. A new university in Amsterdam will become a smart building and will require access control able to integrate with smart building systems. Aperio is built on an open platform, designed for interoperability, so this is a natural fit. Inholland will enter pilot stage for their new smart building soon. “I am very satisfied with the implementation and operation of the Aperio solution and I have every confidence in ASSA ABLOY as a manufacturer,” concludes Frans Bruggeman, Facility Services Consultant at Inholland.
Monitoring campuses to protect students, parents, and staff means balancing proactive measures with effective response to incidents. Ava Unified Security (previously Vaion) helps one identify unwanted events like vandalism, intrusion, loitering, parking violations, or people involved in suspicious acts so that one can focus on what truly matters: delivering positive academic experiences. Anomaly detection in real-time Powered by Spotlight™, the dynamic video view with instant notifications draws attention to the relevant video feeds with potential risks. Identify intruder break-ins, loitering, guns, or unauthorised vehicles in real-time. Operators can switch between live and playback with the click of a button. Smart Presence™ depicts people as dots on maps and live footage of persons of interest. Combine with access control to monitor hallways for a complete picture of loitering, theft, or even active shooter scenarios. Gain insights on occupancy counting in classrooms and libraries for better energy efficiency. Accurate search and integrated audio analytics Smart Search™ allows operators to search by appearance, events, objects, similarity, or image Smart Search™ allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, such as laptops or vehicles, identifying suspicious people inside or just outside campus, locating missing students now take minutes instead of hours. With the same or fewer resources, operators can provide compelling evidence and mitigate liability risks. Ava Dome and Ava 360 perform perform exceptionally well either indoors or outdoors and in any lighting conditions making them suitable for different settings, such as classrooms, assembly halls, sports halls, or dormitories, and blend discreetly as interior fixtures. The integrated audio analytics identifies sound patterns and sends instant alerts in cases of broken glass, screaming, and gunshots. Key benefits Build from existing investment while retaining privacy Integrate with existing cameras Add access control to extend capabilities Video & metadata storage remain on-premises Full site survivability and local access Save storage and money Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimisation Pay for what one needs, when one needs it, without the hassle of complicated licencing Safe and welcoming environment Capture every detail at all times with discreet security cameras Increase situational awareness Enable preventative action through immediate response time Collaboration and flexible licencing Globally access live feeds and recordings Share video links with law enforcement authorities to facilitate ease of investigations Maintain the integrity of records with video watermarking With a simple licencing model, Ava always includes services and software upgrades. One no longer has to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.


Round table discussion
School shootings are a high-profile reminder of the need for the highest levels of security at our schools and education facilities. Increasingly, a remedy to boost the security at schools is to use more technology. However, no technology is a panacea, and ongoing violence and other threats at our schools suggest some level of failure. We asked this week’s Expert Panel Roundtable: How have security solutions failed our schools and what is the solution?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Products

How to ramp up perimeter security with license plate reader technology
Download
Solve access control challenges in the healthcare sector
Download
Getting the most value from Software Subscription Agreements
Download
Shifting trends in operation centers and control rooms for 2021
Download