Hangzhou Hikvision Digital Technology Co., Ltd (“Hikvision”) has announced a new business team dedicated towards developing intelligent solutions for fentanyl-related substances regulation. This is a solid move to respond and contribute to the joint efforts between the governments of China and the U.S., together with the international community, to combat drug crimes and protect the public health and safety. Relying on Hikvision’s advanced video technology and big data analytics, the new dedicated team will be committed to develop the intelligent solutions for fentanyl regulation. Public safety and combating drug crimes In recent years, how to effectively regulate and control the new types of psychoactive substances, including fentanyl, has become a serious international problem. In late 2018, the leaders and governments of China and the U.S. reached an agreement on the cooperation in law enforcement and Fentanyl control. Recently, China’s Ministry of Public Security, National Health Commission, and National Medical Products Administration jointly announced to regulate all fentanyl-related substances as a class of controlled substances (with non-medical use), which takes effective May 1. Custom video intelligent solutions Creating more values to the society through our advanced technology has always been the goal Hikvision pursued" Due to its numerous variants and low threshold for synthesis, Fentanyl has put forward a new challenge to the technology of drug inspection and control. The new dedicated team of Hikvision is composed with the experts in many fields like system architecture, central platform, algorithms and products. With experience in video intelligent application and big data analytics, the team will conduct in-depth research on key technical issues existing in Fentanyl’s production, storage and transportation, and develop customised intelligent solutions to facility the optimisation on drug control. Mr. Cai Changyang, Senior VP of Hikvision, said: "Creating more values to the society through our advanced technology has always been the goal Hikvision pursued. The problem with new types of drugs, including fentanyl-related substances has caused risks and hazards worldwide. Therefore, the company has decided to set up a dedicated team to respond to challenges and to join the joint endeavor, aiming to make contributions to protect the physical and mental health of humanity, as well as safeguard our communities and society."
Leading lock specialist Pickersgill-Kaye (Kaye), a brand under ASSA ABLOY’s High Security & Safety Group, is encouraging those responsible for critical infrastructure sites to consider servicing contracts to help minimise the risk of costly breaches of security. Perimeter protection With terrorism posing a serious threat to the UK’s interests, perimeter fencing, doors and their locks are the first line of defence against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access.Kaye offers facility managers preventative measures that can reduce deterioration of operational parts and identify faults Safeguarding these vital facilities has become significantly more complex and an essential challenge for all major industries. Enlisting the services of security experts like Kaye offers facility managers preventative measures that can reduce deterioration of operational parts and identify faults before they become a potential problem. Electronic and mechanical locks Locks, which are the heart of any integrated security system, can take a pounding from human intervention and environmental conditions. Regular maintenance checks and rapid repairs of doors and locks can nip in the bud risks of unauthorised access to a secure site’s operations. The High Security & Safety Group, a division of ASSA ABLOY Opening Solutions UK and Ireland, employs a team of qualified engineers that hold high level security clearance. They can provide a quick response throughout the country, including emergency call-outs, to resolve issues, repairing and replacing not only the locks but the high security doors as well, irrespective of the type or original manufacture. High-security doors Behind this support in the field is a 24-hour service hotline, a first-time fix policy – a service that is unique to the High Security & Safety Group, and planned, customised maintenance contracts to give total peace of mind that high security doors and their components are continuing to be fully fit for purpose. Simon Teagle, Managing Director, High Security & Safety Group, said: “Our fully trained and qualified engineers are able to service doors and components from other manufacturers, as well as ASSA ABLOY Group products, to maintain maximum operations on a high security installation. We believe that we offer the most reliable and robust solutions for essential services to ensure the long life of equipment designed to protect infrastructure and deter unwanted visitors.” Training on security systems The company also provides consultancy and training for end users of its locks and high security systems The company also provides consultancy and training for end users of its locks and high security systems, either at its UK manufacturing facility or the customer’s site. Training is tailored to all levels of personnel and include supply of extensive documentation. Locks supplied by Kaye can be seamlessly integrated with third party systems, have been rigorously tested to the highest standards and are recognised throughout the world for their reliability, robustness and longevity. These products can be supported by a proactive, maintenance regime to extend their lifetime and cover exceptional circumstances such as abuse and attack, which can lead to operational issues. High-tech locks and doors Trouble-free locks and doors are an integral factor to the smooth running of any secure facility and regular servicing will help diagnose and eliminate potential weak links in the defence of essential services. It is recognised that long-term reliability gives greater value than short term fixes.
