Security integrators are often tasked with a multitude of responsibilities which could include a variety of installation, integration or design tasks made up of sprinkler systems, fire alarms, access control, HVAC, video surveillance systems and networks; and then pile on maintenance, training and analytics. Traditionally, most security integrators have installation backgrounds but are now expected to be IT savvy, too. Even the most proficient IT professionals may not fully grasp the complexity...
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organisation’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scop...
Rhombus Systems, an enterprise video security startup, releases Unusual Behaviour Detection (UBD) to quickly notify organisations when something is wrong. Last year, Rhombus Systems released their AI-Powered R1 security camera to provide organisations cloud-management, facial recognition, people analytics, and enterprise integrations at an affordable price point. Today’s existing video surveillance systems are reactive and used only after an incident has already occurred. Rhombus is chang...
CNL Software, global supplier of Physical Security Information Management (PSIM) software, is pleased to announce that it will be demonstrating the latest version of its IPSecurityCenter PSIM solution, as chosen by leading law enforcement, Safe City and CNI organisations in the Middle East. It will demonstrate recent enhancements to its open PSIM platform, including the accelerated processing of alarms, a more intuitive interface and a greater focus on the visualisation of data. Artificial Int...
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anythi...
OODA LLC will provide comprehensive consulting and advisory services including a highly specialised Artificial Intelligence (AI) and Machine Learning security practice. "We'll be addressing not only traditional security and technology issues, but also looking at the vulnerability and integrity of emerging technologies like Artificial Intelligence," added Gourley. AI security practices In addition to the AI security practice, OODA will offer comprehensive assessments using their EVALU8 m...
PSA has announced a partnership with Solutions360, Inc., global provider of business management software for professional systems integrators in the security and audio-visual markets, as a part of the PSA Business Solutions Providers program. PSA members will be able to streamline their business procedures and workflow through the Q360 software, which includes full accounting, project management, job costing, service and dispatch, inventory and sales functions. PSA Business Solutions program “This is a very exciting partnership for Solutions360, Inc. We have several influential clients that are PSA Members and they have been encouraging us to pursue this relationship for some time. Our software is in alignment with PSA’s mission to help member companies become more successful; managing their businesses more efficiently, driving more profit into their processes and giving them better line of site into key business information” said John Graham, executive vice president for Solutions360, Inc. For 30 years, Solutions360, Inc. has been working with companies improving their profitability and business processes. The foundation of the Q360 Software hinges around flexibility and having the ability to be customised to fit individual needs using the numerous features that can help support every department, from front office to back office. Q360 combines the functionality of a highly-sophisticated CRM, PSA, ERP and accounting tool in a single solution. This centralises business processes and information, providing one common database to access accurate, real-time information. PSA-Solutions360, Inc. partnership “With every partnership that PSA enters into, our main objective it to benefit our members and owners,” said Anthony Berticelli, director of education for PSA. “Solutions360, Inc. is an ideal partner for us, and we are very excited to make the introduction to our members of what they can offer.” The PSA Business Solutions program is a suite of value-added resources and services to help enhance systems integrators’ business models, reduce operating costs and keep them competitive in the marketplace.
Crossword Cybersecurity plc, the cyber security technology commercialisation company, releases insights from its global review of academic cyber security research. The new database looked at nearly 1,200 current and past research projects from academic institutions in the United Kingdom, United States, Europe, Australia, and Africa. It reaffirmed the value of the cyber security research market, with reported funding of EU projects at over €1 billion. The database identified several global trends by comparing the periods January 2008 to June 2013 with July 2013 to December 2018. Securing critical infrastructure The United States appears to be the most active in CPS research, with a focus on securing critical infrastructure Cyber Physical Systems (CPS) – Over 100 projects were found in this area alone, a significant figure. The United States appears to be the most active in CPS research, with a focus on securing critical infrastructure. Privacy - Projects related to privacy have increased by 183% in recent years. Internet of Things (IoT) – Projects with an IoT element have increased by 123% lately, with around 14% of current projects having this characteristic. Cryptography – With the promise of quantum computing on the horizon, there has been an influx of new projects that apply the technology to the future of cryptography, with a 227% increase in this area of research (albeit this was from a low base). Greater focus Significant differences can also be seen between regions. For instance, the EU appears distinctly focused on minimising Small & Medium Enterprises’ (SME) exposure to cyber security risk. Conversely, when compared with other regions, the US has a greater focus on the human component of cyber security. Other US top project funding areas include cyber physical systems (as applied to smart cities and power grids), securing the cloud, cybercrime, and the privacy of big data sets (as applied to the scientific research community). In the UK, the research verticals are critical infrastructure and securing the health sector (with 11 current projects each). Big data projects Current funding across UK projects exceeds £70m, with quantum and IoT-related projects both more than doubling over five years. There are currently nine new UK projects with a focus on cyber physical systems. There are currently 52 global projects with a cryptographic focus, and at least 39 current live EU projects featuring a cryptographic element The four UK projects with the greatest funding are in the fields of safe and trustworthy robotics, big data security, cybercrime in the cloud and quantum technology for secure communications. The most notable UK decline was in big data projects, which have dropped by 85%. There are currently 52 global projects with a cryptographic focus, and at least 39 current live EU projects featuring a cryptographic element. Evolving cyber security In the UK, this area has been consistently strong over the last ten years, with 18 projects starting between 2008 and mid 2013, and 19 projects from mid 2013 to now. Tom Ilube, CEO at Crossword Cybersecurity plc said of the analysis, “The need to protect critical infrastructure has never been stronger as technology becomes more deeply embedded in every aspect of our daily lives. However, one apparent omission is research solely focused on the application of AI techniques to complex cyber security problems. We hope to see more of that in the future, as the industry works to stay ahead of the constantly evolving cyber security landscape.”
