Graylog, a global provider of next-generation log management and SIEM solutions, is announcing Graylog Security, Thursday, October 21st, at their annual user conference, Graylog GO. Designed to overcome legacy Security Information & Event Management (SIEM) challenges, Graylog’s scalable, flexible cybersecurity platform makes security analysts’ jobs easier and faster.
With SIEM, Anomaly Detection, and User Entity Behavior Analytics (UEBA) capabilities, Graylog’s security solution will provide security teams with even greater confidence, productivity, and expertise to mitigate risks caused by Insider Threats, credential-based attacks, and other cyber threats.
Log management solutions
“Too often, security analysts struggle with SIEM and log management solutions that are complex, slow, noisy, rigid, unscalable, and expensive,” said Andy Grolnick, CEO of Graylog. “Graylog Security overcomes these long-time challenges and provides the right path for security success.”
Graylog Security provides a superior user experience that adapts to customer environments
This is backed up by research showing that many systems continue to go unmonitored and, on average, 37% of security alerts go uninvestigated due to security analysts being overwhelmed. (Voice of the Enterprise: Information Security, Vendor Evaluations Advisory Report, published by 451 Research, October 8, 2021). For security professionals who need technology to make their jobs easier, not more complex, Graylog Security provides a superior user experience that adapts to customer environments and grows as the business grows.
Most critical alerts
Graylog Security provides:
90%+ reduction in false-positive security alerts through UEBA/anomaly detection
Over 50 pre-built security scenarios based on MITRE ATT&CK and intelligence community standards plus real-life adversarial examples
Implementation times with a machine learning engine that self-trains with only 7 days of historical data and improves over time without manual tuning
User-friendly investigation capabilities paired with Graylog’s lightning-fast search engine to get to the root cause and eliminate security risks in minutes or hours, not weeks or months
Risk models that identify metrics dynamically, adapting to an organisation and its priorities to ensure the most critical alerts are addressed first
Integration with Security Orchestration, Automation, and Response (SOAR) platforms
Helping security professionals
With its ease of use, speed, and proactive security that scales up and down, and built-in expertise that eliminates the need and cost of hiring a Ph.D. Data Scientist, Graylog Security is the ideal solution for those new to SIEM or those frustrated by their current SIEM offerings.
Graylog Security can be purchased directly through Graylog or through the Graylog Partner Network, which is ready to help security professionals worldwide tailor their experience to get the most out of Graylog.
Ava Security, a unified service provider of cyber and video security, announces it has selected Raleigh, North Carolina as the location for the company’s new Americas headquarters. Ava will be investing in the region, creating new jobs, and adding to Raleigh’s rich tradition of innovation. Raleigh joins Uxbridge (London) as the company’s two global headquarters.
The new Raleigh headquarters is located at 208 South Wilmington Street, Suite 200, Raleigh, NC 27601. “The Americas is Ava’s fastest-growing geography, representing more than 50% of our global business,” said Rick Hill, VP and General Manager, Ava Americas.
Spanning cloud computing
“We chose Raleigh for our new headquarters because it will allow us to attract world-class talent that will help us continue to innovate the way organisations approach security - both physical and cyber - for years to come.”
Raleigh was recently named one of the most resilient tech hubs by both LinkedIn and Indeed
Raleigh boasts one of the highest concentrations of tech talent in the nation -- spanning cloud computing, security, fintech, and healthcare. Long associated with innovation thanks to both corporate tech giants like IBM and Cisco and a rapidly growing local startup community, Raleigh was recently named one of the most resilient tech hubs by both LinkedIn and Indeed. “Raleigh is at an exciting crossroads, leading the country on nearly every measure of economic success,” said Adrienne Cole, CEO, Raleigh Chamber of Commerce.
Expanding career options
“We are honoured that Ava Security selected Raleigh for its Americas headquarters. The company joins an elite mix of global technology leaders here in the region while expanding career options for our local tech talent pool.”
In a 2021 study by Wake County Economic Development (WCED), comparing the Raleigh Metropolitan Statistical Area (MSA) with the top 100 largest MSAs across the United States, Raleigh came out No. 1 in several critical areas, which shaped Ava’s decision to select the Triangle region for its Americas headquarters. Specifically, in comparison to the 100 largest MSAs, Raleigh ranked number one in talent, the cost of doing business, and future thinking. “We are thrilled to have Ava Security as a new tenant in downtown Raleigh, especially since this will be their Americas headquarters,” said Andrew Stewart, President of Empire Properties.
Unified security company
Ava is the only unified security company to provide a complete solution (cyber and physical security)
“It is always exciting to bring new technology innovation into the region and Ava does that with its unique cyber and video security solutions. They are a welcome addition to the diverse workforce in downtown Raleigh.”
Ava is the only unified security company to provide a complete solution (cyber and physical security), giving organisations full visibility into potential multi-faceted security attacks. Ava helps organisations address this growing problem with machine learning-powered cyber and video solutions that give security professionals access to quality, timely data and insights that can be shared across the security organisation for actionable insight.
Diverse industry offering
“The world has clearly caught on to the fact that Raleigh is one of the most educated cities in the U.S. and has an incredibly diverse industry offering, allowing companies from across the globe like Ava, to locate here and find long-term success,” said Kyle Touchstone, Raleigh Economic Development Director.
Over the past year, Greater Raleigh saw its highest amount of company expansions in history, with almost 6,000 new job announcements and more than $3.8 billion in investments. Ava officially celebrates its Americas Headquarters with a ribbon-cutting ceremony scheduled for October 21 at 3:00 p.m.
To mark European Cybersecurity Month 2021, 2N, the global pioneer in IP access control systems, has strengthened its guidance to help consumers and building managers prevent cyber-attacks. The move is a response to evidence that the threat of cyber-crime is increasing, and that access control remains a common area of vulnerability.