Thailand’s leading business hub for security solutions, Secutech Thailand, is set to return from 28 – 31 October 2019 alongside Thailand Lighting Fair, Thailand Building Fair, and Digital Thailand Big Bang. Under the banner of ‘Smart City Solution Week 2019’, the four fairs together will serve as a one stop shop for smart city professionals to source all of the latest security, building automation, lighting and digital infrastructure solutions. “The Thai government aims to establish 100 smart cities over the next two decades,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “Within this context, ‘Smart City Solution Week’ delivers a win-win for Thailand’s smart city stakeholders. The arrangement will not only create visitor synergies amongst the four fairs, but it will also help to build even more momentum for Thailand’s smart city sector.” Secutech Thailand – Security + AI Ms Tsai said that she expects to see an increase on last year’s visitor numbers during Smart City Solution Week 2019 Secutech Thailand has embraced the smart city concept since the first edition in 2011, and under its new theme of ‘Secutech Thailand – Security + AI – Empowers Sustainable City Development’, the fair will deliver all of the latest AI and IoT security innovations for the smart city sector. The 2018 edition of the fair featured a record 250 exhibitors (2017: 150) and attracted 8,420 visitors to 7,000 sqm of exhibition space. Ms Tsai said that she expects to see an increase on last year’s visitor numbers during Smart City Solution Week 2019: “Many of the distributors and system integrators that visit Secutech Thailand also have business interests in the lighting, building automation and digital infrastructure sectors. By running Secutech Thailand alongside Thailand lighting Fair, Thailand Building Fair, and Digital Thailand Big Bang, we will create a convenient one-stop sourcing platform that will draw in even more buyers to Secutech Thailand.” Sustainability, the key theme at Smart City Week 2019 All four fairs will be held at the Bangkok International Trade and Exhibition Center, and in keeping with the modern push towards sustainable living, each fair offers a unique sustainability theme. The Thailand Lighting Fair is set to be held under the theme of ‘IoT + City: A Sustainable and Livable Future’ The Thailand Lighting Fair, for example, is set to be held under the theme of ‘IoT + City: A Sustainable and Livable Future’. Jointly organised by Messe Frankfurt New Era Business Media Ltd and The ExhibiZ Co., Ltd, the fair is a home for exhibitors to showcase their unique lighting accessories and electronic components; as well as smart and sustainable lighting solutions for cities and commercial environments. Sustainable solutions Sustainable solutions will also be on display throughout the halls of the Thailand Building Fair. Run by the same organisers as the Thailand Lighting Fair, the show is a regional hub for building automation and electrical engineering solutions which include products that promote energy efficiency and facilitate smart living. Meanwhile, established in 2017, Digital Thailand Big Bang is a B2C platform that receives government backing to promote digital technologies. The fair is organised by the Digital Economy Promotion Agency (DEPA) to showcase the ways that big data can be used to transform society and improve urban living standards. Just a few of the solutions that can be found at the fair include city management systems, cloud computing, fintech products, and digital infrastructure such as submarine cables and satellites. Smart Police and Smart Transportation Zones In line with the smart city theme, the 2019 edition of Secutech Thailand will feature four zones, each of which will display products for different smart city sectors. A key element of smart cities – smart transportation, will be served at the ‘Smart Transportation zone’ The ‘Smart Police zone’, will host IoT technologies that assist smart policing, such as real-time crime mapping systems, body-worn cameras, crowd management systems, gunshot detection systems, predictive policing systems and more. Another key element of smart cities – smart transportation, will be served at the ‘Smart Transportation zone’. Here, trade visitors will find smart surveillance systems, vehicle monitoring systems, as well as traffic and security control centers. Safe Factory and Smart Campus Zones Elsewhere, the ‘Safe Factory’ and ‘Smart Campus’ zones will deliver the latest early warning disaster systems, emergency response systems, personal alert applications, and products capable of providing real-time air quality information. In addition to this, Thailand’s fire safety fraternity will be able to locate all of the latest fire extinguishers, alarms and emergency equipment at the concurrent ‘Fire & Safety Thailand’ event; whilst three further events: ‘SMALiving’, ‘SMACity Solution’, and ‘Info Security Thailand’, will host all of the latest advances in their related sectors.
