FLIR Systems, Inc. has announced FLIR TruWITNESS, an industry-first wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organisations to reach a new level of situational awareness. TruWITNESS wearable sensor platform TruWITNESS is designed for any public safety organisation that requires on-scene, real-time mobil...
The International Security Expo (ISE) 2018 will be taking place at Olympia London on 28th and 29th November. Steelway will be exhibiting its Protect range of fabricated steel high-security products. Protection against intrusion attack Steelway recognises the need for high-security products, which provide maximum protection against minor vandalism and aggressive intrusion or terrorist attacks. Their Protect range consists of mild steel physical security products with varying levels of protectio...
Evolv Technology announced Evolv Edge, its people screening system that detects weapons and bombs, has achieved the U.S. Department of Homeland Security (DHS) SAFETY Act Designation. Following a rigorous application and due diligence process by DHS, the Evolv Edge is now a Qualified Anti-Terrorism Technology (QATT). As part of the Homeland Security Act of 2002, Congress enacted the Support Anti-Terrorism by Fostering Effective Technologies Act (SAFETY Act) to provide incentives for the developm...
Video surveillance systems have proven to not only be a deterrent to crime, but are also now being used to collect data points to actually help detect abnormal behaviours which can alert authorities of potentially evolving situations. In either case, recorded video is critical for investigations to provide all but irrefutable evidence to prove or disprove that an incident took place and the identity of the individuals involved. Sounds like a pragmatic approach that’s quite simple in...
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panellists explain. We asked: What new technologies...
Police Crime Prevention Initiatives (PCPI) has become the accreditation body for Business Crime Reduction Partnerships (BCRPs), which seek to reduce crime and anti-social behaviour in towns and cities around the country. Working closely with Police and Local Authorities, BCRPs bring businesses together to make their communities safer and to combat the adverse impact on profitability caused by crime and the fear of crime. BCRPs share intelligence to deter and prevent crimes like shoplifting and...
Alcatel-Lucent Enterprise and BCDVideo, a provider of innovative, purpose-built IP video storage solutions, announces they are working together to address the growing demand of businesses to enhance public security and safety via video surveillance and networking. Advances in video surveillance are helping cities, hospitals, hotels, sporting and entertainment venues focus on improving public safety, deterring crime and helping police solve crimes, and providing first responders with situational awareness during emergencies. These enterprises recognise accessing video surveillance systems, files, analytics and applications requires a stable network with reduced network downtime and increased network reliability. Massive data transfer ALE’s unique offering in the surveillance market delivers built-in, easy provisioning and integration of surveillance equipment for more flexibility The two companies are aligning to offer customers and integrators best in breed technology via a simplified infrastructure and an award-winning surveillance system. Leveraging Shortest Path Bridging (SPB) technology offered on the Alcatel-Lucent OmniSwitch family of products, the joint offer creates a highly available network that exceeds speed and management requirements to support the massive data transfer and file volume of a surveillance system. ALE’s unique offering in the surveillance market delivers built-in, easy provisioning and integration of surveillance equipment for more flexibility, while reducing the cost of implementing and maintaining the network. Video surveillance networks often suffer high latency issues from legacy switching solutions. SPB reduces the latency time to deliver data packets and enables high network availability for maximum use of all physical connections and routed services resulting in greater network stability. Resilient surveillance network ALE and BCDVideo worked closely to ensure each piece of the solution was tested for high availability leveraging SPB technology. Businesses and integrators gain a resilient surveillance network with a simplified infrastructure, which optimises the surveillance system performance and results. ALE switches provide high system resiliency with redundant hot-swappable power supplies and virtual chassis capability. With support for SPB-M, ALE switches offer a scalable network architecture, with fast convergence, resilient and easy to manage IP multicast network for video surveillance. Darren Giacomini, Director of Advanced Systems Architecture at BCDVideo commented, “Improper network configurations are the root of most technical issues with surveillance systems. As technology advances, BCDVideo recognises video content is only as good as the ability for the viewer to attain access to the files over the network.” Highly reliable system Surveillance solutions have changed immensely over the last decade and, in many ways, networking for these solutions has not changed with them" “It has become imperative for various government bodies and business owners to deploy video surveillance systems to effectively monitor and record activities within and around the premises. Aligning our systems to build a best of breed network with a switch vendor like Alcatel-Lucent Enterprise, enables us to jointly deliver a highly reliable system to customers in a range of specialised environments.” Matt Overstreet, Channel Lead at ALE, North America – “Surveillance solutions have changed immensely over the last decade and, in many ways, networking for these solutions has not changed with them. Many businesses are now recognising the need to upgrade their underlying network to achieve the performance needed to utilise their surveillance solution appropriately.” “This new joint offering from ALE and BCDVideo transcends what surveillance networks were capable of in the past by taking our companies’ two most reliable solutions and providing reliability and optimisation that neither can deliver alone. Our OmniSwitch core and edge switches are optimised to move traffic over SPB and provide critical connectivity between servers and network devices.”
