Allied Universal, renowned security and facility services company in North America, has announced the acquisition of Cypress Private Security, LP - a San Francisco-based company offering comprehensive security services. Terms of the deal were not disclosed. Manned guarding “Cypress Private Security is a company that we have long admired and always wanted to partner with,” said Steve Jones, CEO of Allied Universal. “This security company has built a brand and a culture t...
MOBOTIX cameras and solutions rightly have a reputation for being particularly cyber-secure. MOBOTIX customers all over the world trust the reliability of products developed and manufactured in Germany to protect their images and analysis data from unauthorised access and to prevent an insecure interface from offering hackers an opening. The hard work pays off, as evidenced by the fact a MOBOTIX camera has never been hacked. “We are constantly working on identifying possible security gaps...
LOCKEN’s latest innovation in cable free access control, powered by contactless technology, wins certification from health & safety regulator ATEX, in accordance with new explosive atmosphere requirements. Approved to ATEX II 2 G Ex ib IIB T4, the solution is suitable for gas delivery and regulation stations, specific hydrocarbon processing and distribution infrastructures and chemical factory enclosures. It is also suitable for areas where an explosive mixture of gas, vapour or mist...
Forescout Technologies, Inc., the pioneer in device visibility and control, announced insights from 75 real healthcare deployments with more than 10,000 virtual local area networks (VLANs) and 1.5 million devices contained within the Forescout Device Cloud, with a specific focus on 1,500 medical VLANs with more than 430,000 devices. Launched in July 2017, the Forescout Device Cloud is one of the world’s largest crowdsourced device repositories and now contains more than eight million devi...
Mobile security provider Trustonic announces a partnership with Rubean AG, an established mobile security-focused fintech, and CCV, an European payment solution provider, to develop an mPOS solution that accepts higher value transactions by enabling hardware-protected PIN entry on a range of commercial off-the-shelf (COTS) smartphones. Using a smartphone as a mobile point of sale (mPOS) solution enables traders, small retailers and SMBs to save money on costly payment acceptance hardware, impro...
Specialist provider of tech and cyber-security staffing solutions, La Fosse Associates, launches a first-of-its-kind pro bono recruitment and advisory practice to help charities combat the threat of a cyber-attack on their organisations. La Fosse Pro Bono will operate with charities throughout the UK. In 2018, one in five UK charities fell victim to a cyber-attack and the number is expected to continue in line with the size of the sector itself. Indeed, latest figures show there are 200,000 reg...
Allied Universal®, a security and facility services company in North America, announces the launch of HELIAUS® – an advanced artificial intelligence platform designed to improve safety and reduce risk by enhancing on-site guarding services. “We developed HELIAUS® to deliver better results for our clients through advanced workflow automation, robust data capture and visualisation, and artificial intelligence that understands not only what’s likely to happen, but what to do to drive better outcomes,” said Steve Jones, CEO of Allied Universal. “Now, our security officers are better equipped to help reduce incidents, respond faster to emergencies and provide unmatched operational performance accountability.” Dynamic workflow automation The main significance of HELIAUS® is to bring together rich data, artificial intelligence, location-aware workflow automation, and seamless user experience design for security professionals. This new tech solution provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and through dynamic workflow automation, ensures that those recommendations are implemented. The AI uses this information to understand what's likely to happen at a client's site regarding safety" “HELIAUS® also offers an advanced approach to location awareness that uses a combination of GPS, bluetooth beacons, and near-field communication (NFC) tags to quickly and accurately capture real-time location information both indoors and outdoors,” said Mark Mullison, CIO for Allied Universal. “The AI uses this information to understand what's likely to happen at a client's site regarding safety and security incidents and then automatically suggests workflows to our security professionals that drive better outcomes, thus reducing accidents and crime.” Increasing situational awareness In addition, this new workforce management technology brings sophisticated data visualisation capability to allow security operators to understand the who, what, where and when both in real-time and historically, which increases situational awareness and helps users develop powerful insights. “HELIAUS® represents a tremendous step forward in building AI technology that is not just smart like humans, but smart with humans,” said Mark Mullison, CIO for Allied Universal. “When it comes to safety and security, our goal is to deliver at the highest level.” This new smart technology is not just a reporting or incident management system but also an all-encompassing, adaptable workforce management solution to better protect people, brands and assets.
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment, is introducing a new 12-port Gigabit managed Layer 2 switch that includes two 10GigE uplink ports designed for high-bandwidth usage requirements such as smart cities and connected vehicle applications. Network protection The CNXE2GE2TX8MSPOE managed Layer 2 switch features eight dedicated 10/100/1000BASE-T(X) RJ-45 ports compliant with IEEE802.3af/at PoE, two dedicated 100/1000/2.5GBASE-X SFP ports and two dedicated 1000/2.5G/10GBASE-X SFP ports. Power over Ethernet (PoE) compliant with IEEE802.3af/at, is provided on the eight copper ports The switch is designed to protect the network on which it is being used, offering multiple redundancy protocols to keep the network free from points of interruption. Power over Ethernet (PoE) compliant with IEEE802.3af/at, is provided on the eight copper ports. The PoE ports are capable of delivering 30 watts of power to all eight copper ports. 10 Gigabit Ethernet According to Andrew Acquarulo, ComNet CEO and President, “the decision to expand our current switch offering was an easy one. As the demand for ComNet products increases worldwide, being able to provide a more diverse product offering became evident. “ “We’ve seen it over the many years we’ve been manufacturing Ethernet products. Fast Ethernet, Gigabit Ethernet and now 10 Gigabit Ethernet. Whatever the throughput standard, ComNet will lead in the commercialisation for the markets we compete in,” Acquarulo concluded. Megapixel and HD cameras High-bandwidth applications are getting more prevalent. With the use of higher definition and megapixel cameras being used and more and more locations under surveillance (Smart Cities), these 10Gbps switches are being called out for use in many more installations. Developing this switch will continue to differentiate us from our competitors"ComNet has always tried to stay ahead in product development and the CNXE2GE2TX8MSPOE is another example. ComNet has always enjoyed an advantage for use in commercial and government markets due to the wide product offering of USA-made products. ComNet products such as the CNXE2GE2TX8MSPOE are warrantied for life. ComNet IP transmission products “ComNet’s goal from day one has been to be a smart and secure choice for transmission products. Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be,” said Skip Haight, ComNet VP of Marketing. “Developing this switch will continue to differentiate us from our competitors,” Haight continued. ComNet, part of ACRE, offers an extensive line of fiber optic, copper and wireless video and data transmission equipment that is uniquely designed to meet the needs of the security, intelligent transportation system, utility and industrial markets.