Increased spending on cybersecurity
Earlier this year, Hiscox published its Cyber Readiness Report 2021. It was based on a survey of more than 6,000 companies based in the US, the UK, Spain, the Netherlands, Germany, France, Belgium, and Ireland.
The report confirmed that spending per business on cyber security has more than doubled in the last two years as a direct response to growing threat levels. Almost half of the respondents said that they felt their organisation had become more vulnerable to cyber-attacks since the start of the pandemic, rising to 59% among businesses with more than 250 employees.
28% of the businesses surveyed who had suffered attacks were targeted on more than five occasions last year. One in six of the companies that had been victims of cyber-crime said that a cyber-event threatened the viability of their business.
Identity and access management
2N has strengthened its guidance to help consumers and building managers prevent cyber-attacks
Hiscox went on to assess firms’ maturity across six different areas which comprise the elements required to install, run, manage and govern an effective security system. One of those six areas was ‘Identity and access management’, and, across all the companies surveyed, it came to the second bottom of the list.
In response to these findings, 2N has strengthened its guidance to help consumers and building managers prevent cyber-attacks which were first published during European Cybersecurity Month 2020.
Two new pieces of advice have been added:
Pursue compliance with a proven security control framework. Two of the most respected are ISO 27001 and SOC 2. These guide companies in creating secure systems and processes.
Make sure the access control system includes the use of encryption and multi-step authentication. This protects communication between devices, controllers, and mobile devices, and ensures no back doors for ‘maintenance purposes’.
Strengthening cybersecurity and access control
Tomáš Vystavěl, 2N's Chief Product Officer, said, “We felt that it was necessary to strengthen our cybersecurity guidance partly because the threat is increasing, but also because many companies are still playing ‘catch up’ when it comes to cybersecurity in access control.”
“This matters because if the access control system is compromised, the daily operation of the building – and, consequently, its residents – is immediately at risk. Attitudes are changing, but they need to change even faster.”
Eagle Eye Networks, the globally renowned company in cloud video surveillance solutions, has announced enhancements to the Eagle Eye Cloud Video Management System (Eagle Eye Cloud VMS), providing three Editions - Enterprise, Professional and Standard.
Customers can choose the Edition that best meets their needs, based on factors such as, number of locations, number of users, system complexity and regulatory requirements.
Eagle Eye cyber-secure cloud solutions
Eagle Eye Networks’ growing customer base includes organisations of all sizes and types
Eagle Eye Networks’ growing customer base includes organisations of all sizes and types that choose Eagle Eye cyber-secure cloud solutions, with Artificial Intelligence (AI) and analytics, for security and operational optimisation. Larger organisations have more complex needs, while smaller businesses appreciate simplicity. The Editions deliver on both of these needs.
“Our new Eagle Eye Cloud VMS Editions will propel customer and reseller success, by delivering the right solution for each customer, while ensuring customers have the flexibility to scale,” said Dean Drako, Founder and Chief Executive Officer (CEO) of Eagle Eye Networks.
Eagle Eye Cloud VMS Editions
An overview of Eagle Eye Editions - Standard, Professional and Enterprise:
Standard Edition - Designed for small businesses and franchisees, with a modest number of locations, the basic Standard Edition is for businesses that value recorded and live video access, using a browser or mobile device.
Professional Edition - Designed for mid-sized (10 to 25+ locations) and rapidly growing security operations, the Professional Edition includes features to better manage large quantities of locations, users, and cameras.
Enterprise Edition - Ideal for large, distributed and multi-national businesses, the Enterprise Edition supports an unlimited number of users, providing a sophisticated permissions solution, for access and video sharing. This Edition is ideal for customers, who require flexible user identity and access management, advanced operational reporting, and the capability to meet audit, process, and regulatory requirements.
All Eagle Eye Editions include the core functionality of Eagle Eye Networks renowned VMS, which:
Gives customers the flexibility to adjust the portion of video stored in the Cloud and portion stored on-premises, ranging from 0 to 100 percent, using Eagle Eye Cloud-Premises Flex Storage.
Ensures data protection and durability, with triple-redundant storage.
Supports camera resolutions of up to 20 MP per camera and up to 10 years of retention of video.
Provides unlimited integrations, with systems, such as point of sale and access control, using Eagle Eye Video API Platform.
Supports the full spectrum of camera analytics and artificial intelligence (AI), cloud analytics and AI, and all the functions that customers might need to make their system fully functional and to deliver great operating results.
Leverages existing infrastructure, by working with thousands of digital and analogue cameras, from all the major manufacturers.
Recent cyber-attacks have disabled and even shut down physical assets. Robust foundational security and training staff, able to recognise an attack can help mitigate the threat, as ABB’s Rob Putman explains.
Edge devices and data analytics
As cyber security specialists, we must navigate an ever-changing threat landscape, one that is made even more complex by the increased interconnectivity between Operational Technology (OT) and Information Technology (IT), as companies look to leverage edge devices and data analytics, as well as remote connectivity, in the wake of the COVID-19 pandemic.
As the threat surface evolves, the industry must guard against attacks on key physical infrastructure, carried out by a range of malicious actors, including nation states and criminals intent on blackmail.
The chemicals sector, a high-value target for cyber-criminals
Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost
In 2017, not long after a ransomware attack that targeted Maersk, the world’s largest shipping firm, made the news around the world. Another cyber-attack, this time targeting physical industrial assets, generated fewer headlines, and yet could have resulted in both real, as well as financial, damage.
Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost, both financial and reputational, to the operator, should production be interrupted or stopped entirely.