ASUSTOR Inc. is proud to announce compatibility with Seagate’s newest NAS IronWolf 110 series of SSD. The new Seagate IronWolf 110 SSD is listed as model ZA960NM10001. In anticipation for the release of Seagate’s first SSD designed for servers, ASUSTOR has thoroughly tested the IronWolf 110 series 960GB SSD for use inside an ASUSTOR NAS. ASUSTOR NAS devices ASUSTOR NAS devices support SSD caching, which optimises response times and transmission performance when accessing data while also achieving the best balance of speed and capacity. The fast nature of SSDs allows workloads to keep pace with the ever-increasing demands of modern times. With the all-new ASUSTOR AS4002T and AS4004T with 10-Gigabit Ethernet, ASUSTOR and IronWolf SSDs continue to break high-speed barriers to meet the needs of performance users.
Wavestore has released v6.14 of its open-platform and highly secure Linux-based Video Management Software (VMS). “v6.14 is our most feature-packed release to date and delivers on a promise to our systems integrator partners that we will continue to rapidly respond to changing market requirements,” said Julian Inman, Head of Product Management for Wavestore. “This new release incorporates a host of industry first innovations which deliver enhanced value, essential for smaller video only systems and up to Enterprise level, fully integrated solutions.” v6.14 Video Management Software Multiple cameras can now be configured and set to record in a matter of seconds thanks to a completely revised camera setup screen. Separate camera groups can be created and used to quickly apply common settings, such as stream parameters, recording frame rate and quality settings, to all cameras in the group at the same time. “For larger size projects with high camera counts, we know that system integrators have found camera set-up to be a time-consuming process,” said Julian Inman. “With the release of v6.14, we are able to claim that our VMS is among the quickest in terms of the time it takes to set up connected cameras and recording.” LASS file system upgraded Wavestore is now able to create logical disks from multiple physical disks Wavestore’s proprietary Large Allocation Storage System (LASS) file system, which is designed specifically for professional VMS solutions, already offered several advantages over traditional file systems, such as error-free, robust and reliable recording, lightning fast video search and recall, lip-synchronised audio as standard, industry-leading throughput and the ability to store multiple Petabytes of data. It has now been enhanced with new feature sets which include: Creation of Logical Disks - Wavestore is now able to create logical disks from multiple physical disks. This means that a Wavestore NVR with two 6TB HDDs, for example, can be grouped together so it appears as just a single 12TB HDD. This can be done over as many disks as required. For applications that demand it, physical disks can be kept separate and specific camera recording tracks split across individual disks (either to the storage within the server, or to a remote location) so that, in the event of a disk failure, critical data is still retained. Wavestore HyperRAID delivers up to N+5 redundancy - Wavestore’s unique HyperRAID architecture performs much faster than traditional RAID and doesn’t require an expensive hardware RAID card to operate. Instead, it is controlled by the VMS and utilises widely available simple Host Bus Adaptor (HBA) technology to deliver a faster and more resilient RAID solution, whilst significantly reducing hardware costs. ‘HyperRAID’ provides up to N+2 redundancy (RAID 5 or RAID 6), or with ‘HyperRAID Plus’ up to an industry leading N+5 redundancy. EcoStore - save over 80% energy on storage Wavestore EcoStore solution Wavestore’s innovative EcoStore solution facilitates the spin-down of hard drives that are not in a read/write state Wavestore’s innovative EcoStore solution facilitates the spin-down of hard drives that are not in a read/write state. This can save over 80% of the energy normally required for a storage solution, as well as offering savings in associated costs, such as reductions in air conditioning and wear and tear on disks from always being powered on. It works by sequentially writing to ‘groups’ of drives, which could be a single drive, multiple drives or multiple HyperRAID arrays up to N+5. Once each group is filled up, the next group is ready to take over recording and the first group is spun down. The archived video from a spun-down group can be viewed extremely quickly thanks to the index of where that video and metadata is stored and always available in the spun-up group. This provides a seamless operator experience when reviewing footage via the WaveView and WaveView Mobile client software, regardless of where that footage is stored. Perhaps the most impressive aspect of this technology is that it works with Wavestore’s latest range of servers/NVRs with no further specialist equipment required. Wavestore VMS licence levels enhanced Wavestore’s licence levels have been enhanced to bring new features and additional functionality across the existing BASE, PREMIUM and ENTERPRISE categories, with PREMIUM and above including a number of popular integrations straight from the box. In addition, a new licence level, ULTIMATE, which sits above ENTERPRISE, offers as standard the very latest innovations and comes complete with eight sequential v6 upgrades to keep your system up-to-date for over two-years.