Visitors to the 2019 edition of Secutech Vietnam will have plenty of opportunities to gather market intelligence, thanks to the introduction of the new ‘Smart Factory Conference’ to the show’s fringe programme. As the region’s leading trade fair for the security, fire safety and smart building sectors, the fair provides a programme of educational events that cover technological trends, government regulations and industry outlook. Smart factory systems “Vietnam’s Smart Factory market is on an upward trajectory,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “Newly built manufacturing facilities are being integrated with smart factory systems and there is also a need for ageing manufacturing infrastructure to be upgraded with smart solutions. For this reason, there is a growing appetite for information among prospective buyers which we hope the Smart Factory Conference will fulfill. It will be especially useful for investors, owners of industrial parks, consultants, contractors, architects, suppliers and government officials.” Vietnam’s manufacturing base is gradually moving towards industry 4.0, an automation trend of connected devices, IoT and AI Vietnam’s manufacturing base is gradually moving towards industry 4.0, an automation trend of connected devices, the internet of things, artificial intelligence and cloud computing. Against this backdrop, speakers at the Smart Factory Conference will demonstrate how factories that use new technologies to automate processes such as production and energy management can become more efficient and cost effective. Intelligent video solutions Another discussion point will be intelligent video solutions. With a focus on video analytics, access control and production surveillance, conference speakers will explain how both factory security and production efficiency can be improved. In addition, there will be an exploration of government regulations and the most up-to-date fire safety systems, including alarms, detectors, fireproof materials and extinguishing systems. Smart access control systems Besides the Smart Factory Conference, visitors to Secutech Vietnam 2019 will be able to benefit from two other elements of the fringe programme. The Fire and Industrial Safety Seminar will cover best practices and solutions for disaster prevention in buildings and industrial settings The Fire and Industrial Safety Seminar will cover best practices and solutions for disaster prevention in buildings and industrial settings. Meanwhile, the Smart Hotel Seminar will update attendees on solutions that improve hotel management and guest experiences, including energy and building management platforms and smart access control systems. Market intelligence platform The Smart Factory Conference is jointly organised by Houselink JSC, Messe Frankfurt New Era Business Media Ltd and Vietnam Advertisement & Fair Exhibition JSC. Houselink JSC is Vietnam’s first developer of an online e-bidding and market intelligence platform for the construction market. The conference will take place on 15 August at Secutech Vietnam 2019, which runs from 14 – 16 August at the Saigon Exhibition and Convention Center. In 2018, the fair set new records, attracting over 13,800 buyers (2017: 12,097) and 310 exhibitors from 20 countries and regions (2017: 270).
Check Point Research, the threat intelligence arm of Check Point Systems Inc., has announced the creation of a new online vulnerability repository, CPR-Zero. Going forward, Check Point will publicly list all vulnerabilities its research teams find, even if they are not featured in a publication on the Check Point Research blog. The move makes Check Point the industry’s largest cyber security vendor to openly share such vital information online. CPR-Zero vulnerability repository "Not every vulnerability that we find leads to a blog post or publication. In fact, most do not,” said Omri Herscovici, Head of Vulnerability Research at Check Point. "This is why it’s important for us to share our findings using the CPR-Zero platform. The information listed on CPR-Zero will be a priceless resource for citizens and enterprises everywhere to be more informed and vigilant against the latest cyber-security threats.” CPR Zero has initially launched with over 130 vulnerabilities and will quickly expand to offer a comprehensive library of all vulnerabilities that Check Point’s research team has uncovered, both historic and in the future. CPR Zero lists CVEs with links and references for viewers to learn more from the official CVE database. The list also contains detailed information regarding each vulnerability, including a crash and dump, a short explanation and sometimes a POC. Enhanced cyber security Check Point’s mission is to make the online world a safer place to live in" The repository will be continually updated with new discoveries. However, Check Point reserves the right to not publicly disclose major vulnerabilities that may be at a high risk of being exploited before patches or updates are widely available. "Check Point’s mission is to make the online world a safer place to live in. To help us further get there, we are making the bold move to be the largest cyber security company in the industry to share ALL our technical CVE findings with everyone," said Neatsun Ziv, VP of Threat Prevention. “No other cyber security company of our size has taken this step." Greater customer and enterprise security Built by some of some of the most talented and capable experts in the field, CPR Zero is Check Point’s latest initiative in responsibly notifying both consumers and enterprise organisations of new cyber-security risks, as well as encouraging vendors to take the necessary steps to continue to provide a risk-free user experience.