telent, global UK technology and network services company, has launched a pioneering digital evidence management solution that could potentially save police forces millions of pounds per year. Digital Evidence Management solution telent’s digital evidence management solution is designed to specifically meet the needs of UK police forces Jointly developed with UK-based specialist policing software application provider, Innaxys and in conjunction with emergency services across the country, telent’s digital evidence management solution is designed to specifically meet the needs of UK police forces. It provides 100% UK sovereignty of the storage of digital evidence with all data encrypted and held securely on telent’s Public Services Network (PSN) accredited and UK-based cloud platform. Addressing the increase in digital evidence, such as CCTV footage, photos and videos recorded by the public, and body camera and dashcam clips, the solution will significantly reduce the time officers spend physically collecting CCTV images and enable faster analysis and processing of evidence. Police forces will also be able to securely share evidence with the criminal justice system to ensure evidence cannot be misplaced, lost or damaged, reducing court case adjournments and delays. Telent - Innaxys collaboration A proof of concept has already been successfully delivered, with the first live deployment currently in the final stages of user acceptance testing ahead of its planned go live date later this year. While specific cost savings will be proportional to the size of individual police forces, a medium sized force has estimated that the solution will save 2,100 officer shifts per annum. The same force also believes a 50% reduction in court case adjournments can be achieved through the solution’s secure sharing of digital evidence. “Jointly with Innaxys we have developed this solution in consultation with UK police forces specifically to address the challenges faced by officers collecting data in the modern policing age where there has been a huge increase in public and business CCTV use,” said Barry Zielinski, General Manager Public Safety & Defence at telent. “This is combined with a proliferation of smartphones, dash cams, social media and body worn cameras, creating both opportunities and challenges for policing. This solution helps officers efficiently collect, manage, store and share these new digital evidence sources. It will save officer time collecting images, reduce court case adjournments and ensure the security of digital evidence by eliminating the risk of it being destroyed, tampered with, lost or even left in public places.” Proliferation of digital evidence telent’s solution follows the CoPaCC/Police ICT User Perspectives 2018 report, which is based on a survey across UK police forces telent’s solution follows the CoPaCC/Police ICT User Perspectives 2018 report, which is based on a survey across UK police forces. This research highlights concerns regarding the management of digital evidence, stating that urgent action is required to manage the proliferation of digital evidence and replace current time consuming and insecure processes. The solution is available via a national police procurement framework and forces which choose to use the solution will be provided with management options for each digital asset or piece of evidence, including who has access, how long they have access, and what metadata about the evidence is shared. When collecting evidence from members of the public, the force can email a link which lets people securely upload their footage from anywhere with an Internet connection. Integration with Digital Evidence Transfer System (DETS) The solution also integrates directly with the Digital Evidence Transfer System (DETS) which will link police forces to the criminal justice system. DETS was also developed by Innaxys and is currently being trialed by the Home Office in conjunction with five police forces across the UK. It is expected to be mandated by the Home Office for use by all police forces in 2020. Jean-Claude Lafontaine, CEO at Innaxys, said: “Through the digital evidence management solution, the time and cost of collecting evidence from the public is massively reduced. Such a system will become more and more necessary in the future, as digital evidence continues to grow, and officer resources are put under increasing strain.” Faster processing, sharing of digital evidence Additional key benefits of telent’s digital evidence management solution include faster processing and sharing of digital evidence Additional key benefits of telent’s digital evidence management solution include faster processing and sharing of digital evidence with suspects which will reduce “no comment” interviews and ensure criminals are brought to justice faster. Providing more efficient analysis and management of digital assets is particularly important for larger and complex investigations. Simple crowd sourcing of phone and dash cam images for both minor incidents and major terrorism incidents will also be made possible, while police forces’ reputation will be protected due to the solution eliminating the risk of digital evidence being destroyed, tampered with, lost or left in public places. “In the context of legacy IT systems, budget cuts and increasing demand for frontline policing, this solution is exactly what’s required to ensure that the UK’s police forces have a cost-effective solution that will them see them well into the future and supplement the incredible work that they do,” added Barry Zielinski at telent.