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion security management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible. For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels. VisitorPoint System VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging. Now organisations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies. Open-technology systems integration Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customise and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show. These latest integrations include Jaquies IP intercom hardware; the mobile phone app GuardPoint; and the Metra locker system hardware. “For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform”, says Lee Copland, Managing Director, Maxxess EMEA. Smart, open infrastructure The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment" “The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.” eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware. Network monitoring for public safety Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service. NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users. Lone worker monitoring Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualised messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day-to-day operations. We are well positioned to further capitalise on major infrastructure projects across the region such as hotels and leisure" With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East. Maxxess expands Middle East reach “We are well positioned to further capitalise on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organisations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimised workforces across security and facilities management functions.”, said Lee Copland, Managing Director, Maxxess EMEA. He adds, “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
Trillium Secure, Inc. has appointed Mahbubul Alam as Chief Marketing Officer and Senior Vice President of Global Engineering. This move further deepensTrillium's experienced management team while the company launches an end-to-end trusted and secured data services platform for vehicles. Alam's expertise in platform as a service offerings and over-the-air update technology for connected vehicles is a perfect fit for driving Trillium's recently launched Trusted Mobility Platform and Services. Creating transformative technologies "Mahbubul's dual strengths to clearly define branding while taking a no-nonsense approach to developing PaaS and SaaS solutions are a great addition to the Trillium team," said David Uze, CEO and founder of Trillium. "His leadership and vision are integral to our significant CES 2019 efforts and will be part of Trillium's long-term mission of making connected cars safe." Alam's previous experiences as chief technology officer and chief marketing officer of Movimento, an Aptiv company, as well as more than 14 years as Cisco's Head of Internet-of-Things and Machine-to-Machine Platform, ideally position him to have an immense impact on Trillium's mission. "It's an honor to join Trillium's great team and contribute to creating transformative technologies at a critical juncture in the transportation industry's history," said Mahbubul Alam, new CMO and SVP of Global Engineering. "I'm excited to accelerate our innovative technologies to further strengthen Trillium's award-winning trusted mobility services."
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
The Security Industry Association (SIA) looks forward to 2019, and it is apparent that physical security is moving into its most formative years. Changes presented by emerging technology, open systems and growing connectivity among devices and sensors will make a big difference for manufacturers, systems integrators/dealers and end users. With a more open, connected environment come cyber risk and data privacy concerns – which is why, in SIA’s 2019 Security Megatrends, cybersecurity’s impact on the physical security industry ranks number one on the list. Cybersecurity is affecting all areas of the industry landscape, from security implementation to attracting top talent to the workforce. Digital transformation The digital transformation we are experiencing impacts many other parts of the security industry as well, bringing opportunities like evolving identity management and collecting and delivering big data to customers. At this critical point in the industry’s development, it is important to embrace change, leverage disruptive technology in ways that give companies a competitive advantage. To determine this year’s Megatrends, SIA surveyed hundreds of executives from member companies To determine this year’s Megatrends, SIA surveyed hundreds of executives from member companies, along with current and recent Securing New Ground speakers and attendees, to identify which previous trends were still relevant, which trends were no longer as impactful and which broad trends should be added to our report. This year’s Security Megatrends 1. Cybersecurity’s Impact on Physical Security: It is important to prioritise cybersecurity for your business, your customers’ business and the vendors with which you work. This trend calls for continual process improvement and investment. 2. Internet of Things (IoT) and the Big Data Effect: The security industry makes use of IoT, analytics, artificial intelligence (AI), robotics and more, and data is coming from everywhere. The industry now faces the challenge of effectively managing and segmenting this information to be pertinent to the user. 3. Cloud Computing: Cloud platforms and applications are becoming prevalent across security solutions. This technology helps security integrators provide managed services and the advantages of off-site systems and services to customers. 4. Workforce Development: With historically low unemployment, finding skilled employees is a challenge to the whole security industry. Security stakeholders need talent with IT, cybersecurity, AI and even privacy expertise, presenting a need to grow students’ interest in the industry. 5. AI: Research firm Gartner predicts a new “democratisation of AI” that will impact more organisations than ever before. Companies are now testing this technology before offering it to customers and exploring how AI data can be used to improve security threat assessment and response. 6. Emphasis on Data Privacy: Growing connectivity brings new concerns over data privacy. Finding the balance between security and convenience is a dilemma the industry must now address. 7. Move to Service Models: The newest home security technologies are strongly impacting installing companies. Systems integrators must find ways to focus on services customers want and need and move to managed service models to make up revenues. 8. Security Integrated in Smart Environments: As everything becomes connected, smart environments will begin to proliferate. Buildings and cities are becoming more conscious, with connected systems now able to automatically respond to and even anticipate the needs of facility users and citizens. We must continue to find ways to make these environments smarter and safer. 9. Identity of the Future: With facial and voice recognition and biometrics growing in popularity and appeal, how will we enter buildings and access networks tomorrow? The industry will anticipate and adapt to constant technological change in identity and visitor management. 10. Impact of Consumer Electronics Companies: The influx of consumer electronics companies and DIY systems means changing rules and players in the security industry. This disruption presents both challenges and opportunities for security companies.