Cyber security vulnerabilities put physical assets at risk
The attack in question, a ‘Triton’ custom malware attack on a petro-chemical facility in Saudi Arabia, targeted a safety system, taking over system controllers. Bugs in the code triggered an emergency shutdown, but could have led to the release of toxic and explosive gases. It was a vivid reminder of how cyber security vulnerabilities are increasingly putting companies’ key physical assets at risk.
Two more-recent high-profile incidents illustrate my point. In February, a Florida water treatment plant was hacked. The malicious actor remotely accessed the system for three to five minutes, during which time they opened various functions on the screen, including one that controls the amount of sodium hydroxide (NaOH) in the water. The hacker changed the NaOH from about 100 parts per million to 11,100 parts per million, which could have resulted in a mass poisoning event.
Colonial Pipeline cyber-attack incident
Then, in May, the Colonial Pipeline system that originates in Houston, Texas and carries gasoline, and jet fuel, suffered a ransomware attack. Using a VPN, hackers targeted back-office IT systems, forcing Colonial to shut down IT hosts and network infrastructure, severing communication with those OT systems that are responsible for communicating ‘transactional data’ associated with fuel delivery.
In this instance, a single compromised password disrupted Colonial’s ability to invoice its customers. This dependency on OT data stopped pipeline and business operations, and the company was elected to pay the hackers an initial ransom of US$ 4.4 million, in order to restore operations. The Colonial attack was multi-dimensional, in that it not only impacted Colonial’s business, but also the wider US economy and national security, since the pipeline transports nearly half of the east coast's fuel supplies.
Outdated IT system elevates physical risk
The increased interconnectivity between IT and OT can also create vulnerabilit
Attacks such as these prove that, armed with little more than a laptop, an email account and access to the dark web, determined hackers can cause disproportionate damage to physical infrastructure.
As mentioned at the outset, the increased interconnectivity between IT and OT can also create vulnerability. Producers often want to know: Is it risky to connect a production asset or their operational environment to the Cloud? My answer is, if you do so without having done any risk audits around people, processes and technology, or without enhancing and maintaining that environment, then yes, that is risky.
For example, we often observe that the life cycle of a production asset far outlasts the IT systems that are used to run it. Take a cement kiln. Several generations of plant operators may have come and gone, but that asset may still run, using legacy software, such as Windows XP and why not?
Need to replace aging distributed control systems
Well, that’s fine, if you are not concerned about having that asset compromised, and all that entails. A ‘flat’ IT network, an aging distributed control system, and machines with legacy versions of Microsoft Windows, all these elements, which are still commonplace in many industries, make it much easier for attackers to find and infiltrate a company, without needing sophisticated tools.
The age-old mantra of not interfering with a piece of equipment or software that appears to be working, often applies to the individual assets. For example that cement kiln that are still controlled by the same Windows XP-based control software.
However, if we’re honest, things have changed quite a bit, not because something was broken, but because innovation came in. That same kiln control system is most likely connected to other systems, than when first commissioned and that opens it to exposure to threats that it was never designed for.
The human element
There is a misconception that IoT-connected devices can open companies to risk
There is a misconception that IoT-connected devices can open companies to risk, but many recent, high-profile cyber-attacks have been conducted from a laptop, by hacking someone’s VPN, or are a simple phishing/malware attack. In all these cases, the human element is partly to blame.
Take the Florida attack. The compromised computer at the water treatment facility was reportedly running an outdated Windows 7 operating system and staff all used the same password, in order to gain remote access via the Teamviewer app, which the hacker was then able to use.
Physical and human assets, key to robust cyber security
Discussion on the best way to mitigate the threat is often framed solely around specific technical solutions and ignores the fact that robust foundational cyber security is really driven by two very different, but equally important, types of capital: physical assets (e.g. production machinery), and human assets.
The truth is that smart digital software and industry-renowned cyber security applications, while critical, are in many cases, only as good as the weakest human link in the chain. Industry would, therefore, do well to ask itself the following question: Do we have a security problem, or a complacency problem?
At this juncture, it is important to point out that the majority of companies that ABB works with, are at least aware of the threat posed by cyber attackers, and the potential impact of an attack, on their revenues, reputation and bottom line.
User error and human-generated exposures
Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital
However, user error and human-generated exposures are where most of these attacks occur. Those human failures are mostly not due to malicious intent from employees, but to the lack of training of the employees on secure behavior.
Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital. However, there are also age demographics at play here. Much of the operations employee base is heading towards retirement and often, there is no plan or ability to backfill these people.
Need to invest in new digital and automated technologies
If you think you don't have enough people now, in order to stay on top of basic care and feeding of the OT environment, with regards to security, what is that going to be like in 20 years?
For this reason, there must be a major industry reset, when it comes to its workforce. Companies must invest in new digital and automated technologies, not only to ensure that they stay ahead of the curve and mitigate risk, but also to attract the next generation of digitally literate talent.
Robust cyber security is built on solid foundations
When we talk about foundational cyber security, we mean fundamentals, such as patching, malware protection, high-fidelity system backups, an up-to-date anti-virus system, and other options, such as application allow-listing and asset inventory. These basic controls can help companies understand their system setup and the potential threats, identify vulnerabilities, and assess their risk exposure.
The Pareto principle states that around 80% of consequences come from 20% of the causes. In the context of cyber security, that means 80% of exposure to risk comes from 20% of the lack of security. If companies do the foundational things right, they can manage out a significant amount of this risk.
Importance of maintaining and upgrading security controls
However, having basic security controls, such as anti-virus software in place, is just the first step on that journey. Equally important is having someone within the organisation, with the requisite skill set, or the extra labour bandwidth, to operate, maintain and update those security controls, as they evolve.