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies around the country and displayed in every US Post Office to speed up apprehension. Facial recognition Advancements in artificial intelligence and biometric technology have led to the widespread use of computerised facial recognition Today, technology such as social media, television and other more specialised communication networks play a more influential role in the recognition process. Advancements in artificial intelligence and biometric technology, including the development of Machine Learning capabilities, have led to increased accuracy, accessibility and the widespread use of computerised facial recognition. The significance of this means that facial recognition can occur on an even larger scale and in more challenging environments. This article will explore key milestones and technological advances that have resulted in the modern incarnation of facial recognition, before discussing the capabilities of cutting-edge “one-to-many” technology which is increasingly being used by counter-terror defence, police and security forces around the world. Technology inception and developments The technology was able to match 40 faces an hour, which was considered very impressive at the time The 1960s marked the start of computerised facial recognition, when Woodrow Wilson (Woody) Bledsoe developed a way to classify faces using gridlines. Bledsoe’s facial recognition still required a large amount of human involvement because a person had to extract the co-ordinates of the face’s features from a photograph and enter this information into a computer. The technology was able to match 40 faces an hour (each face took approximately 90 seconds to be matched) which was considered very impressive at the time. By the end of the 1960s, facial recognition had seen further development at the Stanford Research Institute where the technology proved to outperform humans in terms of accuracy of recognition (humans are notoriously bad at recognising people they don’t know). By the end of the century, the leading player in the field was a solution that came out of the University of Bochum in Germany – and the accuracy of this technology was such that it was even sold on to bank and airport customers. From this stage on, the facial recognition market began to blossom, with error rates of automatic facial recognition systems decreasing by a factor of 272 from 1993 to 2010 according to US Government-sponsored evaluations. The aim for facial technology is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware Modern usage of facial recognition Fast-forward to the modern day and facial recognition has become a familiar technology when using applications such as the iPhone X’s Face ID capability or MasterCard Identity Check, passport e-gates at airports and other security and access control points. These solutions implement a consensual form of identity verification, as the user has a vested interest in being identified. This is a “one-to-one” facial recognition event, one person in front of the camera being compared to one identity either on a passport or the app. In these scenarios, the hardware is specifically developed for the application at hand, therefore technically much easier to accomplish. Facial recognition can now be used in a variety of governmental and commercial environments The safety and security world brings a much more complex problem to solve – how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve. It’s even more challenging when the aim is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware. And unlike in the 1960’s where identifying a face every 90 seconds was acceptable; the safety and security market requires near instant feedback on who a person matched against a watchlist is. Security and safety applications The idea behind all facial recognition technologies is broadly the same: you start with an image of a person’s face (ideally a high quality one, although machine learning means that to a point we can now even use video without reducing accuracy). A fully front facing image is best, think a passport photo, but machine learning and new software has made this more flexible. An algorithm converts this image into a numeric template, which cannot be converted back to an image and so represents a secure one way system. Every numeric template is different, even if it started out as an image of the same person, although templates from the same person are more similar than templates from different people. The accuracy of facial recognition continues to increase alongside deployments in more challenging and complex environments What happens next sounds simple although the technology is extremely complex: templates of people’s faces are taken in real time and compared to those in the database. The technology identifies individuals by matching the numeric template of their face with all the templates saved in a database in a matter of seconds or milliseconds. To put this into perspective, imagine you are at the turnstiles of a busy train station looking for a person on the run. Today’s facial recognition technology would be able to identify that person should they pass in view of a CCTV camera, as well as notify the police of any additional persons of interest, whether they are a known terrorist or missing vulnerable person on an entirely separate watch list. Because of technical progression, facial recognition can now be used in a variety of governmental and commercial environments, from identifying barred hooligans attempting entry at a football stadium or helping self-excluded gamblers at casino to overcome addiction. Real-time assessments The latest evolution of facial recognition pits the technology against an even more challenging application – directly matching