When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it will take, while every second feels like hours under pressure. As more time passes, the possible areas where the child can be will widen, it becomes more time-consuming to search manually, and the likelihood of finding the child decreases. What if we can avoid all of that and directly search for that particular girl in less than 1 second? Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streamsWith Artificial Intelligence, we can. Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streams in a fraction of a second, using only one photo of that person. The photo does not even have to be a full frontal, passport-type mugshot; it can be a selfie image of the person at a party, as long as the face is there, the AI can find her and match her face with the hundreds or thousands of faces in the locations of interest. The search result is obtained in nearly real time as she passes by a certain camera. Distinguishing humans from animals and statues The AI system continuously analyses video streams from the surveillance cameras in its network, distinguishes human faces from non-human objects such as statues and animals, and much like a human brain, stores information about those faces in its memory, a mental image of the facial features so to speak. When we, the system user, upload an image of the person of interest to the AI system, the AI detects the face(s) in that image along with their particular features, search its memory for similar faces, and shows us where and when the person has appeared. We are in control of selecting the time period (up to days) and place (cameras) to search, and we can adjust the similarity level, i.e., how much a face matches the uploaded photo, to expand or fine-tune the search result according to our need. Furthermore, because the camera names and time stamps are available, the system can be linked with maps to track and predict the path of the person of interest. AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight Protecting people’s privacy with AI Face Search All features of face recognition can be enabled by the system user, such as to notify staff members when a person of interest is approaching the store AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight. First, with AI Face Search, no names, ID, personal information, or lists of any type are required to be saved in the system. The uploaded image can be erased from the system after use, there is no face database, and all faces in the camera live view can be blurred out post-processing to guarantee GDPR compliance. Second, the lack of a required face database, a live view with frames drawn around the detected faces and constant face matching in the background also significantly reduces the amount of computing resource to process the video stream, hence the lightweight. Face Search versus Face Recognition AI Face Search Face Recognition Quick search for a particular person in video footage Identify everyone in video footage Match detected face(s) in video stream to target face(s) in an uploaded image Match detected face(s) in video stream to a database Do not store faces and names in a database Must have a database with ID info Automatically protect privacy for GDPR compliance in public places May require additional paperwork to comply with privacy regulations Lightweight solution Complex solution for large-scale deployment Main use: locate persons of interest in a large area Main use: identify a person who passes through a checkpoint Of course, all features of face recognition can be enabled by the system user if necessary, such as to notify staff members when a person of interest is approaching the store, but the flexibility to not have such features and to use the search tool as a simple Google-like device particularly for people and images is the advantage of AI Face Search.Because Face Search is not based on face recognition, no faces and name identifications are stored Advantages of AI Face Search Artificial Intelligence has advanced so far in the past few years that its facial understanding capability is equivalent to that of a human. The AI will recognise the person of interest whether he has glasses, wears a hat, is drinking water, or is at an angle away from the camera. In summary, the advantages of Face Search: High efficiency: a target person can be located within a few seconds, which enables fast response time. High performance: high accuracy in a large database and stable performance, much like Google search for text-based queries. Easy setup and usage: AI appliance with the built-in face search engine can be customised to integrate to any existing NVR/VMS/camera system or as a standalone unit depending on the customer’s needs. The simple-to-use interface requires minimal training and no special programming skills. High-cost saving: the time saving and ease of use translate to orders of magnitude less manual effort than traditionally required, which means money saving. Scalability: AI can scale much faster and at a wider scope than human effort. AI performance simply relies on computing resource, and each Face Search appliance typically comes with the optimal hardware for any system size depending on the customer need, which can go up to thousands of cameras. Privacy: AI Face Search is not face recognition. For face recognition, there are privacy laws that limits the usage. Because Face Search is not based on face recognition, no faces