Educating, training and recruiting existing employees, and the next generation of talent, along with forging partnerships with trusted technology providers, will ensure that industry can leverage the latest digital technologies, in order to drive business value, and secure physical assets against cyber-attacks.
The COVID-19 pandemic is only accelerating the expansion of Automation, Robotics, Machine Learning (ML) and Artificial Intelligence (AI), and changing how people live their daily lives. This expansion leads the way with technologies that are developed to solve problems, improve operations, streamline processes and assist people, to focus on learning new skills, creativity, and imagination.
Transformation of the physical security industry
One of the latest industries to be permanently transformed is physical security. The era of utilising security cameras is slowly changing into more advanced and more efficient technological applications - security robotic solutions.
SMP Robotics is a California-based company, which is a pioneer in developing robotic technologies, powered by AI, to assist, improve and deliver on new expectations in today’s world. One of their services is smart surveillance systems. This represents a proactive approach to security. The company, SMP Robotics’ Founder and Chief Executive Officer (CEO), Leo Ryzhenko, stated “Autonomous robotic technologies will become a driving force in future security solutions.”
Robotics and AI in autonomous security solutions
The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards
The company uses robotics and AI technology to implement autonomous security solutions, which reduce liability and overhead, as well as improving the quality of services. Robotic guards are capable of patrolling all types of facilities, in both urban and rural contexts.
The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards. The inspection robots, deployed by SMP Robotics, are easily integrated with many existing security technologies, armed with obstacle avoidance and anti-collision measures, automatically recharge, and can recognise faces up to 50 metres. As the world grows increasingly complex, technology like this is essential to ensure safety for all.
AI-enabled autonomous video monitoring ground vehicles
The advancements in technological breakthroughs of SMP Robotics position the company and its AI-powered, autonomous video monitoring ground vehicles, to be the most adaptable to any industry, cost-effective for clients’ business needs, in providing various types of services from public safety, crime prevention, to asset protection and physical security.
SMP Robotics continues to implement new innovative solutions and groundbreaking technologies in its latest generation of autonomous models. Currently, many were already deployed or in a process to be delivered to a number of key clients, in various industries throughout the globe, from oil & gas, nuclear power plants to data centers, healthcare facilities, and amusement parks.
Smart security robots
Tal Turner, the Vice President (VP) of Business Development and Partnerships, SMP Robotics, said “We provide autonomous, artificial intelligence, all-weather, all-surface, smart security robots that are turnkey and operate independently on their own, using real-time obstacle avoidance, face recognition, and other cutting-edge technological advancements.”
According to Coherent Market Insights, the Robots as a Service (RaaS) market direction will grow by 15.9% by 2028 and reach the threshold of 41.3 billion dollars. SMP Robotics stands at the forefront of the security robotic revolution, making an impactful change to make the world a safer place.
Schools were never designed and built with social distancing in mind. So it’s perhaps not surprising that as children returned to schools for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head teachers are considering taking learning and large gatherings, such as assemblies outdoors, when possible.
Managing ‘class bubbles’, hygiene and ventilation
While Dr. Yvonne Doyle, the Medical Director of Public Health England (PHE) has publicly reassured parents that schools are not the ‘drivers’ or ‘hubs’ of COVID-19-19 infection in communities, there is a lot of pressure on school leaders to manage ‘class bubbles’, extra cleaning and hygiene, ventilation, and COVID-19 testing, to protect families and staff.
It’s a logical step to switch, in certain circumstances, to outdoor activities where fresh air is on tap, and social distancing is far easier to manage.
Specially built outdoor classrooms
Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms
Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms, which had been growing in popularity, even before the pandemic. These facilities offer numerous benefits as an extension of existing learning spaces and provide children the opportunity for hands-on learning, beyond a stuffy classroom.
However, if outdoor spaces are routinely called upon as part of COVID-19 contingency planning, how can schools ensure that their outdoor classrooms and wider areas are secure, robust, and fit for purpose?
When specifying outdoor classrooms and learning spaces, it’s essential to take into account the well-being of the students and staff, who will use them, noise pollution and acoustics. Most importantly, education managers need to ensure the surrounding area is secured and adequately protected from threats, including terrorism.
Perimeter security measures for schools
How can schools and nurseries secure their perimeters, so that outdoor learning is totally safe for all? A starting point is to seek out architects and suppliers, who have a good understanding of security standards.
Worryingly, Jacksons Fencing’s research recently found that only one-third of architects are seeing both LPS 1175 and the UK police initiative, Secured by Design (SBD) physical security standards, specified for schools. This highlights a lost opportunity for architects to propose solutions that are appropriate to the level of risk and needs of the school, without turning the site into an unwelcoming fortress.
Helping schools identify specific security needs
Head teachers would be wise to work with architects, who not only know the latest security standards inside and out, but are also are willing to play a more advisory role, helping the school identify exactly what is needed.
Head teachers should prioritise solutions appropriate to their site’s specific risks
It’s also vital that architects don’t simply replace existing fencing and gates, with the same security systems that have been in place for years. Instead, they will need to meet changing needs and risks. Our research finds that teachers often report issues, with the school perimeter and gates, from being climbed over (28%) and causing injury, to gates not locking properly (10%). Head teachers should prioritise solutions appropriate to their site’s specific risks, which sometimes require altering of existing measures.
School fencing is an important aspect of any education site. As well as defining its boundary and making a visual distinction between public and private property, the fencing and gates that surround and secure a school, will typically meet a wide variety of other important criteria, including preventing unauthorised entry to the grounds, protecting pupils, staff, and visitors from accidents and injury, deterring theft and anti-social behaviour, and reducing the risk of malicious damage, and acts of terrorism.