Percepto, the provider of autonomous industrial drone solutions, launches the next generation of its AI-powered autonomous industrial Drone-in-a-Box (DIB). Available now, the solution includes a highly portable, smaller, lighter-weight and extreme weather resistant base station. Adding field-proven 5G compatibility, the new DIB also features seamless integration of 2D mapping and 3D modelling, highly customised reporting, comprehensive compliance and enhanced safety functions. The award-winning DIB solution provides constant aerial visual insights. It enables organisations operating around the world in the mining, energy and industrial, oil and gas, ports and terminals sectors, to optimise their security and business operations, whilst reducing risks and operational costs. Launched at IFSEC International in London, the new next-generation Percepto solution provides many significant upgrades and new features. Promising complete protection New features enable constant site scanning and pile inspection for better inventory management At only 166(W) x 162(D) x 168(H) and 162kg, the smaller and lighter weight (162 kg) Percepto Base makes it even easier to transport, deploy and manoeuvre units into position, in order to schedule and manage a wide range of surveillance, mapping, inspection and maintenance missions. The entire DIB solution is protected by high levels of extreme weather resistance, with the new Percepto Base achieving an ingress protection rating of IP65, which promises complete protection against contact with moving parts inside the enclosure and against the ingress of dust. New features enable constant site scanning and pile inspection for better inventory management. Fully integrated data dashboard created automatically upon mission completion as well as customised reporting for pile inspection and change detection. In addition, the new Percepto DIB solution is powered by the PerceptoCore Software suite which now includes new highly customisable reports to translate aerial data from Sparrow drones to actionable insights. Each stakeholder operating on-site received aerial insights relevant to his/her field of interest. With 5G networks being switched on around the world, Percepto is pioneering the autonomous drone market by adding 5G compatibility to its latest version. In April 2019, the company revealed that it had successfully proven the ability to fly autonomous drones over SK Telecom’s (the largest mobile operator in Korea) 5G trial network. The Percepto Solution has always adhered to the most stringent global regulatory compliance requirements. In order to provide even greater levels of safety and to protect the Sparrow drone in the highly unlikely event of malfunction, units can now be equipped with an integrated parachute. Another additional safety enhancement feature is the ability to lock accurate drones’ position in case of loss of GPS. CEO of Percepto, Dor Abuhasira, states: “Percepto has a reputation for being first to market with innovations that become adopted as the gold-standard for autonomous drone functionality and operation. With the launch of our next-generation DIB solution we have raised the bar once again, when it comes to safety, and customised value for variety of our customers.”
Dahua Technology, a video-centric smart IoT solution provider, announces the addition of the new StereoVision camera: a 3MP dual-sensor, people-counting camera that incorporates Artificial Intelligence (AI). The camera uses advanced image processing technology for improved depth perception to count people with up to 98% accuracy. The close, side-by-side positioning of the StereoVision camera’s dual lenses allows each sensor to capture images of the same area from slightly different angles, resulting in higher depth perception. The camera then combines real-time people-counting and behaviour analytics with video images. By unifying video surveillance and operational capabilities in one device, the camera helps users make more business operations decisions more efficiently. People-counting cameras Retail environments, museums, sports venues, or other areas where AI can be used to keep track of headcount can all benefit from the StereoVision camera. The camera can monitor capacity during crowded events, send an alert when entry or checkout lines become long, and help reduce loitering by notifying users when visitors idle for a specified period of time. The camera can easily integrate with regional people-counting cameras to give users a better understanding In addition to counting those who enter and exit a location, the camera can easily integrate with regional people-counting cameras to give users a better understanding of how people move throughout the area. “In a retail environment, the StereoVision camera arms managers with valuable information to improve customer service and make merchandising decisions,” adds Jennifer Hackenburg, senior product marketing manager for Dahua Technology USA. “It can gauge areas of interest for product positioning, or measure foot traffic at mall entrances to identify prime retail space, for example.” Wide dynamic range The camera can also analyse data to improve customer conversion rates, such as count the number of people who walk past a store and then compare the data to the number of sales generated. Other features of the camera include a built-in microphone, an onboard SD card slot to store video at the edge, and Dahua Technology’s proprietary Smart H.265+ codec, which saves up to 90% on bandwidth and storage compared to H.264. A low lux level of 0.009, digital wide dynamic range, and Smart IR up to 33 feet ensure reliable performance in low-light, low-contrast, and bright scenes. “Dahua Technology is pleased to present this high-performing AI solution made for business intelligence,” Hackenburg remarked. “By offering cameras that can go beyond basic security, we are able to empower dealers to grow their business by providing their customers with a higher ROI for their security spend.”
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT global market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-expanding edge devices market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralised cloud computing and even coins the phrase, “Cloud computing, decentralised” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost efficiency of edge processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilising edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilising edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratisation of AI in the IP camera market. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding the global IP camera market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analysed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-processor-enabled video analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time Microprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognise how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast processing for rapid response at city level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyse traffic situations Quick local decisions on the video cameras are also used to help analyse traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-time HD video monitoring and recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-gen IP cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognised in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyse the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalisation. Each camera at the edge can be personalised to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recogniser on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI at the edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
The threat of drones is a growing concern around the perimeter and in the airspace surrounding airports. According to a UK Airprox Board report, the number of times a drone endangered the safety of an aircraft in the UK airspace rose more than a third in 2018 compared to the year before. The highest-profile recent drone incident was at UK’s Gatwick Airport, where a drone sighting last December triggered a three-day shutdown of the UK’s second busiest airport, disrupted the travel plans of 140,000 people and affected 1,000 flights. Unauthorised drone activity And there have been other recent incidents of drone disruptions at airports: At Heathrow Airport in January 2019, flights were temporarily stopped for about an hour ‘as a precautionary measure’ after a drone was reported. The UK Airprox Board recorded 39 dangerously close drone encounters at Heathrow in 2018. In the U.S., flights into Newark Liberty International Airport were disrupted for about 90 minutes in January after a drone sighting. Dubai International Airport, the world’s busiest for international travel, closed its airspace for about 30 minutes in February due to suspected unauthorised drone activity. In March and again in May, air traffic at Frankfurt Airport in Germany was grounded due to drone sightings – for about 30 minutes in the first instance and about an hour in the second. Drone detection systems Security has a role in preventing drone incidents, although pilots often report them Security has a role in preventing drone incidents, although pilots often report them. At Gatwick, the initial reports of a drone over the airfield came from airport security officers. After the incident, the UK government rushed through legislation to enlarge the drone exclusion zones around airports to a maximum of 5 km (up from the previous 1 km). In the U.S., the exclusion zone around airports is a radius of about 5 miles, and even more in sensitive areas such as the National Capital Region around Ronald Reagan Washington National Airport, where restrictions are 15 to 30 miles. Airports in the U.S. are