and name identifications are stored, so Face Search can be used in many public environments to identify faces against past and real-time video recordings. AI Face Search match detected face(s) in video stream to target face(s) in an uploaded image Common use cases of AI Face Search In addition to the scenario of missing child in a shopping mall, other common use cases for the AI Face Search technology include: Retail management: Search, detect and locate VIP guests in hotels, shopping centres, resorts, etc. to promptly attend to their needs, track their behaviour pattern, and predict locations that they tend to visit. Crime suspect: Quickly search for and prove/disprove the presence of suspects (thief, robber, terrorist, etc.) in an incident at certain locations and time. School campus protection: With the recent increase in number of mass shootings in school campuses, there is a need to identify, locate and stop a weapon carrier on campus as soon as possible before he can start shooting. Face Search will enable the authorities to locate the suspect and trace his movements within seconds using multiple camera feeds from different areas on campus. Only one clear image of the suspect’s face is sufficient. In the race of technology development in response to business needs and security concerns, AI Face Search is a simple, lightweight solution for airports, shopping centres, schools, resorts, etc. to increase our efficiency, minimise manual effort in searching for people when incidents occur on site, and actively prevent potential incidents from occurring. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organisations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritise Safe school environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organisations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organisations recognise their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilise, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack of consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings.A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right protection equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive security plan Quantifying and mitigating risk are the jobs of security professionals and school administrators A risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay adversarial behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorised visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security (Figure 1) . It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety and security components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
Send For Help Ltd., one of the largest lone worker protection firms in the world, which provides 24/7 emergency response via personal safety alarms, has been featured in the 'FT Future 100 UK' list, recently published in the Financial Times and FT.com. The prestigious list selected by an expert panel led by FT journalists, features fast growing UK companies that are also making an impact on their industry, or wider society. FT 1000: Europe’s Fastest Growing Companies list The list is built on data from the ‘FT 1000: Europe’s Fastest Growing Companies’, in which Send For Help featured in April this year, ranked at 625th. Send For Help was selected for the Disruption category To make it into the first edition of the FT Future 100 UK, businesses had to excel in one of four categories; Environmental Social & Governance, Disruption, Diversity and Consistent Growth. Send For Help was selected for the Disruption category, where the judges took into account measures such as research and development spending as a proportion of revenue, and the company’s own pitch as a disrupter. Fob-sized GPS personal safety alarms Operating through its subsidiary brands Skyguard, Peoplesafe and Guardian24, Send For Help supplies key fob-sized GPS personal safety alarms and smartphone apps providing 24/7 protection to over 150,000 lone workers. Send For Help’s monitoring centre has direct links to police control rooms, so it can bypass the 999 system and receive a faster emergency response if clients are threatened, attacked or are in danger. Lone worker protection The Surrey-based tech firm has a varied client roster across a large number of private and public sectorsThe Surrey-based tech firm has a varied client roster across a large number of private and public sectors, including over 180 NHS trusts and major high street retailers, City banks and national pub chains, estate agents, the police and more than 200 local authorities. Inclusion in the list marks the latest of a series of awards that the company has won in the last 12 months. In April, the business featured in the FT1000 list of Europe’s fastest growing companies, whilst in May the company was listed in the London Stock Exchange Group’s ‘1000 Companies to Inspire Britain’ report. This month, the company also featured in BDO’s Best in Business ‘Ones to Watch’ league table of the top performing businesses in the South East. These accolades follow the company’s inclusion in The Sunday Times ‘Fast Track 100’ list for the second year running. "It’s very encouraging that Send For Help continues to receive national and international awards from such prestigious publications. Our strategy as a disruptive company which delivers innovative services at competitive prices is clearly working and the whole team should be proud of what we’ve achieved," said James Murray, CEO of Send For Help.