Welded mesh panels for perimeter fencing
Popular options for schools include welded mesh panels for perimeter fencing or sports areas, and railing systems to act as demarcation, in order to control foot and car traffic.
Within the outlying boundary, barriers, bollards and parking posts will keep pedestrians, and vehicles safe from each other, while timber fencing and gates can be designed to control the flow of people, around the grounds and reduce the areas, where students can be hidden from view.
Automated gates and access control
Perimeter fencing must be complemented with safe entrances and exits for vehicles and pedestrians. Every school has unique entry-control requirements, determined by factors, such as size, location and the local environment. These needs influence the decisions you make, when preparing technical specifications for school security gates.
Do you require gates to be steel or timber, manual or automated, single or double leaf? Specialist suppliers will be in the best position to offer inputs on school gates, which typically need to offer solid security and durability, with a welcoming aesthetic.
Specifying access control system
When specifying a school access system, it’s important to consider the areas of the school
When specifying a school access system, it’s important to consider the areas of the school, such as sports fields, car parks, and children’s play and learning areas, and whether it requires playground segregation. Selected gates should meet the design of the fencing, to create a secure perimeter with no weak points, with automated gates conforming to all current safety regulations. .
Noise pollution can be a problem as well, including noise coming in or leaving the school in residential areas. If more teaching is to be carried out outside, it’s worth considering acoustic barriers to reduce noise in and around the school.
Timber acoustic barriers for security and privacy
Timber acoustic barriers offer security and privacy, and can reduce noise levels, by as much as 32 decibels (in laboratory conditions), so are ideal for city centre schools or those located close to busy highways.
There are many ways to build an outdoor classroom. Timber products can help to create a welcoming environment, such as wooden shelters, pergolas, fencing, and decking. Always check that high quality timber, ideally guaranteed for 25 years against rot and insect attack, is being used to provide an attractive, cost-effective, safe and sustainable solution, for all weather conditions.
DBS approved installers
And of course, installers must be DBS approved, so that they can install outdoor classrooms, during school holidays, or within term time, with minimal disruption.
The COVID-19 pandemic had a huge impact on schools and learning. While nobody wants to think of fresh outbreaks of the infection, or any other virus, installing an outdoor classroom made from high-quality, long-lasting materials is a great way to future-proof school learning and ensure safety, and preparedness. Putting extra thought and care into the security angle will provide schools with decades of protection against a host of unforeseen events.
Vehicle barriers first rose to the forefront of public attention after 9/11. The focus from 2001 to 2010 was on anti-terrorism, and vehicle barriers appeared at military and government facilities around the world.
The U.S. Capitol breach on Jan. 6, 2021, brought heightened attention to the risks in a society that is increasingly fractured and volatile. Various protest events in recent months have made customers more aware of possible threats and prompted many to proactively install vehicle barriers and other systems to protect their premises.
Shifting market focus
Since 2010, and with the anti-terrorism market mostly saturated, the market focus for vehicle barriers shifted to public safety applications such as stadiums, schools, universities, large tech companies, and data centres.
It’s an example of deploying technology developed in “wartime” to the broader public good, says Keith Bobrosky, the new president of vehicle barrier company Delta Scientific Corporation.
Withstanding the pandemic
The only remaining hurdle for Delta Scientific is to deal with continuing uncertainty going forward
Like many in the security market, Delta Scientific has withstood a tumultuous two years during the duration of the novel coronavirus pandemic.
They have “come through with flying colours,” says Bobrosky. The company never closed down, and its vaccination rate is high. The only remaining hurdle is to deal with continuing uncertainty going forward.
Delta Scientific’s commitment
Bobrosky began working in sales at Delta Scientific in 2007. Along the way, he has expanded into management, production, and engineering management.
Through it all, he has seen a company that provides employees the autonomy to do their jobs and who have a strong commitment to customers, he says. The privately-owned company is nimble; decisions can be made quickly to respond to market changes, adds Bobrosky.
Addressing needs during a pandemic
The company was concerned about lower demand when the economy shut down, says Bobrosky, but they did not see an impact. The business was steady as a result of government entities and other organisations taking advantage of being closed to evaluate and address security needs. “We saw a decent flow of government business because of the shutdown,” says Bobrosky.
Delta Scientific focuses on the domestic U.S. market but also has a presence selling to partners in the Middle East and Europe, where the equipment is known for its ability to take multiple hits. Even after withstanding an impact according to ASTM standards, their barrier is still operational.
Increased steel purchased
Delta Scientific ramped up its purchasing power, staving off any shortages and striving to keep lead times short
As material shortages have spread through the industry, Delta Scientific has ramped up its purchasing power, staving off any shortages and striving to keep lead times short. Steel is their major component – literally, 98% of the weight of the products is steel, and there are 5,000 pounds of steel per barrier.
The price of steel has gone up and there have been shortages. The company has maintained supply by leveraging its reputation and purchasing power. Most of their components are made in the USA, which has helped them dodge the recent challenges of the global supply chain.
Application of barriers and bollards
Automotive dealerships are another market for Delta Scientific; their bollards and barriers are used as anti-theft devices to keep vehicles from being stolen from a sales lot.
Delta Scientific’s products can foil car thieves who might otherwise use a large vehicle to plow through a barrier and then enable a parade of accomplices to drive away in additional vehicles. Auto resellers buy anti-terrorism products to protect their inventories.
DSC550 Open Frame vehicle barrier
Delta Scientific’s products have evolved from push buttons and relay to touch screens and microprocessors
New efficient product designs enable Delta Scientific to use less steel while keeping prices competitive and maintaining crash ratings. The products are more innovative, says Bobrosky. New barriers include the DSC550 Open Frame vehicle barrier, which does not block the view as solid barriers do.