allowed to deploy drone detection systems but may not use counterdrone technology (such as shooting down the drones), which is reserved for the Justice Department and Homeland Security. Dedicated new technology “News that drone threats to aircraft are increasing should come as no surprise,” says Simon Barnes, Business Development Manager – Airports Europe for Genetec. “Recent reported incidents are just the tip of the iceberg. As drones become increasingly ubiquitous – both from hobbyists and their growing use in professional arenas – we can expect to see many more incidents.” From speaking to airports across the world, Barnes has learned that two of the most pressing challenges they face are how they secure their perimeters (as intruders become increasingly sophisticated) and identifying ‘Friend from Foe’ as operational needs must be maintained. “When it specifically comes to drone detection, the short-term temptation can be to introduce a dedicated new technology to address this specific threat,” he commented. More comprehensive response We need to work with technology, not against it, in order to ensure public safety and security" “However, the last thing a functioning airport needs is an independent system that isn’t unified with all of the other security measures in place. Only when the data from all of these inputs is visualised in one place can an airport begin to make sense of its environment and enable a fast and efficient response to evolving challenges such as the insider threat and malicious drone activities. We fully expect airports to respond to this changing landscape, to help ensure a more comprehensive response.” Philip Avery, Managing Director of Navtech Radar, adds: “In today's current climate of increased national threats, we need to work fast to keep up with modern risks. However, creating new, complicated laws open to misinterpretation or enforcing a complete ban on privately owned drones seem like Luddite solutions that undermine the potential of innovative technology. We need to work with technology, not against it, in order to ensure public safety and security.” Help mitigate risk Navtech Radar sells the AdvanceGuard system for drone detection. Tavcom Training, part of the Linx International Group, has responded to requests from the security industry for expert training in order to be better prepared for and mitigate against the threat of Unmanned Aerial Systems (better known as drones). The company offers a two-day Drone Detection classroom-based course for £375+VAT. Our drone detection course gives security professionals advice from experts" “The responses to the [recent] airport drone attacks were played out in the spotlight, with much public debate regarding the seeming lack of a pre-defined plan of action to prevent or contain such an incident,” explains Sarah Hayward-Turton, Sales and Marketing Director at the Linx International Group. “Our drone detection course gives security professionals advice from experts in drone technology, to help mitigate risk and implement countermeasures to thwart unauthorised drone activity.” The course will be offered again in November 2019 and in February 2020.
While most security teams are focused on preventing malicious outsider attacks, recent data suggests that close to 30 percent of confirmed breaches today involve insiders. Today’s increasingly complex networks across physical, information technology (IT) and operational technology (OT) systems make it difficult for security teams to detect and prevent insider threats. This is compounded by the proliferation of data, devices, applications, and users accessing networked resources. Rising insider malicious attacks threat As the threat landscape evolves rapidly, CISOs need to step up their game According to the 2017 U.S. State of Cybercrime Survey, 50 percent of organisations experience at least one malicious insider incident per year. And the Verizon 2018 Data Breach Report found that close to 30 percent of confirmed breaches today involve insiders. In August 2018, a tragic crash involving a Seattle airplane stolen by an employee raised awareness for the need for physical insider threat awareness (as well as more psychological screening before employment). As the threat landscape evolves rapidly, CISOs need to step up their game, says Aamir Ghaffar, Director of Solutions Engineering at AlertEnterprise. They should implement security controls that protect their company’s people, physical assets, data, intellectual property, and reputation both inside and out. And they need to do it while simultaneously satisfying industry compliance requirements. In response to our questions, Aamir Ghaffar offered some additional insights on the timely topic of insider threats. Q: We are hearing discussion about the emergence of cyber-physical security systems. What are they and how do they help organisations address insider threats? Threats now originate not only in the physical space but also in cyber environments Ghaffar: The concept of convergence has evolved in response to risk and the overall threat landscape. Threats now originate not only in the physical space but also in cyber environments – this is what is commonly referred to as blended risk. These blended risks require a converged approach and a converged view of security as a whole; connecting data, building new capabilities and gaining new insights to allow security teams to better defend against attacks. Q: How are organisations responding? Ghaffar: They are shifting towards centralisation – from the security operations center all the way to the executive level, where one C-Suite executive manages all security across physical, IT and OT domains. According to Gartner by 2023, 75% of organisations will restructure risk and security governance to address new cyber-physical systems (CPS) and converged IT, OT, Internet of Things (IoT) and physical security needs, which is an increase from fewer than 15% today. Q: How does the shift impact insider threats? Ghaffar: Unifying cyber and physical unlocks powerful new capabilities. For example, cyber-physical teams faced with a threat such as an intrusive device planted within their network environment, can quickly connect the cyber footprint to a physical location – understanding where the threats originate and identify those responsible for bringing it in. Converging physical and cyber identity through platforms that connect physical access control, IT and OT systems is an example of how organisations can better prepare for blended security threats An AI-enabled automated system is the most practical and human error-proof solution today Q: How is AI being used to protect against insider threats? Ghaffar: With increased security convergence we are now collecting such a large volume of data that relying on manual detection of insider or external threats is no longer a viable solution. An automated system, powered by artificial intelligence used with digital identities, is now the most practical and human error-proof solution today. AI and machine learning (ML) technology helps organisations map complex patterns of user behavior, process tens of millions of events within seconds to detect threats in near-real-time and respond swiftly. This benefits security operations personnel to go from distraction to action, allowing them to focus on what really matters, which are their most critical security events. Q: Sometimes the threat is about human error. Oftentimes we think the most harmful insider threats are intentionalGhaffar: Oftentimes we think the most harmful insider threats are intentional; however, unintentional user behavior and negligence could have serious ramifications for an organisation. Organisations should deploy technology that delivers automation and active policy enforcement to prevent employees from making inadvertent yet critical errors. Organisations should also do regular risk assessments – not one and done. Don’t implement a process and think you’re secure. Automated identity and access management technology can provide scheduled access reviews to help detect high-risk user profiles with accumulated or a toxic combination of access, as well as segregation of duties violations due to department change or job transfers. Q: What are the biggest misconceptions about insider threats? Ghaffar: First, that the biggest threats originate outside my company. Or that insider threats are a problem for government agencies and highly sensitive organisations, not “regular” companies like us. A company may also mistakenly think that they have limited assets that could be exposed, or that the assets are of little value; therefore, a large-scale breach is less likely to happen. And even if it does, it probably won’t have a big impact. Risk management leaders should start by developing a compelling visionQ: So, they think “it can’t happen here.”? Ghaffar: Yes, and they think their employees are inherently trustworthy, and that with basic security measures in place, the risk is small. They think that insider threats are always intentional. Or they think “it’s not my job.” Q: What next steps should security leaders take in addressing insider threats in their organisation? Ghaffar: Security and risk management leaders should start by developing a compelling vision and strategy that will resonate with key company stakeholders. They can expand the visibility they have into user activity beyond things that happen on the network. Go beyond a data-centric approach to a people-centric approach through identity behavior analysis. Improving visibility into user activity and taking a more preventive approach are the best ways to manage risk of an incident. Develop an inside-out approach to security. By converging physical, cyber and OT security you’ll gain a holistic view of your enterprise-wide security landscape.