2018 was a good year for integrators and manufacturers across the board. The economy has been strong which manifested itself in many ways but in particular construction was booming. This was very good for the security industry, especially those integrators and manufacturers who provide services and products in the commercial space. Two of the most unexpected things that impacted the market, and will continue to impact it into 2019, are the trade war and the rapid rise of interest rates. I have been monitoring both very closely and didn’t expect the trade ‘skirmish’ to escalate into the trade war it has become. Similarly, interest rates have started to rise which was a bit of a surprise and one that will definitely impact the nation’s economy and by extension our market. Upcoming cloud-based trends Cyber has definitely taken a strong foothold in the industry and with the continued expansion of cloud-based services I see three main trends coming in 2019. The first is the rise of cloud-based products and service offerings that security integrators will have access to. While we have had a few key players already offering cloud-based solutions for a couple of years on the video side in particular, I see this really picking up steam across all other security and life safety solutions. This really leads into the second trend which is integrators adjusting their business models to leverage these cloud-based solutions into recurring revenue models as managed security service providers (MSSP). The ability for integrators to develop their own managed service portfolio will be key; PSA is already working with several partners to help bring a portfolio offering to our membership which is really exciting. I anticipate that we will see about 10% of security integrators take hold of this new model in 2019 and then expect that number to increase by around 10% each year until the majority of the security business is cloud-based and integrators accept the new model of being an MSSP. Finally, of course is cybersecurity. Cyber has definitely taken a strong foothold in the industry and with the continued expansion of these cloud-based services, it will be more important than ever to integrators, manufacturers and end users alike. MSSP portfolio offering The more progressive security professionals will see cyber as an opportunity, a part of the MSSP portfolio offering, rather than just a threat that we have been talking about for going on five years. The winners in this market will be the integrators and manufacturers who can adapt to all these changes, leverage new technologies we are seeing with AI and cloud-based solutions, and those who stick to commodity-based solutions will be left behind. There are some remarkable things happening with AI technology, analytics, biometrics PSA’s growth has been remarkable. We have exceeded our own growth plans year over year and have also exceed the market projected growth marks as well. We continue to add more offerings to our membership to help them stay ahead of the curve, which in turn helps us to do the same. Right now, we are investing in programs that provide data to our integrators to help inform their business decisions. Data is key for any business and PSA has spent a lot of time working with developers and our integrators to understand what the most meaningful data is they need and how we can best deliver that to them by way of dashboards and reporting tools. Future technology advancements The biggest challenge we face is really tied to the higher interest rates that we have seen so far this year and what lies ahead. We help future fund projects for our integrators so when we see higher interest rates, we must closely monitor that and make business adjustments along the way as well to flex along with those rate hikes. I have been in this industry a long time so clearly my enthusiasm for what the industry is doing doesn’t fade. But what makes it really exciting right now is really related to technology advances. There are some remarkable things happening with AI technology, analytics, biometrics – you name it. It is a very tech heavy industry that people can feel good about being a part of and is an industry that will continue to grow so the opportunities are endless.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-device artificial intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent automotive solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualisation. Based on 10nm ultra-low power processing technology, the CV25 chip is optimised for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual security guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-integrated devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber security standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
Security and Safety Things GmbH (SAST) is a new company that has announced its vision for an Internet of Things (IoT) platform for the next generation of security cameras. The Bosch startup plans to build a global ecosystem for the development of innovative security camera applications. Based on the Android Open Source Project (AOSP), SAST provides libraries, an API framework, and codecs for developers to work with. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications. We presented some questions to Nikolas Mangold-Takao, VP Product Management and Marketing, about the new venture, and here are his responses: Q: Why a new company now? What technology innovations have made this a good time to launch this company? The time is right to bring market needs and technological innovations together on one platform"Mangold-Takao: From a technical perspective we see two main drivers: increasing computing power at the edge and increasing internet connectivity, which will enable devices to directly communicate with each other and bring new technologies such as artificial intelligence also to the security and safety industry. At the same time, we see that this industry and its users are hungry for more innovative solutions – addressing new security needs while at the same leveraging the possibility to improve business operations for specific verticals, e.g. retail and transportation. The time is right to bring market needs and technological innovations together on one platform for this industry. Q: Why does SAST need to be a separate entity from Bosch? Mangold-Takao: SAST is setup as a wholly owned subsidiary of the Bosch Group. We wanted to make sure that SAST is able to underline its role as an industry standard platform across multiple players. SAST is open to get additional investors and is being setup as a startup in its own offices in Munich to foster the environment where speed and innovation can more easily take place. Having said that, several entities of the Bosch Group are very interesting partners for SAST. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications Q: Please explain your "value proposition" to the industry. Mangold-Takao: We will bring new innovations and possibilities to the security and safety industry by providing an open, secure and standardised Operating System for video security cameras, to also address pressing issues such as cyber security and data privacy concerns. Devices that run then with the SAST operating system will work with an application marketplace provided and operated by SAST. Integrators and users can then use these apps from this marketplace to deploy additional functionality on these devices. With our platform we will be able to build up a community of app developers, including the ones not yet developing for this industry who have expertise in computer vision and artificial intelligence. Q: It seems what you are doing has parallels with the Apple and Android "app" stores. How is your approach the same (and how is it different) than those approaches? We are setting up SAST as a user-centric company and involve selected users very early on in the process"Mangold-Takao: The approach is similar in the way that we plan to generate revenue by operating the application marketplace and thus participate in the app revenue. The difference is that there is much more needed than apps and cameras to create a complete working solution addressing a user problem in this industry – we need to make sure that our own platform as well as the new applications being created will work as a part of an end-to-end solution. Q: "Critical mass" and wide industry participation seem to be requirements for your success. How will you achieve those goals? Will you involve integrators, consultants, or other parties in addition to manufacturers (to drive awareness)? How? Mangold-Takao: SAST is in close exchange with device manufacturers, integrators and consultants, as well as application developers and large end-users at the moment to ensure that we are building the right platform and ecosystem for this industry. We are setting up SAST as a user-centric company and involve selected users very early on in the process. We will run dedicated programs and hackathons to attract app developers, already active and new to our industry. We will also run selected pilots with end-users throughout 2019 to ensure we have all partners involved early on. SAST sees the industry is hungry for more innovative solutions – with the retail vertical market a target for these solutions Q: What timeline do you foresee in terms of implementing these initiatives? Mangold-Takao: While we start with first app development programs and plan our first pilots already for this year, we are planning our commercial launch for end of 2019. Q: How does your new company relate to the new Open Security & Safety Alliance (OSSA)? Mangold-Takao: The Open Security and Safety Alliance has been working very closely with SAST over the past year, defining some important concepts and elements required. One of the most important elements is an open and standardised Operating System, specific to this industry, which will then bring forward new innovative technologies and solutions. SAST is actively working on this Operating System, based on Android Open Source Project (ASOP), but is evolved and hardened with industry-specific features. Q: What's the biggest thing you want the security industry to understand about SAST? What is your "message" to the industry? Mangold-Takao: Our message is simple: let’s build better security and safety systems – together! But for real, innovating an industry is a joint effort, we can only bring new innovation to this industry with partners who share our vision and are excited about new technology. At the same time, we strongly believe that our platform allows every partner to bring forward what they do best but also invite new partners to our industry.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognisable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognises when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognisable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing a lightweight alternative “When you trigger a pathway, it’s signalling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customised to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern network infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analogue to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 metres. The products have been used recently to transition a series of cruise ships from analogue to IP video without having to replace cabling and spending only two days in dry dock for the installs. A new focus away from AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
Unlike private sectors, the government-run offices or buildings are the places where people constantly visit for specific purposes, making these official institutions easily become a target for tempted malicious attack by people who might possess strong and negative emotions toward the governments. Despite the fact that these buildings are often guarded with more security staff with arms, it is even more than necessary to set up a solid surveillance system to proactively safeguard the public and its assets. Surveon provides government solutions with product lines including weatherproof cameras with excellent image quality, patent RAID NVRs with spare drive protection, and feature-rich VMS with post VA search. These powerful solutions enable the governments to protect people from most of the threats. Weatherproof cameras with smart WDR Surveon cameras secure the outer spaces of government building with IK10 vandal proof and IP66-rated weatherproof housingTo build a reliable security system for governments, SIs might encounter some challenges such as harsh outdoor conditions and data protection of recorded video. Under these circumstances, Surveon cameras secure the outer spaces of government building like parking lot with IK10 vandal proof and IP66-rated weatherproof housing, giving partners the most reliable outdoor-use option. Moreover, all of Surveon cameras provide excellent image quality with smart WDR, allowing the security guards to recognise crucial details such as license plates even under lighting contrast and prevent any suspicious vehicle from entering. Patent RAID NVR with data protection To avoid the loss of confidential data from surveillance system, the data protection of recorded video is particularly important in terms of planning for government security. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video loss. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video lossBesides, its client-server architecture can offer high I/O, large capacities, and overall system stability. To quickly identify useful information and relative footage from hundreds of hours of video recording, Surveon designs Post VA Search, an efficient management tool, reducing the time and efforts of management staff, making the surveillance system more efficient. Enhancing security system Surveon government solutions have been successfully safeguarded the customs building in Bolivia, the post offices in Cairo, and the border checkpoint in Turkey. “Surveon provides the best C/P value solutions for the customs and improves its whole security system with high-reliability products. We are satisfied with the result and I’m sure we will keep choosing Surveon’s solutions in the future projects,” said VisionLine, Surveon’s major partner in Bolivia. Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects.