During the last decade control systems for Delta Scientific’s products have evolved from push buttons and relays to touch screens and microprocessors, although some customers still prefer the simplicity of the older approach.
Portable crash barriers
The equipment can also be controlled remotely and integrated with PSIM-type systems. Although the systems are stand-alone, some clients have been toying with the idea of controlling them through the internet, emphasising the importance of appropriate cybersecurity.
A separate line of portable crash barriers can be towed into place in 15 minutes by a vehicle or even a golf cart. They are used for events such as the Democratic and Republican National Conventions, the Oscars, music festivals, etc. There are hundreds of units in the field, available as needed for various events and rented out to event management companies and other organisers.
Improving customer relations
As the president of Delta Scientific, Bobrosky says his biggest opportunity is to continue improving customer relations – a never-ending goal. He will also strive to increase communication. Looking ahead, additional crash tests are scheduled for 2022, and the company will continue to look for ways to “do more with less.”
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex.
Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’.
CV5S and CV52S AI-powered SoCs
The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond.
The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing.
Faster and ubiquitous AI capabilities
Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions"
“Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm.
John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.”
Edge AI vision processors
Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive.
By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing.
4K multi-imager cameras
“However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot.
In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation.
The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022.
Reference boards for camera manufacturers
The software on these new SoCs is an evolution of our unified Linux SDK"
As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families.
“The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot.
Better crime detection
Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address.
“Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot.
Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution.
4K AI processing on-camera
The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras.
This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot.
The advent of on-camera AI at 4K changes the paradigm
Enhanced video analytics and wider coverage
“Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot.
He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.”
Deployment in retail applications
Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once
Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement.
The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out.
This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics.
Use in cashier-less stores
Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item.
In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking.
Updating on-camera AI networks
Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames.
So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle.
If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene.
Efficient traffic management
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself
Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.).
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server.
Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video.
On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy.
In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level.
Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas.
“With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.”
Physical security in parking lots
With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot
One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred.
With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners.
If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go.
Advantages of using edge AI vision SoCs
Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.”
He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.”
He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM.
Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process.
Incorporating BIM systems
For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems.
Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants.
BIM information relating to doors, hardware, and security solutions is available in the cloud
BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings.
“If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region.
“It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.)
Centralised data in BIM 3D model
Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx.
Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building.
For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file.
Revit and ArchiCAD
A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects.
Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit.
Tailor-made information security solutions
We provide tailor-made information security solutions with various hardware on projects with more doors"
“We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.”
For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu.
Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world.
Data addition to Opening Suites site
ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections.
Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations.
Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development).
More details and more data
Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors.
Data will be more and more important, and there will be more data inside BIM models
Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx.
The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Type of site: Grade A multi-tenant office
Location: The Bailey, 16 Old Bailey, London, UK
Site size: 115,000 sq. ft over ten floors
Easy access for users
Touch-free and digital sign-in
Free flowing movement through reception, avoiding crowds and queues
Fast access to other floors via lifts
Visitor management system that can be used by multiple tenants and reception staff easily
Secure and clear intercom/entry phone and door automation for out-of-hours, deliveries and trades people access
Easy access and parking for disabled users
Reliable and resilient security, including CCTV monitoring of strategic locations
Integriti intelligent integrated access control system
Inner Range’s enterprise-level intelligent integrated access control system, Integriti, provides robust security, as well as seamless integration, to an array of other building management systems. Some of the key features of Integriti include:
Easy to use proximity card entry for users and tenants
Forge Bluepoint, powered by Yardi, visitor management system to create secure, but easy to use credentials for visitors, including via smartphone
High-level lift integration, by Mitsubishi that reads user credentials and directs users to the quickest lift, for their desired destination
Integrated CAME BPT video entry phone and access control to automate doors, for disabled access near dedicated parking bay, for disabled users, as well as for out-of-hours access, deliveries and trades people
Hard-wired IP closed circuit television system (CCTV) with Hikvision cameras, to monitor strategic locations
End-to-end encrypted messaging, through every interface and integration, by Inner Range’s Integriti for high-level security
Provision for future entry turnstiles/speed lanes
Richard Harvell, Engineering Director at Knight Harwood, who managed the refurbishment at The Bailey, said “Our key requirement was to be able to move users, including visitors, swiftly through reception, to their correct floors, with minimal or no touch points. And, all of this, without compromising security.”
High-level lift integration
Antron Security’s solution, centered on Inner Range’s intelligent access control system, Integriti"
Richard Harvell adds, “Antron Security’s solution, centered on Inner Range’s intelligent access control system Integriti, more than delivers. The high-level lift integration automatically directs users to the fastest lift for their floor and only allows access beyond reception, for those with bona fide credentials. We have been impressed with Integriti’s sophistication and integration capabilities, as well as Antron Security’s expertise and diligence in designing and installing our bespoke access and security system.”
The Client - The Bailey
UK property firm Endurance Land, which is a member of the Hong Kong-based property conglomerate, Nan Fung Group, owns The Bailey. The property, which is situated directly opposite the famous Old Bailey High Court in London, was originally built in the early 20th Century for the Chatham and Dover Railway Company.
Its Grade II listed Edwardian Baroque façade features classical reclining figures, while a larger ‘western extension’ was built in 1999, to modern city office standards.
Knight Harwood commissioned for refurbishment
Knight Harwood was recently commissioned to refurbish the whole site, along with architect, Orms and building design consultancy, GDM Partnership.
The commercial site meets Grade A office specifications and offers exceptional internet reliability, and speed for tenants. It achieved a platinum connectivity rating, by WireScore, the Mayor of London’s digital connectivity rating scheme, in 2020.