individuals from body worn cameras for real time recognition for police officers on the beat. This capability equips first responders with the ability to detect a person from a photo and verify their identity with assurance. The broader implication for this means that every interaction, such as stop and search or arrest, can be supported by real-time facial recognition which will see cases of mistaken identity driven down on the streets. First responders can now for the first time be deployed and furnished with the ability to identify wider groups of people of interest with a degree of accuracy that previously relied only on the fallible human memory. As the accuracy of the technology continues to increase alongside deployments in more challenging and complex environments, its ability to support government initiatives and law enforcement means the debate about the lawful and appropriate use of facial recognition must be addressed. Facial recognition should not be everywhere looking for everyone, but when used properly it has the potential to improve public safety and we should make the most of its potential.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and facilities that need protection; security is a big concern and a large market. Concerns about information security, cybersecurity and convergence are also dominant topics. Benefitting from a revised trade agreement with the United States, Mexico offers a favourable business climate and low costs. In addition to video and other hardware products familiar at the U.S. show, Expo Seguridad also includes a large public safety/police component, a workplace, environmental and industrial safety sector, and fire products, offering a broad range of additional product categories. Developing knowledge of attendees The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakersOn the exhibition floor will be the VIII International Conference for the Administration of Security and Law Enforcement, which will bring together renowned specialists in the security and public safety sector. Free conference track rooms will be provided on the exhibition floor to develop knowledge of attendees in various business areas. The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakers. Manufacturers, distributors, integrators, and national and international end users have come together at Expo Seguridad since 2002 to interact and exchange knowledge during the three days dedicated to the security industry. Expo Securidad México provides access to more than 350 exhibitors and the opportunity to interact, connect and develop face-to-face relationships with more than 16,300 security and public safety decision-makers. This year, Daniel Linskey, former Boston police chief, will provide a welcome speech at the opening ceremony and will share his experience and thoughts about the 2013 Boston Marathon bombing. Exhibition of public safety equipment The exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutionsISC Brasil, June 25-27, offers a combination of physical security and emerging information and cybersecurity elements. An Infosecurity pavilion on the show floor and related conference track sessions highlight growing concerns in the marketplace. A large meeting of Brasil’s law enforcement commanders is collocated with ISC Brasil, and the exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutions. A strong VIP attendee program ensures attendance by high-level decision-makers with money to spend. The ISC Brasil Congress is an educational program for continuing professional education and technical training for corporate end users, police commanders, distributors, integrators, law enforcement officials, security consultants, IT and public safety managers. Of the expected 18,000 attendees, some 53% come from corporate end users in several vertical industries. Some 21% of attendees are commercial system integrators, with 9% central monitoring systems and 5% law enforcement and public authorities’ safety. Security for oil and gas companies Brasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two yearsBrasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two years. Brasil’s huge economy includes big industries that need lots of security – oil and gas companies, and automotive production are among the contributors to economic growth. Attendee and exhibitor satisfaction is strong for ISC Brasil, and the show is on a new growth path as the economic situation in Brasil continues to improve under a new president. Large exhibitors at ISC Brasil include Bosch, Genetec, Hikvision, Dahua, HID Global, Honda, Yamaha, and Microsoft. Large Reed Exhibition offices in Mexico City and São Paulo manage the Latin American events and work with local partners, marketing organisations and clients. Emerging Technology Zone ISC East in New York, Nov. 20-21, continues to build momentum in 2019 after a successful 2018 show that saw double-digit growth both in exhibition space and attendance. Reed Exhibitions’ Infosecurity/ISACA North America Expo and Conference will again be collocated with ISC East, expanding information security and cybersecurity horizons for attendees. (ISACA is an international professional association focussed on IT governance.) New at ISC East in 2019 will be an Emerging Technology Zone, providing a high profile for emerging technology companies at the show New at ISC East in 2019 will be an Emerging Technology Zone comparable to the one at ISC West, providing a high profile for emerging technology companies at the show. The Unmanned Security Expo, a big success last year, will be even bigger in 2019 with more exhibits than ever. There are good signs on the horizon for greater use of drones and robotics. Protection for enterprises ISC East has traditionally focussed on the ‘tri-state’ area around New York City – New York, New Jersey and Connecticut – an area rich in end user companies, especially in financial services, retail, entertainment and the media. In New York City alone, there are almost endless numbers of big enterprises that need protection, so a localised show is a natural, and doesn’t require the large pool of potential customers to travel away from their businesses. New York also has a large and active law enforcement community, and there are many large systems integrators that operate in and around the New York area. ISC East is a growing show that serves a large, unique audience. Growth of ISC East also suggests it is becoming more of a ‘super-regional’ event, drawing good attendance from the Southeast and Midwest in addition to the tri-state area.