Season-ticket holders at Belgian football club RWD Molenbeek will soon find it easier to enter the stands at their stadium, thanks to facial recognition technology that is set to be introduced at the turnstiles. Although the project is still in the test phase, fans ordering their season tickets on-line can already upload an ID photo. This photo will be compared in real time with images taken by two cameras installed in the season-ticket holders’ queue at the stadium entrance, allowing supporters to enter much faster. An automatic gate will be installed in early 2019. Data processing facility Spectators who have forgotten their paper ticket can still enter the stadium with no problem. Those who haven't uploaded a photo, or who have borrowed an entry ticket, will still have to pass through the conventional gates and show their ticket at the turnstiles. The system was installed by Zetes using Panasonic facial recognition technology. The detection system, with its fast and reliable data processing facility, means we can install a system to speed up entry checks to the stadium" The facial recognition software applies only to the access checks, as a further benefit for season-ticket holders. Thierry Dailly, chairman of RWDM, explains: “The detection system, with its fast and reliable data processing facility, means we can install a system to speed up entry checks to the stadium.” Alain Wirtz, CEO of Zetes, adds: “This project is a perfect example of how we can benefit from the innovative capabilities provided by the Panasonic group, owner of Zetes. Zetes specialises in this identification technology, which has many different applications. We hope this project can act as a shop window for our products.” The pilot project will run for about a year. Guaranteeing confidentiality Supporters’ photos are scanned and stored on an RWDM server, which is not connected to the Internet or to any other system. Only RWDM-authorised personnel have access to the data. Data collected by the entrance gate cameras is not recorded, guaranteeing confidentiality for the supporters. At this stage, the system is still in the test phase, and the facial recognition facility is not yet fully operational. The installation of the automatic gate at the beginning of 2019 will complete the planned programme. 2017 April, Panasonic acquired a majority shareholding in Zetes and 2017 July completed the acquisition of 100% shares of Zetes. Zetes was founded in 1984, and employs 1100 employees in 21 countries in EMEA in 2016. Its headquarters is in Brussels.
Denmark’s Evotec chose Idesco readers to complete their cargo securing system they had designed for transport companies’ vehicles. Evotec’s system does more than merely preventing cargo theft. Drivers also feel more secure when delivering because hijack risks are also reduced. This is because cargo is robustly secured when drivers leave vehicles behind. Idesco 8 CD 2.0 DESFire readers Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles Danish cargo companies had been struggling with regular delivery cargo thefts. Drivers did not feel secure when delivering and financial losses were growing. Evotec decided to develop a novel vehicle security solution for cargo companies. As part of their solution, Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles. Idesco readers have since been installed on several hundred Danish cargo trucks and vans. Early in their design process, Evotec had seen a clear need to strictly limit access to vehicle’s cargo space to authenticated personnel only. They had known RFID technology could provide accurate, secure user identification and authentication. They learned that Idesco’s MIFARE DESFire readers, paired with 128-bit AES-encrypted DESFire transponders, would easily repel transponder hacking or cloning. Best of all, they learned Idesco designed many of its readers for installing outdoors, reliably resisting impacts, moisture, dirt and temperature extremes. Security Key Management service Idesco’s Security Key Management service saved Evotec extensive time and resources"Bo Schønning, Evotec Aps CEO, described the subsequent cooperation of Idesco with his company, “We got great assistance in choosing the correct solution for our system”. In addition to coded readers, Evotec ApS also subscribed to Idesco’s convenient Security Key Management Service for ensure compatibility with every vehicle’s readers. Since DESFire demands readers and transponders be encoded with matching security keys, Idesco’s Security Key Management service saved Evotec extensive time and resources, freeing them to focus exclusively on installations for their customers’ vehicles without worrying about managing DESFire keys themselves. “We feel safe when Idesco handles this data for our customers”, says Bo Schønning. The cargo drivers of Evotec’s customers are assigned vehicle specific transponders to carry, which open the cargo space when presented to the reader guarding it. For increased security, the driver cabin locks automatically when the cargo space unlocks. Additionally, cargo doors automatically lock when they close and will remain locked when the vehicle’s engine is running. The system works equally well in vehicles equipped with liftgates. Opening the vehicle’s driver cabin with the ignition key doesn’t affect its cargo space: it remains continuously locked. If needed, a vehicle’s cargo space could be opened remotely via fleet management software. If a transponder is stolen, a vehicle’s readers can be reprogrammed to not recognise the transponders. Fleet management and vehicle tracking Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes. The fleet software’s online tracking and route reporting also provides cargo companies a powerful fuel control ability that can reduce fleet costs. “This system has significantly increased drivers’ security at work while reducing costs caused by theft”, notes Bo Schønning, CEO, Evotec ApS. “Fuel costs have also been reduced, as the cars aren’t left idling anymore. It is easier to control the fleet, and our customers can also follow the quality of deliveries with this system”, he continues.” RFID technology Founded in 1989, Idesco is an experienced company in the field of RFID technology. From the very beginning, Idesco was a pioneer in using RFID, deploying it for identification in industrial applications. Down through the years Idesco continued expanding its reputation as a pioneer provider by innovating numerous technological alternatives and multiple technologies for a variety of different application areas. Every day, Idesco devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory control systems.