Sophisticated access and security management system
A new and sophisticated access and security management system was part of the refurbishment brief. Knight Harwood stipulated an access and security management system that would ensure a free flow of users and tenants through reception, without crowding or queues.
This would need to include integrating intelligent lift controls, so as to ensure users were swiftly taken to their designated floor, as well as a good visitor management system that all tenants could use, without the need for a central security team to manage requests.
Touchless access and digital sign-in for users
Touchless access, as well as digital sign-in for users was also important for the client
Touchless access, as well as digital sign-in for users was also important for the client. An intercom or entry phone and access control operated doors were needed for disabled users, who would be accessing the building from the dedicated disabled parking bay, as well anyone arriving ‘out of hours’, or for trades people and deliveries.
High-levels of physical and cyber security were needed to keep all legitimate users and the site safe, without hindering access. CCTV monitoring would be needed in strategic locations. Future proofing, including laying under-floor cables ready for entry turnstiles/speed lanes, was desired.
Antron Security managed the project
Antron Security project managed the design, supply and installation of the access control and security system for The Bailey and acted as the ‘go to’ contact for Knight Harwood.
Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 30 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI and Safe Contractor approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected.
Bespoke security solutions
Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for The Bailey. Inner Range has been a globally renowned company in the design and manufacture of intelligent security solutions, since it was established in 1988.
Inner Range systems have been installed in over 25 countries. Its flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls, for single sites through to global estate portfolios.
Inner Range’s powerful Integriti intelligent access control system integrates with Mitsubishi’s high-level lift controls
Inner Range’s powerful Integriti intelligent access control system, known for its breadth of integration options, integrates with Mitsubishi’s high-level lift controls and Bluepoint’s visitor management system, to ensure all users and visitors can access their floors, and designated areas with ease.
The Mitsubishi lifts are able to read credentials from proximity cards, or mobile phones, at a user check-in point, at the reception, or in the lift lobby itself.
High-level lift controls to reduce crowding and queues
The high-level lift integration with ‘destination control’ means the lift software takes into account, where each of the building’s lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user.
The user is immediately directed to the most efficient lift via a display screen at reception, or in the lift lobby. If users are able to go to more than one floor, they can update their preference in the lift itself. This integration ensures users move through reception quickly and efficiently, with no unnecessary stops.
Fully integrated visitor management
Inner Range’s Integriti intelligent access control system also allowed Bluepoint’s visitor management system to integrate with the Mitsubishi lifts.
For visitors to access tenanted floors within the building, the following has to take place:
A tenant creates the meeting via Bluepoint
An email is generated and sent to the visitor’s inbox, where they can create a mobile QR code pass and save it to their smart phone wallet
When the visitor arrives, they use their mobile phone to scan the QR code in the Bluepoint invite, at the reception desk to check-in
The reception team can then direct them to the Mitsubishi lifts, which display the lift car that they need to get to their meeting
To leave, the visitor presents their QR code at the lift or door reader, which tells the system they’re leaving
The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system
CAME BPT entry panels and video intercom system
The QR code gives the visitor the ability to access everything they will need, including the lifts and any locked doors en-route. The integration between Integriti and Bluepoint’s visitor management system was achieved using the Bluepoint API. Bluepoint is cloud-based, hosted on the Microsoft Azure platform.
CAME BPT entry panels were installed to allow disabled users to access the building, near the dedicated disabled parking bay, as well as for any visitors entering the facility out-of-hours, to contact the security team, or for deliveries and trades people to use, in order to access doors at the rear of the building. The entry panels allow for a reliable and intuitive video entry intercom system.
Hikvision CCTV cameras installed
CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP CCTV system
CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP closed circuit television (CCTV) system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring.
System protocols automatically bring up specific camera feeds for security managers to view, in response to alerts and footage can be viewed together with additional information from Integriti, such as if a door has been left open.
Intelligent access control
Inner Range’s enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131.
Integriti helps building managers create greener and more energy efficient sites, by tracking how tenants use the building, and amending heating and lighting settings, as a result. Integriti also provides trace reporting, that can identify a user’s movements, if they have become unwell and identify who else has been near them.
System benefits for users include:
Touch-free entry and digital sign-in for users and visitors
No unnecessary stops for users on their way into the building
Reduced risk of crowding or queues in reception area
Easy to use visitor management system
Robust security that doesn’t impinge on access
Future proofing with cabling provision for speed lanes/entry turnstiles in place
Foreign embassies are an essential part of establishing and maintaining peaceful cooperation, and collaboration between countries all over the world. They can also be the focus of tensions, peaceful and violent protests, terrorism, and many other risks, which mean that thorough and effective security solutions are essential to keep people, property and sensitive documents safe.
Usually located in capital cities, each foreign embassy is the workplace and often residence, of a Country Ambassador. They are used for important diplomatic meetings, holding events, hosting VIPs, and a range of other activities that focus on the political, cultural and social relationships with the host nation.
In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations
In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations, during times of trouble.
G4S security services in Jordan
“Anywhere in Amman, where a foreign embassy has outsourced their security, you can be certain that G4S is the company they have come to,” said Ashraf Abul-Hajj, the Managing Director of G4S in Jordan.
Ashraf Abul-Hajj adds, “We’ve been doing this for decades and have excellent, long-standing relationships providing security for many embassies in the capital city. We secure over 30 embassies at the moment, and we’ve been working with some of them for over 20 years.”
In fact, it was a small Jordanian security company, called Safe and Sound (now under G4S), which started to provide embassy security in Amman, Jordan, all those years ago, before it became a part of G4S, in 2004.
Embassy security services
G4S now provides a wide range of services to the embassies that it secures in Jordan. These include manned guarding, installing and maintaining security systems, such as CCTV, access control and alarms, secure escorting for VIPs, during their visits, with G4S vehicles and highly-trained drivers, and coordinating security for events, which are being hosted at the embassy.