Among the cloud’s many impacts on the physical security market is a democratisation of access control. Less expensive cloud systems are making electronic access control affordable even to smaller companies. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of their sales team. Large upfront costs for a server, software and annual licensing previously made a typical electronic card access system cost-prohibitive. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The benefit for the integrator is recurring revenue that increases their profitability The benefit for the integrator is recurring revenue. While helping clients save money on server, software and IT infrastructure costs, integrators secure recurring revenue that increases their profitability. Building recurring revenue not only provides cash flow but also keeps a manufacturer’s name on the top of the minds of customers and leads to additional sales. Mobile access Continued investment in mobile access and cloud technology is essential to meet the access control needs of the booming multi-family housing and shared office-space markets. Managing access control for end users and residents in these verticals is challenging. Use of mechanical keys in these environments is too expensive and time consuming; it’s necessary to deploy wireless, technologically-advanced solutions. Managing access control for end users in different verticals is challenging, thus it’s necessary to deploy wireless, technologically-advanced solutions While the security industry has traditionally been slow to adopt IT technologies, the cloud is the exception. Large IT industry cloud players such as Amazon Web Services, Microsoft, and Google are being used by security industry professionals to provide systems that are easier to install, maintain, and administer and are far more secure and less expensive than a customer can provide on their own. Advancing cloud technology Cloud technologies give people access through their mobile phones and other devices Enterprise customers increasingly want to be able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. They seek to create trusted environments within which they can deliver valuable new user experiences; in effect, there is a demand for “digital cohesion.” Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Application programming interfaces Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. Cloud-based platforms, APIs will help bridge biometrics and access control in the enterprise “A big growth driver for the cloud is demand from enterprises that no longer look at access control simply for securing doors, data and other assets,” says Hilding Arrehed, Vice President of Cloud Services, HID Global, one of our Expert Panelists. “They want to create trusted environments within which they can deliver valuable new experiences to users. Cloud technologies make this possible by enabling people to use mobile devices for new applications and capabilities.”Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise Cloud-based platforms For example, cloud-based platforms will provide the backbone for quickly adding complementary applications like biometrics, secure print, virtual photo IDs, and vending as well as other access control use cases and emerging permission-based capabilities yet to be developed. “Cloud-based platforms facilitate new managed service models for mobile IDs and secure issuance and will fuel simplified development environments and easy integration into vertical solutions,” says Arrehed. “They have the potential to give organisations greater flexibility to upgrade and scale security infrastructure, improve maintenance and efficiency, and accelerate ROI.”