Teleste Corporation reveals that its S-AWARE platform has been selected by Helsinki City Transport to drive improved situational awareness and safer travelling across the Helsinki metro system. The deployment of the platform will be started in 2019 and the project will be carried out in several phases and be completed at the end of the year 2020. The total value of the deployment will be more than two million euros. “We are delighted to expand our long-term cooperation with Helsinki City Transport on developing smart and safe public transport in the Helsinki metropolitan area. The rapidly growing urbanisation challenges public transport operators throughout the world to find solutions that can provide enhanced operational control and tools to increase safety in public places. Adding situational awareness through intelligent public transport systems is one of the key methods the operators can use to reach the target,” stated Esa Harju, Head of Teleste’s Video Security and Information Business unit. Prioritizing passenger safety Every year, over 80 million passengers and commuters enjoy travelling in the system, which forms the northernmost metro in the world During recent years, the Helsinki Metro has undergone several upgrades and major extensions. Today, it includes more than 20 stations in Helsinki and its neighbouring cities and serves the capital region of Finland with hundreds of thousands of daily rides. Every year, over 80 million passengers and commuters enjoy travelling in the system, which forms the northernmost metro in the world. Keeping the safety and security of the passengers and the entire metro system in mind, Helsinki City Transport is adopting Teleste’s S-AWARE platform to develop their response capabilities and to ensure a high service level, e.g., during possible security failures, alerts and states of emergency, as well as in other complex or critical situations. Safe and attractive travelling experience “Helsinki Metro is being developed to bring seamless mobility to the growing metropolitan area. At Helsinki City Transport, our mission is to continue building an increasingly effective and highly functional metro system that provides a safe and attractive travelling experience for our customers in their everyday life,“ told Ville Lehmuskoski, CEO, Helsinki City Transport. Teleste S-AWARE platform has been designed to help enhance efficiency, safety and security in public transportation, airports, critical infrastructure The Teleste S-AWARE platform has been designed to help enhance efficiency, safety and security in public transportation, airports, critical infrastructure and in the governmental sector. The platform works by collecting real-time information from various subsystems, data sources and sensory inputs, and it displays a unified and real-time view of the whole operational infrastructure. This provides for the improved understanding of what is happening in the surroundings and creates grounds for sharp and efficient decision-making. Smart incident management In addition, the platform can be used to pre-define automated operating procedures for efficient and smart incident management, hence ensuring that corrective action is immediately taken when unexpected incidents occur. The advanced reporting, debriefing and training tools ensure that the system can be used to project future events and be prepared for exceptional situations. Teleste’s deployment to Helsinki City Transport will also enable efficient use of the system for multiple other operators, including the police, fire and rescue forces, Helsinki Regional Transport Authority, and the cities of Helsinki and Espoo. Delivering the right information to the right people at the right time, the system is harnessed with high information and data security that guarantees protection from any unauthorised access.