“The main purpose of most of our security solutions is to ensure that nobody gains access to an embassy, who shouldn’t be there,” said Ashraf Abul-Hajj, adding “There are a lot of different risks that embassies face - big and small. Terrorist incidents, while very rare, remain a threat, so our security teams are trained to be vigilant and notice any suspicious behaviour.”
Securing embassies during protests
Protests at embassies are more common, when people disagree with the actions of a specific country"
Ashraf Abul-Hajj adds, “Protests at embassies are more common, when people disagree with the actions of a specific country. Protests, even peaceful ones, are volatile and have the potential to turn violent, so our security officers and systems are there to monitor tensions, continuously assess the risk levels and prevent breaches.”
Terrorism and protests are the more extreme examples of security threats, but day-to-day G4S security teams also deal with lower level threats that still need to be managed sensitively and professionally.
Ashraf Abul-Hajj stated, “People try to access their foreign embassies for a variety of reasons, often at times of personal stress or hardship, and can become distressed, and even aggressive, if they are not permitted to enter.”
He adds, “Sometimes, we have to deal with very unusual scenarios. At one embassy, a man turned up saying that he had been informed by the embassy that he had won a competition and he was visiting the embassy to collect his cash prize. It was obvious to the team that he was the victim of a con, but his behaviour became very challenging, when he realised this and could not gain entry. Our security officers had to try to calm him down, while stopping him from entering the embassy, without consent.”
Ashraf Abul-Hajj concludes, “This shows how varied the challenges facing our teams at foreign embassies can be. An embassy can be peaceful for a long time, but it can only take one negative news story or a single social media post, to spark a significant protest. With our security systems, highly trained security officers and extensive experience, G4S is more than prepared to meet those risks. We are proud to deliver such an important service, keeping foreign embassies safe and secure in Jordan.”
Alcatraz AI has announced that they are bringing the Alcatraz AI Rock facial authentication solution to BrainBox AI’s offices. BrainBox AI is at the forefront of building automation and a renowned company in the green building revolution.
Identity and facemask verification solution
As BrainBox AI’s office recently re-opened with limited capacity, the company is taking proactive steps, through Alcatraz AI’s robust identity and facemask verification solution, in order to keep employees safe.
As one survey showed, two-thirds of employees have safety concerns, regarding the return of on-site operations. Considering these statistics, health and safety must be top priorities for businesses, as they re-open. BrainBox AI is keeping its employees’ safety at the top-of-mind, by installing Alcatraz AI’s Rock solution, before they return, to ensure greater safety and security.
Alcatraz AI’s Rock facial authentication solution
Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies
Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies, to provide facilities with enterprise-grade identity verification, which is needed to create secure spaces.
Rock’s state-of-the-art security features include touchless access, multi-factor authentication, video at the door and intelligent tailgating detection. Alcatraz AI’s access control solution, the Rock, effectively detects tailgating and sends ‘real-time alerts’, if an unauthorised person enters, and sends real-time notifications to ACS/VMS.
BrainBox AI, leading the green building revolution
“BrainBox AI is leading the green building revolution, and we are looking forward to bringing frictionless, multi-sensor technology and a touchless authentication feature to the office,” said Tina D’ Agostin, the Chief Executive Officer (CEO) of Alcatraz AI, adding “By utilising the Alcatraz AI Rock, we’ve helped BrainBox AI’s offices re-open smoothly and safely.”
“BrainBox AI is excited to announce its partnership with Alcatraz AI. Our employees’ safety is always our top priority. We are confident The Rock’s touchless authentication and the frictionless security system will give each BrainBox AI employee peace of mind, when returning to the office,” said Jean-Simon Venne, the Co-Founder and Chief Technology Officer (CTO) of BrainBox AI.
ASSA ABLOY’s Code Handle door entry solution is a simple solution for keeping private rooms very private, in order to allow access only to those who require it and authorised personnel.
Code Handle door entry solution
The PIN code setting of the Code Handle access control solution allows users to keep control of who has access, particularly important when they want to keep items away from children.
In primary schools, Code Handle protects each and every room that staff and security don’t want pupils to access. This ensures that only authorised teachers and support staff, who know the code to unlock the door, can access these rooms. All they need to do is enter the code on the Code Handle‘s keypad and the door opens.
Works together with existing locking units
Code Handle, by ASSA ABLOY, works in combination with the existing locking units
Code Handle, by ASSA ABLOY, works in combination with the existing locking units, already installed in facilities. Users can keep the cylinder or lock, and just change the handle to a battery-powered Code Handle.
With Code Handle, there is no need to cable the door, connect it to the mains or install an electronic access control system. The Code Handle door entry solution is perfect for staff offices, kitchens, store rooms, staff toilets, or any other school room that is to be kept private and secure.
ASSA ABLOY’s Code Handle has various benefits, including:
Auto-lock - Staff rooms are used many times, throughout the day, With Code Handle’s auto lock feature, there is no need to remember to lock the door, when exiting.
Easy to install and retrofit - All it takes is two screws and two minutes of time, to install Code Handle on almost any interior door.
Keyless and convenient - Secure rooms with no keys, no wires and no expensive access control system, with the Code Handle door entry solution.
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges.
We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Assembling security solutions has long been considered the role of the integrator, whose role is to pick and choose the best technology tools and then to assemble the complete system. However, more manufacturers are offering pre-integrated end-to-end solutions that include multiple elements from the same manufacturer, designed to work seamlessly together. At the end of the day, end users want to know: Whose role is it to provide security ‘solutions’ – the manufacturer or the integrator? We asked our Expert Panel Roundtable.
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?