Axis Communications, the pioneer in network video technology, has been awarded full membership of SBD, part of the Police Crime Prevention Initiatives’ (PCPI) group of crime prevention organisations, which operate in support of the Police Service throughout the UK. Membership was awarded after 15 of Axis’ network video products were accredited for achieving SBD’s Police Preferred Specification (PPS) standards for security. The PPS accreditations include a variety of devices from AXIS Companion, a complete solution that brings the reliability of professional video surveillance to small business owners. This gives SMEs the confidence and reassurance they need to invest in cost-effective networked video technology, and reap the security and business benefits that connected devices offer. Reducing the risk of crime SBD requires products to be rigorously tested or certified independently before it is prepared to consider them for its coveted PPS accreditationThe PCPI SBD was established in 1989 and works with police forces and industry suppliers to create high standards of crime prevention equipment, with the ultimate aim of reducing both the risk and fear of crime. SBD requires products to be rigorously tested or certified independently before it is prepared to consider them for its coveted PPS accreditation. “Axis is driven by a vision to constantly innovate for a smarter and safer world. Having SBD accreditation provides customers who are procuring security equipment and video surveillance technology with that extra level of knowledge that Axis products are proven and trusted,” says Atul Rajput, Regional Director Northern Europe at Axis Communications. “We have worked hard to ensure that all of our products deliver to the highest standards, for both enterprise and small business.” Importance of network video Network video is essential for crime prevention and prosecution, and can help communities feel safer and more secure. It therefore has a major role to play in the development of smart city technology. Image data from shopping centres, transport networks and city surveillance is not only used to fight crime, but also to provide intelligence around the movement of people and goods throughout an area. In addition, while a large part of SBD accreditation focusses on ensuring devices are safe from physical attack, it is equally important that the cybersecurity of new technology is given the same priority. Once IP video is securely installed on the network it can be combined with other data sources to deliver real insights for smarter living" “Axis has worked hard to ensure it has a safe and secure platform for network video. Axis engineers pride themselves on designs that make device management and issuing firmware updates simple, but fully protected against malicious hackers and online criminals. Once IP video is securely installed on the network it can be combined with other data sources to deliver real insights for smarter living,” Rajput says. Meeting the standards for SBD accreditation “We welcome Axis as a full member to what is a select group of companies that have demonstrated the necessary criteria to meet our strict standards for SBD accreditation,” says Guy Ferguson, Chief Executive Officer, Secured by Design. “The role of network video surveillance is increasingly vital for communities across the UK and it is important that vendors such as Axis are proving that this technology can be built and deployed in a responsible and reliable way.” Axis products that have achieved the PPS accreditation include devices from the AXIS Companion range of indoor and outdoor cameras, as well as thermal and radar imaging equipment, and the Axis Network Horn Speaker. This gives Axis’ partners the ability to provide businesses of all sizes and needs with full solutions and externally certified equipment.
Aqua Security, the premier platform provider for securing container-based and cloud-native applications, announced version 3.2 of its cloud-native security platform, featuring deep runtime protection capabilities and extended security and compliance controls across the cloud-native stack. Runtime protection against “Zero Days” Sophisticated attacks often exploit unknown vulnerabilities in the application or operating system, also known as “zero days”, to either escalate privileges, run arbitrary code, or exfiltrate data. Doing this at the OS level requires the use of system calls (syscalls), core functions that applications use to request the OS perform anything from opening files, creating network connections, to rebooting the system. To reduce this risk, the Linux community has created seccomp profiles, a utility that allows developers to disable unneeded syscalls The large number (more than 330) of available syscalls present a significant attack surface that can lead to OS-level kernel exploits, even though for any given application, only a small subset of syscalls is actually being used. To reduce this risk, the Linux community has created seccomp profiles, a utility that allows developers to disable unneeded syscalls and apply those profiles per application. Docker, for example, has disabled 50 syscalls in its default seccomp profile for running Docker containers. Aqua Container Security Platform However, this still leaves more than 250 syscalls enabled, most of which would not be necessary for a specific application, and best practices are for developers to disable them. The challenge is that creating custom profiles for an application is difficult because it requires a deep low-level understanding of how the application uses syscalls – which is why most organisations often rely on the weak default. The release of Aqua Container Security Platform makes custom syscall filtering possible by dynamically analysing a running container’s syscall use, white-listing those being used, and creating a custom seccomp profile to prevent the use of all other syscalls. Since a typical container only uses between 40-70 syscalls, this results in a dramatic reduction in the number of available syscalls for a given service, reducing the attack surface by as much as 90%. Any attempt by an attacker to use a non-whitelisted syscall will be blocked by Aqua and generate an alert. Securing cloud-native deployments Aqua