Premier League football club Everton FC has deployed SureCloud’s GDPR suite to manage and monitor its data and GDPR compliance, enabling the club to work towards GDPR compliance, optimise internal processes and position it strategically for the future. The solution replaced Everton FC’s manual data mapping and processing methods. Manual data mapping and processing Everton FC’s databases are extensive, containing details on over 32,000 season ticket holders and over 600,000 registered fans, with details on around 360 employees, players, agents, suppliers, and individuals associated with the club’s community charity and partner school. Much of this information is sensitive. This data and all of the processes associated with it were being manually managed and tracked in a series of Excel spreadsheets. With multiple requests and queries to respond to every day, the club’s Data Protection Officer was struggling to record and manage smaller ad hoc queries, incidents, and tasks. With GDPR due to place much tighter restrictions on how the club processed, managed and shared its data – as well as on the reporting of any incidents that did occur – the club needed a more comprehensive and reliable tool in place before 25th May 2018. SureCloud platform The club approached its long-standing IT support provider NCC to find a solution. NCC recommended the SureCloud GDPR Suite, delivered on the SureCloud platform. After SureCloud had successfully demonstrated the ability to provide full visibility for management and automation of GDPR processes across the organisation, Everton FC selected its cloud-based suite of solutions. Two dashboards were created according to Everton FC’s specific needs Two dashboards were created according to Everton FC’s specific needs: one to show all data mapping and transfers, including where data is being held and who it is being shared with; and one showing incidents and requests, including a subject request register and incident tracker path. This gives an immediate overview of which requests are still outstanding, such as a request for an individual’s personal information to be erased from the database. SureCloud GDPR Suite The five applications Everton FC chose to deploy from the SureCloud GDPR Suite were: GDPR Program Tracker - to enable the club to map all its disparate data and workflows using intelligent risk-based questions GDPR Management – to provide all mandatory GDPR business-as-usual processes Information Asset Management - to record and maintain the club’s entire data inventory Compliance Management for GDPR - to help Everton FC speed up their process of attaining compliance and on-going real-time risk remediation Incident Management for GDPR – to meet the GDPR requirement to log, track and notify the ICO of any data breaches, should an incident arise Ian Garratt, Data Protection Officer at Everton FC said: “The penalties for not achieving GDPR compliance are severe – up to 4% of our revenues, or €20 million. It was imperative that we got a solution in place that could not only help us achieve GDPR compliance but would also make it quick and easy for us to demonstrate that compliance at any point, on request. SureCloud’s GDPR Suite fit the bill.” Centralised data management Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralised system “We are now tracking and recording every single data request in a centralised way. With NCC’s support, SureCloud’s solution has brought a comprehensive clarity to our data processing that was impossible to achieve with manual spreadsheets. The system is so intuitive; it has helped us streamline multiple processes and undertake impact assessments that we couldn’t handle before.” Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralised system. All changes and requests are automatically tracked so that activity records and data audits can be produced at the click of a button. Should an incident like a suspected data breach occur, it is identified and reported immediately and automatically. The club’s data protection team can select which asset has been affected and immediately determine the severity of the incident and whether it needs to be reported to the ICO. Should it need to be escalated, the report is available instantly. Data processing, documentation and risk management Ian Garratt added: “The SureCloud GDPR Suite isn’t just a compliance tool; it’s a comprehensive management tool. We now have a continuous, real-time status of where we are and what we need to be doing in terms of data processing, documentation and risk management. It would have simply been impossible to achieve this manually. SureCloud has not only helped us to work towards GDPR compliance they have optimised our internal processes and positioned us strategically for the future.” In addition to deploying five applications within the GDPR suite, SureCloud is currently adapting its Incident Assessment tool to meet Everton FC’s specific requirements.
Videowall technology supplied by Ultimate Visual Solutions (UVS) is at the heart of a new security control room at iNTU Trafford Centre. High-end videowall technology The new facility helps ensure 30 million annual visitors have a safe and enjoyable time at what is the single best-known and most iconic retail and leisure destination in the UK. Burnley-based UVS, formerly eyevis UK, provides video wall displays and audio-visual solutions to a range of clients across the UK. UVS Full HD Videowall As part of the new state-of-the-art facility, UVS installed a 7.2m wide by 2.7m high videowall As part of the new state-of-the-art facility, UVS installed a 7.2m wide by 2.7m high videowall, made up of 24 eyevis 55-inch XSN extremely narrow bezel LCD screens with Full HD resolution. The displays offer 1920 × 1080 pixels, direct-LED backlight technology, a mechanical bezel width of only 3.5 mm between two displays and a brightness of 500 cd/m2. The installation also includes a control room meeting space featuring a videowall made up of four eyevis 46-inch XSN screens with 3.5mm bezel. Netpix 4900 videowall controller Both videowalls connect to a Netpix 4900 videowall controller configured for multiple analogue video feeds, IP video feeds, graphic PC data and web browsers. iNTU security staff, who monitor the centre and liaise with visitors, will be able to send live videos from their tablets directly back to the video wall to share incident video with security staff. Video monitoring and visitor management iNTU Trafford Centre is a retail and leisure destination and it is important that the control room has the latest videowall technology" UVS managing director Steve Murphy said: “iNTU Trafford Centre is a retail and leisure destination enjoyed by millions of people each year and it is important that the control room has the latest videowall technology.” He adds, “We are delighted to have been involved in such a prestigious and important project.” Lee Barlow, Security Manager, iNTU Trafford Centre said “The security and safety of our customers, retailers and staff is our number one priority so having a control room that allows us to keep them safe is really important. The new videowall and meeting room screens allows us to do just that and we are really happy with them.” New control room with videowall The new control room was designed and refurbished by Intech Solutions, which specialise in technical and control room furniture including full control room fit-outs in the UK and worldwide. UVS also worked to deliver the videowall with its security integrator partner, Nottinghamshire-based Quadrant Security Group.