As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated video cloud service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organisations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-accelerated solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM software platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial recognition software IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorised person and track him or her across non-overlapping cameras. Enhance situational awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-class security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimised to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic physical security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable productsUL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive automated system Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create significant value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organisation.
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimise the death toll)? In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effectiveness of preventative measures as they relate to school shootings. Scarce resources on preventative measures The dearth of knowledge on the subject leaves schools at risk of spending scarce resources on measures that don’t have any real impact, or worse, that have a negative effect on education environments. The natural impulse following a school shooting is to do something – anything – to prevent the tragedy from happening again at any school, but especially at my school. But how is money best spent?Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything Congress has passed the Stop School Violence Act of 2018 to provide $50 million per year to develop programs to train students, teachers and law enforcement to prevent violence, and to create anonymous reporting systems, such as hot lines, for school violence threats. The bill authorises another $25 million for improvements to school’s physical security infrastructures. Congress also provides $1.1 billion in Title IV block grants, which districts can use to pay for diverse needs such as security systems. Several states are providing additional funding for physical safety measures and campus police, and local districts are also stretching their budgets to address security concerns. But is that money being targeted to measures that will help the situation? What is the role of technology in preventing school violence, and are we as an industry at risk of over-selling our preventative capabilities and diverting money from other measures that might have more impact? Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything. More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process Studies on school safety and protection Researchers, advocates and educators gathered this fall at American University to consider the need for better research to inform decision-making on safety, reported Education Week.The field is in desperate need of more evidence on what works, and schools want this information presented to them" A 2016 study by the Rand Corp. points to the problem: Lack of data and research on what works and what doesn’t. “Despite growth in the school safety-technology sector, rigorous research about the effectiveness of these technologies is virtually non-existent,” according to Rand. “The field is in desperate need of more evidence on what works, and schools want this information presented to them in vetted, digestible ways to help them with procurement.” Jeremy Finn, a professor of education at the University of Buffalo, has pointed out the difficulty of assessing the effectiveness of measures designed to deter events that likely won’t occur anyway. “How do you know when you have deterred a school shooting?” he asks. “It didn’t happen.” The effects on our students Might technologies aimed at making schools more secure have an adverse effect on the learning environment? More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process. The physical security industry should freely acknowledge that the technologies we offer are only part of the solution to school violence Do security measures aimed at preventing active shooting incidents absorb resources that might better be used to address a more general and/or likely security threat such as vandalism or student discipline? Theoretically, security measures in general should help to prevent the probability of an active shooter at the same time they are addressing a wider range of concerns and threats. But do they? At the very least, we in the physical security market should be aware, and should freely acknowledge, that the technologies we offer are only part of the solution to school violence. Schools should take the broadest possible approach to the range of security challenges, and technology should be one tool among many. Furthermore, better data to measure what works is sorely needed to illuminate the best path forward.