In mid-2009, Melco Resorts & Entertainment Limited opened City of Dreams, Macau – a casino and resort complex that quickly become one of the world’s premier entertainment and leisure destinations. The complex brings together a collection of world-renowned hotel brands, including Crown, Grand Hyatt, and Hard Rock, along with a casino area of approximately 448,000 square-feet and over 20 restaurants and bars. Also comprising an audio-visual multimedia experience, and ‘The House of Dancing Water’ – the world’s largest water-based extravaganza showcased in the purpose-built Dancing Water Theater. These unique and innovative entertainment, shopping, food and beverage offerings realise the company’s vision of bringing world-class integrated resort and entertainment experiences to Macau and Asia. Need of a robust security solution Melco Resorts was looking for a robust security solution capable of protecting high-value assetsHaving thousands of staff moving around the site meant that effective people management needed to be a significant part of the security solution. With a large site encompassing multiple areas and a staff of approximately 13,000, Melco Resorts was looking for a robust security solution capable of protecting high-value assets while providing a reliable and flexible system to support daily operations. In the years leading up to the opening of City of Dreams, Gallagher worked directly alongside Melco Resorts, and security partner Certis Security (Macau) Ltd, during the design and construction phases. The Gallagher team were highly involved in discussions and developments relating to software customisations and the final commissioning of critical security areas. MIFARE Classic card technology Part of the City of Dreams philosophy from day one was to operate a one-card, single service entity per staff member – not only for high-level security but across all system requirements. According to Billups, a lot of decisions around system choice were based on meeting the one-card philosophy. Utilising MIFARE Classic card technology, 1700 access controlled doors were set up across the complex. Utilising MIFARE Classic card technology, 1700 access controlled doors were set up across the complex Gallagher’s ability to encode the cards with data from multiple system providers was crucial in delivering the one-card policy. Along with Gallagher access data, third-party ASCII data encoding was also provided on the card for use by other on-site systems to achieve the objective of a single card philosophy. Latest generation data security The original system, comprising MIFARE Classic card technology, is now being upgraded to the latest MIFARE DESFire EV1 across all Melco Resorts properties. MIFARE DESFire EV1 provides the latest generation data security and encryption ensuring Melco Resorts globally stays at the forefront of technology. To further meet their one-card philosophy, Melco Resorts wanted a single card technology utilised across all three of their Macau complexes – City of Dreams, Altria Macau, and Studio City. In addition to enabling access across multiple properties, there was a requirement for a central monitoring system that could manage alarms escalated from any of the properties and register such alarms centrally in a main command structure. Highly integrated and expansive platform Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sitesFuture-proofing was an important consideration of the security solution. “City of Dreams needed a system that catered well to growth, particularly in the areas of people management and access control. Gallagher provided us with the highly integrated and expansive platform we were looking for,” said Kelly Billups, Director of Security Technology & Administration for Melco Resorts. Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sites. If communication between the facilities should fail due to a network fault or similar incident, each site’s security system will continue to function independently. According to Billups, the multi-server system has resulted in reduced labour costs due to the consolidation of security administration. Efficient movement of people The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. The instant dissemination of cardholder access and configuration data also ensures people have appropriate access delivered in real time. If cardholder access needs to be denied, this information is communicated and applied instantly across the site. In addition to door access activity, 5300 detection points are also monitored throughout the complexIn order to provide Melco Resorts with an audit trail of security events, all site activity is logged in a secure database. In addition to door access activity, 5300 detection points are also monitored throughout the complex. Reports are generated using a simple wizard-based system which steers the report generator through a step-by-step process ensuring the relevant data is retrieved. The City of Dreams site required integration with a number of external systems and Gallagher’s Command Centre central management software provided the platform to deliver this. Cameras integrated with Command Centre As surveillance is a key requirement for a casino, City of Dreams has thousands of cameras throughout the complex. A number of these cameras monitor critical back of house operations and are integrated with Command Centre to provide additional layers of security and enable further administrative functionality. A number of lower-level security points throughout the complex – which utilise traditional keys – integrate Command Centre with an electronic key management system. Keys are electronically released to personnel depending on their access permissions. Two high-level interfaces provide communication to all elevators connected to Command Centre There are approximately 80 elevator shafts located throughout the City of Dreams complex. Two high-level interfaces (Schindler and Otis) provide communication to all elevators connected to Command Centre where access control groups manage access to each of the floors. This integration is particularly important for heart-of-house elevators where access can be highly restricted to only authorised personnel. HR system integrated with Command Centre An integration between City of Dreams Human Resources (HR) system and Command Centre was established. The active connection between the two ensures that basic personnel information is automatically communicated from the HR system to Command Centre without the need for manual intervention. Because of this, the process of updating cardholder information and assigning access to cardholders is a quick and simple procedure – a must for a database of this size. The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. Where high-level (software) interfaces are not available, the Gallagher system connects with other services including: boom gates, motorised vehicle and pedestrian doors, and turnstiles, using what is commonly referred to as a low-level interface. A control relay in Gallagher’s Command Centre platform activates the door or gate, and in turn the status of the door or gate (open, closed) is reported back. Salto integrated guest locking system Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platformThe delivery of a high-level integration with a hotel guest-room locking solution is currently in development and will be a world first. Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platform in order to deliver high-level security across the entire complex. To deliver this solution, Gallagher is working with long-term partner Salto. The Salto integrated guest locking system is required to operate in conjunction with Melco Resorts high-security card encryption and encoding, while complimenting the hotel décor. Melco Resorts and Gallagher maintain an ongoing relationship which brings together Melco Resorts evolving requirements and Gallagher’s product development road map. “The relationship is key for us” said Billups, “having a team based in the region who meet with us regularly and having a level of engagement over development is very important.”