is committed to making cloud-native applications more secure while minimising any disruption to business continuity" “Aqua is committed to making cloud-native applications more secure while minimising any disruption to business continuity,” says Amir Jerbi, CTO and co-founder of Aqua Security. “Dynamically profiling system calls is the kind of modern application security we can enable with containers that was difficult to do well with monolithic applications, providing a fully automated and accurate method of blocking malicious activity and preventing exploits.” Modes of cloud-native app deployment are constantly expanding to cater for varying needs. Today, in addition to running containers on VMs, organisations can deploy “serverless” code, whether as on-demand containers using services such as AWS Fargate or Azure Container Instances, or as serverless functions. New capabilities for full-stack security Aqua 3.2 adds new capabilities for full-stack security across this spectrum, extending Aqua’s MicroEnforcer technology released earlier this year: AWS Lambda function scanning: Aqua’s extensive vulnerability, hard-coded secrets and malware scanning is now available for scanning AWS Lambda functions. CRI-O and containerd support: Aqua’s runtime protection controls are now available in environments using the CRI-O and containerd container engines. “Thin OS” protections: Aqua Monitors hosts that run containers for successful and failed login attempts and provides discovery and scanning for container images stored on the host. Additional compliance and platform features Aqua 3.2 also introduces numerous new features based on customer requirements: Aqua’s Container Firewall now allows the use of rules based on domain names, in addition to container/cluster IP addresses, making it easier to create application network rules. New out of the box compliance templates for runtime protection, applying best practices for meeting NIST, PCI, HIPAA, and GDPR requirements. Integration with the Azure Container Registry quarantine feature, preventing vulnerable images from being pulled from the registry. Enhanced SAML support, allowing Federated Single Sign-On from Microsoft ADFS, Okta, and Google Apps, among others.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras with built-in video analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control centre in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfils the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
The North East Ambulance Service (NEAS) is the first Ambulance Service to trial body worn video cameras in a scheme that launches this week. Approximately 40 of the Trust’s frontline staff will be trying out the use of body cameras in a bid to offer them greater support against the rise of incidents of violence and aggression. Alan Gallagher, Head of Risk, said: “The health, safety and welfare of our staff are of utmost importance. We want to take every precaution possible to ensure that our employees are safe whilst at work.” NEAS staff adorn body worn cameras “Our staff are reporting more incidents of this nature and we are working closely with the police and other partners to respond to those perpetrators with warning letters and, where necessary, criminal action. From previous reports, we know that most of these circumstances happen away from CCTV covered areas so using body worn video cameras will mean that our staff can record evidence of abuse or assaults when they happen, such as when they are in a residential property attending to a patient." We will continue to work on measures to reduce assaults and liaise with police colleagues" "This move is designed to help us bring more prosecutions against people who put our staff at risk and reduce the assaults and abuse they are currently facing in the line of their work. There really is nothing more disheartening than being hurt by someone that you’ve gone to help, particularly when they already work in such challenging circumstances.” Fighting crime “We will continue to work on measures to reduce assaults and liaise with police colleagues to ensure action is taken following any criminal acts against staff or the Trust. We encourage all valuable NHS colleagues not to tolerate such behaviour.” The number of reported physical assaults on NEAS staff has increased by 23% compared to last year. The numbers of addresses across the North East flagged for the potential caution or violence has also increased. This sits against a backdrop of more than 350 prosecutions that have been brought for attacks on ambulance staff over the last year nationally. The scale of the problem is believed to be much greater. Emergency workers’ safety This follows a new law that was recently introduced, the Assaults on Emergency Workers (Offences) Bill, in which individuals who assault, or attack emergency workers will face longer jail terms if found guilty. The Bill was designed to recognise the debt of gratitude the public feels towards emergency services, and for the courage, commitment and dedication they show every day in carrying out their duties. Footage will be admissible as evidence in the court of law utilising Edesix VideoManager software platform Mr. Gallagher continued, “We welcome anything that will help to deter people from abusing or assaulting our staff and we hope that by reporting incidents and providing credible evidence where we can, courts might be able to be much tougher when sentencing those found guilty of assaulting and threatening our staff, prosecuting those people to the full extent of the law.” Edesix VideoManager software Footage obtained in the event of an assault or abuse will be admissible as evidence in the court of law utilising the features available in the Edesix VideoManager software platform. It will only be used for the purposes of providing evidence to the Police in any enquiry intended for the health, safety and protection of staff. The tamper proof cameras, software and support for the three-month trial have been provided free by Edesix. Richie McBride, Chief Executive Officer of Edesix commented, "We're pleased to provide the North East Ambulance Service with our cameras to enhance the protection of staff and to deter any aggressive behaviour towards NEAS workers."