Apstec Systems (Apstec) announces that its Human Security Radar (HSR) system will be deployed at the Palexpo Exhibition and Congress Centre in Geneva to improve safety and security for the International Motor Show 2019. Asptec’s HSR system is the world’s first fully automatic real-time mass people screening solution. Held over a period of ten days, the Geneva International Motor Show is one of the automotive industry’s flagship events and attracts large numbers of visitors every year. The organisers are anticipating up to three-quarters of a million visitors over the duration of this year’s event, with capacity reaching 150,000 attendees a day during peak times. Largest conference centres The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors HSR is uniquely well suited to managing this level of throughput and providing a high level of security without causing disruption to the flow of visitors into the venue, or negatively impacting their experience. Two HSR systems will be deployed for the show, each capable of screening up to 10,000 people per hour. The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors. Traditional security checkpoints or manual searches, which scan one individual at a time, are not suited to large venues and public places, leading to queues and delays. Although security is still paramount, attention has moved towards the need to add a critical level of defence that doesn’t impede visitor experience. Cost-effective solution HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in high footfall scenarios. The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. Developed by specialists in the fields of radio physics, electronics and software engineering, the walkthrough system has been built in conjunction with authorities and ‘end users’ in security and counter-terrorism. HSR screens for mass casualty threats including improvised explosive devices concealed on the body or in body-worn bags, and firearms wherever they are carried, without the need for an operator to inspect suspect materials. It leverages centimeter wave technology, meaning it can discriminate explosives from benign materials, with a high degree of accuracy. Security screening The Palexpo’s deployment of HSR is the latest major implementation of this new technology Gregory Labzovsky, CEO, Apstec, explained: “Until recently, it’s been almost impossible to secure public spaces in a simple and cost-effective way, with existing approaches to security screening proving to be impractical, inconvenient and expensive to operate. HSR enables venue owners to close a critical security capability gap without impacting the experience of their patrons. We’re delighted to be working with The Geneva International Motor Show to enhance safety for thousands of motoring exhibitors and enthusiasts.” The Palexpo’s deployment of HSR is the latest major implementation of this new technology. The system has been installed in some of the world’s busiest airports, as well as in sports stadiums, entertainment venues, mass transport hubs and networks.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting and deterring power thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch video security and intrusion detection systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP cameras with built-in video analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announces that the longest operating and only remaining studio in Hollywood has implemented Delta Scientific's bollards and beam barricades to keep visitors and staff free from harm of terrorists and errant drivers. The 100 year-old facility features 30 stages throughout Paramount Studios' 65-acre complex. Perimeter Security Group installed the high security equipment at five different locations. Aesthetically pleasing solution We reviewed their facilities and recommended a combination of Delta's TT212 beam barricade and DSC800 high security bollards""Paramount Studios asked us to create an aesthetically pleasing solution that would stop unauthorised vehicle entry at these five places but would still let production vehicles through when needed," reports Troy Blood, senior physical security professional at Perimeter Security Group. "With all the news of terrorists using vehicles as weapons against people, Paramount Studios recognised that they, too, could be a high profile target. We reviewed their facilities and vulnerabilities and recommended a combination of Delta's TT212 beam barricade and DSC800 high security bollards. Paramount wanted the job done quickly and at night so we wouldn't disturb tourists or shoots." Standard traffic controls The high-strength wire rope of the sturdy TT212 beam barricade will stop a large or fast-moving vehicle weighing 6,000 pounds at 40 mph (2722 kg at 64 kph). The beam is raised to let the passage of authorised vehicles through and, then, lowered to protect