The power grid is a modern engineering marvel, providing us widely available and affordable energy for not only our day to day lives, but also highly critical infrastructure elements for which we rely on personally, and as an economy. However, our reliance on the grid also makes it highly susceptible to adverse events, including physical attacks. All parts of the grid can become victims of malicious events, but substations are particularly vulnerable due to their role in power distribution and the nature of their equipment. Power utilities’ security The challenge power utilities worldwide are facing is finding an affordable solution The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-104 specifically calls for implemented security plans which include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Fortunately, there are many solutions to help power utilities address these security concerns, one effective choice is the use of intelligent video. Intelligent video analytics solution Intelligent video, or video analytics, is a popular choice for the protection of critical facilities given its ability to detect, provide instant visual confirmation of the event and subsequent event forensics. The capability of this technology is increasing at a rapid rate, while decreases in hardware cost make such solutions affordable for owners or operators of critical bulk-power system sites. This case study looks at the issue of substation vulnerability and how to best use video to address, keeping in mind requirements of CIP-014. Such a system consists of fixed cameras, pan-tilt-zoom (PTZ) cameras, a deterrence device and data communication capability. Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc. In most cases, substations can benefit from a simple “camera-following” design, which includes surveillance of a potential breach at the fence line, as well as, the ability for early detection for some distance beyond the physical perimeter. Camera-following design In a camera-following design, in addition to its own coverage, each camera is responsible for covering the blind spot of the adjacent camera. That camera is then responsible for covering the blind spot of the next camera, and this pairing continues around the perimeter until the final camera covers the blind spot of the first. This type of coverage design is very effective and affordable for locations with well-defined perimeters, such as substations. Using this layout, the video feed from the fixed cameras are then enabled with video analytics algorithms to alert when predefined conditions are met. This is done by inputting the video signal into a server, edge device or NVR, located at the site, or remote to the location. Intelligent video technology Today’s intelligent video technology provides for very specific alarm criteria Today’s intelligent video technology provides for very specific alarm criteria, which in addition to only alarming when a target enters in a specific region, can also discriminate, or classify, by the type of target: human, vehicle, etc. Furthermore, the alarm can be restricted by specific actions taken by the target, such as loitering in an area, dropping or throwing an object, more than one target entering with a valid badge swipe (tailgating) or even the speed at which a target is entering an area. This level of discrimination provides the ability to address very specific vulnerabilities, as well as, avoid nuisance targets, such as wildlife, debris or moving vegetation. Another key feature with significant value to substation protection is the geospatial aspects available with some video analytic solutions. This capability maps each pixel of video to its real-world latitude, longitude and elevation. This results in further assessment of the target, including the actual location, the real size of the target, the real speed and the current track. It also affords the opportunity to provide a real-time display of this information to the security operator through an easy to understand map-based user interface. Autonomous PTZ cameras Geospatial video analytics provide the benefit of knowing the exact map-based location of the target Another key assessment aspect of this substation protection scheme is the use of autonomous PTZ cameras. These are typically placed at the corners of the perimeter where they can service detections from multiple fixed cameras. As previously mentioned, geospatial video analytics, provide the benefit of knowing the exact map-based location of the target. Knowing the location of the target is extremely valuable to the security officer, but it is also the basis for a feature known as “slew to cue,” whereby PTZ cameras armed with video intelligence can be automatically steered to the same location for instant confirmation of the target. In most cases, “slew to cue” functionality also includes an “intelligent zoom” feature, which uses the target size information from the alarm, the PTZ camera location and the target location to adjust the zoom level of the PTZ for an instant view of the target that can provide identification details (clothing color, car type, etc) without the need for the operator to further adjust the zoom. Target detection and response Once a target is detected, a security approach leveraging intelligent video can continue with a coordinated response Once a target is detected and confirmed, a security approach leveraging the use of intelligent video can continue with a coordinated response to the event. When video analytics is applied to pan-tilt-zoom cameras, it has the ability to automatically follow a defined target, freeing the operator to take other actions, such as coordinating with law enforcement officials. This feature, referred to as camera auto follow or PTZ following, can be automatically engaged as the result of a detection event, or subsequent to a slew to cue action. The system will continue to follow the target until it reaches a pre-defined system time-out, the operator takes manual control, or the camera can no longer view the target. The system can then provide the resulting PTZ video as a component of the detection alarm, for a more complete understanding of the intrusion for the operator to review. Effective deterrence At this point, the system has detected the target, classified its type and verified it has met alarm conditions. As part of the alarm it has also included dynamic indication of its location on a map, autonomously steered a PTZ to the target to allow for gathering of more detailed target information and a PTZ has locked on and is now following the target without any required user interaction. Total elapsed time to this point in the security response is typically less than 5 seconds. Deterrence is often realised as a fence, physical barriers or access controlled gates This level of automated response addresses many vulnerabilities typically identified as part of a CIP-014 security assessment, but with minimal extra cost, it can be extended to help with the aspect of deterrence. Deterrence is often realised as a fence, physical barriers or access controlled gates. These are physical items and should certainly be included in a substation security plan. Intrusion detection However, another form of deterrence, which can be enabled through the use of intelligent video is the idea of audio talk down. This is the use of live or pre-recorded audio, which is activated upon an intrusion to deter the intruder. Different from a general alarm warning audio, audio talk down uses information about the location of the intruder and their actions to select appropriate pre-recorded audio to deter the intruder. Worse case, the understanding that they are being actively monitored may hasten their plan. Video-based security and alarm system A common concern when deploying such a system is the amount of bandwidth required A common concern when deploying such a system is the amount of bandwidth required. Substations are almost always unmanned, which means the intrusion information must have a means to get communicated back to the main monitoring location. From a design aspect, this is typically the case, but it is important to know that it is not a requirement in order to gain security benefits from a video based system. The system described in this case study has the capability to detect, assess, respond and deter without any communication back to a main command and control. Alarms, events and system actions can be logged and stored remotely for review at a later time. In reality, utilities will want to be notified and react in real time. In these cases, video systems can adjust to the available bandwidth – from a low bandwidth situation where a textual alarm is provided with an image of the detection, to a high bandwidth installation where feeds from multiple cameras can be monitored and controlled in real time. Web-based, mobile access In each case, complete alarm information, including meta data, images and video can be readily available to the security operations center, which can then take action based on their security response plan, including contacting and coordinating this alarm data with local law enforcement through web-based access or mobile phones. This case study outlines the effectiveness of utilising video analytics to address the physical vulnerabilities of a typical substation. The study outlines how recent technological advances can autonomously address assessment, response and deterrence This case study outlines the effectiveness of utilising video analytics to address the physical vulnerabilities of a typical substation. Further, the study outlines how recent technological advances allow such a solution to extend beyond the mere detection of events, but can also autonomously address assessment, response and deterrence. Key capabilities of intelligent video include: Advanced Detection – Accurate alarming based on specific targets types and actions Situational Awareness – The ability to quickly convey the critical details of a security event in an easy to understand map-based format. Real-time Target Location – Real-time location information of events and real-time location tracking of potential intruders. Autonomous Sensor Control – Automated steering of cameras to an event location and subsequent hands free video tracking of a suspect. Although each utility and substation may encounter different vulnerabilities, this case study outlines how video can be considered to address NERC guidelines for protecting critical substation assets by providing situational awareness of a potential threat and initiating an appropriate and timely response.