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting and deterring power thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch video security and intrusion detection systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP cameras with built-in video analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
Lodge Security is to provide protection for Poundland stores and distribution centres throughout the UK. Over the past two years Lodge Security has been operating its Elite Store Detective programme from the LodgIC Intelligence Centre, where national and local data on crime incidents is analysed and used to deploy protection to produce the maximum return on security investment. Sarah Frain, Profit Protection & Assurance manager, Distribution and CSC at Poundland, says: "Lodge Security has worked with Poundland for more than 5 years and has provided a great service which has now developed with technology additions to achieve an even more effective solution. The operatives we receive from Lodge are always highly trained and professional when dealing with day-to-day issues and figures are reported back clearly to management. Furthermore, they provide confidence to our staff whilst making them feel safe and secure in the workplace.” Analysing the patterns of criminal activity Poundland and Lodge are now examining new opportunities to deploy other technology that is available from the intelligence centre. This includes the capability to analyse retail transactions through the use of Transpeye for data mining of EPoS, online transactions and other store systems, to then identify any sources of loss in real time and the relationships between apparently isolated incidents. Lodge can analyse and track any patterns of criminal activity to enable the investigative team to attribute recurring losses to known criminals and gangs Lodge can then analyse and track any patterns of criminal activity, to enable the investigative team to attribute recurring losses to known criminals and gangs, who can be identified from in-store CCTV recordings. Perpetrators are then stopped in-store by Lodge Security detectives. Preventing organised retail crime In many instances Lodge has been able to track a gang’s activity around the UK and assess the probability of where and when they might strike next. “Retailers are increasingly alert to the scale of the threat from Organised Retail Crime. A string of small, seemingly unrelated criminal acts are often committed by the same gang; if they think they can get away undetected each time they will keep coming back. “Through the blended use of our specialist teams in the field and technology, our intelligence centre is quickly able to map related losses and then stop them fast,” says Stuart Lodge, CEO of Lodge Service International, a third generation family-run business that celebrates its 100th anniversary in 2019.