cars or trucks from entering. The TT212 beam barricades are very popular and seen at many nations' embassies throughout the world. Manually-operated bollards were especially cost effective because they were used in locations were they would seldom be lowered"They are also selected for government facilities, restricted or reserved parking areas, impound yards, freight terminals, shipping and receiving docks, storage and warehouse entrances, arms depots and other places where standard traffic controls or gates are not capable of resisting such high crash forces or vandalism. Manually-operated bollards Paramount Studios also selected Delta's stylish manually operated DSC800 crash rated bollards for those areas in which vehicle passages are infrequent. The DSC800 will stop a 15,000 pound vehicle at 30 mph (6804 kg at 48 kph). They specified a model with classy cast aluminum decorative sleeves, which slip right over the crash tube. If ever damaged, Paramount will simply slip off the old and slip on the new sleeve. "Versus hydraulic or pneumatic operation, manually-operated bollards were especially cost effective for this application because they were used in locations were they would seldom be lowered. As a result, this expedited installation because there were no motors or power to contend with and also eliminated the need to work with any additional trades, such as electrical. All we needed to do was to make the barriers plumb."
Hoverfly Technologies Inc., global supplier of tether-powered aerial drone systems, is pleased to announce it has engaged retired Deputy Chief of Los Angeles Police Department Mike Hillmann to consult and provide expertise to Hoverfly and public safety officials of cities, counties and special law enforcement agencies who are considering the use of Small Unmanned Aerial Systems (sUAS) to assist in keeping their cities safe. Small Unmanned Aerial Systems (sUAS) When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety “With 24-hour news cycles, a never-ending stream of social media posts, mid-term elections and potential threats to the public at large, getting fast, accurate situational awareness from the air during an incident has never been more important when it comes to keeping the public safe. We are thrilled to have Chief Hillmann advising on use cases and how best to implement and integrate this new technology,” says Hoverfly SVP of Systems, Lew Pincus. When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety and the safety of those who serve our communities. Aerial/Drone surveillance He adds, “We typically have relied on manned aircraft to provide aerial coverage over a variety of incidents. On occasion, those assets have not always been available, deemed too disruptive or too expensive to deploy in certain situations where an aerial view clearly could have helped an incident commander better understand the situation. Deploying small tether-powered, highly portable, unobtrusive persistent cameras positioned high above the scene can now be used as either a standalone capability or integrated system with existing networks, security infrastructure and even manned aircraft.” Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones Today, Mr. Hillmann is helping chiefs of police, local city and county officials and other public safety personnel understand how Hoverfly’s tether-powered LiveSky systems can be deployed from police or EMS vehicles providing incident commanders with actionable intelligence from high above the scene within minutes of arrival. “Tactically, having the ability to stay in the air monitoring the situation from above for hours, days, even weeks at a time represents an amazing capability we never had before. During my career, I can think of hundreds of situations where having a drone in the air to provide real-time intelligence, surveillance and reconnaissance would have helped keep my officers and the community much safer. It’s a force multiplier that should be exploited by public safety,” says Hillmann. Hoverfly’s LiveSky systems Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones because they operate using a standard 120VAC power source or vehicle inverter. The power, command and control information and video are transmitted over the tether making the entire system completely secure from jamming, hacking or spoofing, ensuring the privacy of the data and improving safety. Perhaps the biggest benefit of Hoverfly systems is they are autonomous and require no piloting skills. The CEO of Hoverfly likes to say, “if you can operate an elevator, you can operate our LiveSky system.”
Round table discussion
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the entire market, and they challenge manufacturers to up their game. We asked this week’s Expert Panel Roundtable to reflect on the industry’s biggest customers: What are the security challenges of the enterprise market?