The new vibration-proof Wisenet TRM-410S and TRM-810S NVRs manufactured by Hanwha Techwin are designed to be at the heart of video solutions for transport applications. Wisenet NVRs With a footprint of just 250mm x 210mm and offering two-way audio communication, the two new robust NVRs are EN50155, EN-50121 and EN-61373 certified. This makes them particularly suitable for deployment on buses and trains where they can be used to record video of passenger activity, as well as video of the road or track ahead, in order to provide evidence of any incidents. The new NVRs, which support H.265, H.264 and MJPEG compression, offer 4TB onboard video data storage, with the TRM-810S also offering the option of RAID. PoE/PoE+ support Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch, making them ideal for mobile applications as there is no need to install separate power supplies for cameras and monitors. Designed to offer the stable recording of event and location data as well as video, the two new devices complement the sixteen channel TRM-1610S and TRM-1610M NVRs and the three compact Wisenet X mobile H.265 dome cameras which were launched in 2018. Cost-effective video solution “Our two existing sixteen channel NVRs are proving to be popular among train operators who wish to record images captured by a large number of cameras installed in train carriages,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “The introduction of the four and eight channel NVRs means that we now have cost-effective solutions for bus, coach and truck type applications.”
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access control and intruder detection system In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety of staff and visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers smart building management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key features available with Inception: A web-based interface that can be controlled by authorised staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits for client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Trackforce has entered the retail market with a leading security workforce and activities management platform that empowers retailers to effectively manage their physical security and loss prevention environment. The platform delivers actionable data analytics to anticipate, assess, and mitigate risk; it enhances compliancy management, and helps supervisors manage more resources at multiple sites from one centralised location. Retail security and loss prevention teams operate in a challenging and complex environment" Retail Security According to Guirchaume Abitbol, CEO and Founder of Trackforce, “Retail security and loss prevention teams operate in a challenging and complex environment. To be successful they must access the best type of technology to support their security and loss prevention teams and streamline management of the entire security and risk environment. Our platform is seamless. Simpler to operate and more cost effective, it helps retailers deliver enhanced shopper safety while optimising security and loss prevention management.” Trackforce supports security and loss prevention teams by giving them predictive and historical data analytics to boost their strategic decision-making capabilities. The SaaS platform’s predictive analytics capabilities facilitate easy identification and analysis of theft patterns so that weak areas within the store can be improved to reduce risk and loss. Historic data are analysed, cross-referenced with trends and industry best practices, and then broken down. The resulting intelligence can then be used to fine tune security both within the store and externally. Trackforce SaaS platform The platform also consolidates and centralises the security command and control function, eliminating the expense of posting multiple supervisors at various sites. “Now one supervisor using the Trackforce command center is empowered with communication and management capabilities to effectively oversee security at numerous retail sites. The supervisor can communicate over multiple communication channels to security officers at all locations they are responsible for,” adds Abitbol. “This delivers major budgetary savings for the retail enterprise without compromising quality in any aspect of its security environment.” The Trackforce platform prevents loss and mitigates risks by securely maintaining digital records Security and risk management within the retail environment is complex, with numerous code and compliancy requirements. Missing a deadline can result in severe fines, increased insurance premiums, or even prosecution. The Trackforce platform prevents loss and mitigates risks by securely maintaining digital records and proactively alerting stakeholders when licenses need renewing and audits and inspections are due. The security manager commands a dashboard view of the entire regulatory and compliancy landscape across all store locations. Security and risk management “No two retail security departments are the same,” concludes Abitbol. “So we help retail clients customise their Trackforce workforce management platform based on their unique security, loss prevention, and risk environment. Trackforce eliminates the need for time-consuming paper reports and antiquated guard tour devices. It assists security officers and loss prevention officers in fulfilling their duties effectively, giving them improved capabilities to help them face their security challenges with greater efficiency and economy.”
Decades of experience, innovative ideas, a strong commitment to quality, and a full range of first-class offset printing services: Mohn Media Mohndruck GmbH, a company of the Bertelsmann Printing Group, is one of Europe’s providers of printing and media services. At its facility in Gütersloh, Germany, some 2,000 employees are involved in professionally creating and executing tailored solutions for customers across a variety of industries. To avoid endangering staff and production, the company also has extremely high standards where the plant’s safety and security are concerned. And Bosch has supported the print specialists with advanced technology and services through multiple system generations. Cutting-edge solution The latest new project involved implementing a networked solution to improve fire safety “Again and again, we’ve been impressed by the innovative solutions that Bosch comes up with for us,” says Jörg Naumann, who heads the company’s fire brigade. “Bertelsmann has been partnering with Bosch for over 35 years, and for good reason.” The latest new project involved implementing a networked solution to improve fire safety in the eight-meter-high waste paper warehouses. On average, around 300 tons of paper are stored there at any given time. Problems in waste paper removal would directly impact production. To enable prompt responses to any fire events in these sensitive areas, the Bosch experts planned and implemented a cutting-edge solution. Fire detection system AVIOTEC, the first video-based fire detection system to be certified by VdS Schadenverhütung GmbH (the VdS is an independent, renowned institution for enterprise safety and security, and harmonised body for international safety standards) plays a key role in it. Intelligent algorithms directly integrated in cameras reliably detect the first signs of any smoke or flame. This technology detects fires at their source much more reliably than conventional detectors Particularly in challenging large-volume buildings, this technology detects fires at their source much more reliably than conventional detectors, which are not triggered until smoke reaches them. The data generated by the new fire protection solution come together in the Bosch Video Management System. If AVIOTEC identifies a potentially dangerous situation in any of the waste paper warehouses, it immediately alerts the continuously staffed emergency service desk of the plant fire brigade. Building integration system The situation can then be checked on a video screen and appropriate steps will be initiated. The use of this innovative technology permits very early detection of any fires. This prevents major damage and resulting production downtimes, thus saving the company a great deal of time and money. To additionally enhance security and efficiency, all of the integrated on-site systems for fire protection and video security are managed by the Building Integration System from Bosch. As required, the security systems can be centrally or locally monitored and controlled by staff as appropriate. Not only Mohn Media benefits from this, but also all of the other companies of the Bertelsmann Printing Group operating at the same site.
Round table discussion
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?