Located roughly 30 miles southwest of Los Angeles, Torrance Unified School District hosts roughly 24,000 students from kindergarten through high school. Torrance USD has 34 school sites encompassing elementary schools, middle schools and high schools. They’re joined by three preschool, continuation and community day schools. Violent crime and other offenses are an inescapable reality for US schools and their students. During the 2013–14 school year, 65 percent of public schools [Source: U.S. Department of Education] recorded one or more violent incidents occurring, representing an estimated total of 757,000 incidents. This figure translates to a rate of approximately 15 crimes per 1,000 students enrolled in 2013–14. Outstanding service “Visibility of what happens on campus gives us the upper hand with all forms of crime that may be committed. School safety is our number one concern and being able to see what’s happening and identify those involved is paramount. Sony cameras definitely give us that advantage. Their reliability, imaging quality and technology – combined with outstanding service – made Sony the best choice for us.” Gil Mara, Chief Ed Tech and Information Services Officer, Torrance Unified School District While Torrance consistently ranks among the safest cities in Los Angeles County, its schools face the same challenges as other academic institutions. In common with all school systems, TUSD has an obligation to maintain the safety, security and wellbeing of students as well as staff and campus visitors. Alongside violent assault, other key concerns include theft, break-ins, vandalism and graffiti – together with the need to maintain a visible deterrent against criminal activity. Sub-standard image quality Torrance Unified School District had relied on some ad-hoc installations at a few schools that were both poorly planned and had no consistent standards To date, Torrance Unified School District had relied on some ad-hoc installations at a few schools that were both poorly planned and had no consistent standards in place. The cameras poor positioning and sub-standard image quality – particularly in low light conditions – meant that perpetrators were frequently not identified successfully. This severely limited schools’ ability to resolve incidents and serve as an effective deterrent against further incidents. In addition to physical attacks and theft, schools in the district routinely reported instances of vandalism to the cameras themselves. As a further challenge, the heat and dust of the Southern Californian climate placed even more strenuous demands on the reliable performance of Torrance Unified School District’s existing analogue cameras. Security camera strategy To benefit from significantly improved round the clock image quality – as well as greater reliability and reduced ownership costs – Torrance Unified School District elected to re-think its security camera strategy. In total, the district has installed roughly 1,100 Sony video security cameras across 34 school sites. All cameras have been supplied and installed by integrator NIC, together with a networked video management solution provided by OpenEye. The majority of cameras are Sony SNC-EM632RC and SNC-VB632D ruggedised minidome model and bullet cameras, offering superb Full HD image quality in all weather and lighting conditions. “Torrance police have access to our security camera system and it affords them visibility on our campuses, as was the case just recently where a vehicle burglary suspect was identified and apprehended thanks to our Sony Video Security system.” Will Boxley – Network Analyst, EDU Tech and Information Services. Measurable effect on student safety Reliable cameras are deployed extensively around all outdoor areas of each school campus, including social and sports areas as well as parking lots The cameras’ highly sensitive Exmor CMOS image sensor and powerful IPELA ENGINE EX processing engine can even cope with harshly backlit conditions, where extremes of light and shade in the same scene often pose problems for other cameras. As an additional benefit, built-in IR (infrared) illumination gives a clear picture of people and suspicious incidents in conditions of total darkness. The rugged, reliable cameras are deployed extensively around all outdoor areas of each school campus, including social and sports areas as well as parking lots. Since initial installation in 2015, the Sony cameras have performed flawlessly, with no operational issues reported by IT and security staff. The cameras’ installation has had an immediate and measurable effect on student safety. Suspensions due to violence and assaults have been reduced considerably, while the incidence of weapons on campus has been reduced by more than 40%. What’s more, the cameras’ presence serves to reassure students and staff, while acting as a powerful deterrent against criminal activity.
Hytera, a global provider of innovative Professional Mobile Radio (PMR) communications solutions, announces that it has signed contracts with Secretariat of Public Security of the State of Alagoas, Brazil to provide TETRA communications infrastructure as the expansion of the statewide mission critical communications network and four-year maintenance service. The total contracts value is around 6.5 million US dollars with the infrastructure contract around 1.3 million and the service contract around 5.2 million. “We are excited being chosen as the equipment and service provider of Alagoas’s statewide TETRA system. The state authority shows confidence in Hytera’s ability to deliver advanced and reliable public safety communications networks. For the expansion, we presented the latest development of TETRA technologies,” said John Zhou, the General Manager of Hytera Brazil. “The new contracts as a milestone for Hytera Brazil recognise us not only as a leading TETRA solution provider, but also a trusted service provider, and it is the embodiment of Hytera transformation globally.” In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas TETRA communications network In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas, who were modernising its communications systems to better serve the communities and prepare for the global soccer fiesta, the World Cup 2014. The newly signed equipment contract includes 31 sites with Hytera’s latest TETRA innovation, DIB R5 base station. It adopts a maintenance-free, space-saving design and can be installed on walls, antenna masts or in tunnels. Thanks to its low power consumption and passive cooling, it is ideal for use in areas where power supply is critical or where there is a need for battery-based, portable base station solutions. With the expansion of the TETRA network, different public safety forces such as police, firefighters and emergency response in the State of Alagoas will share the network to facilitate optimal cooperation when the situation requires, which is another big step forward by the local authorities to improve the security of the state.