ASIS International, the association for security management professionals, announces their education lineup for Global Security Exchange (GSX) 2019, taking place 8-12 September in Chicago, IL. The impressive slate includes more than 300 sessions, organised into 17 subject matter tracks, and reinforces ASIS’ commitment to providing the most diverse, thought-provoking, educational programs for security professionals worldwide. Global security community “GSX is the premier event for...
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...
Frontier Pitts will be exhibiting at the IFSEC Exhibition at Excel, London between the 18th and 20th of June 2019. Frontier Pitts will be showcasing a fully operational Secured by Design accredited LPS1175 Automatic Bi-folding Gate SR2 on the stand. This is the first automatic Bi-folding Speed Gate on the market to achieve Secured by Design accreditation and LPS1175 Security Rating! Many clients had been installing unrated Security Gates that had not been tested alongside LPS1175 security rate...
Hikvision, the provider of innovative video surveillance products and solutions, launches the Technology Partner Program Portal (TPP Portal). This new web-based portal is designed to enhance the collaboration with technology partners and systems integrators, enable development of new and innovative solutions for customers across all markets, and further drive market growth. Technology partners can use the marketing capabilities of the portal to grow their businesses, taking full advantage of Hi...
Matrix aims at increasing the networking opportunities by explaining decision makers the application of latest telecom and security solutions at the International Police Expo. The event organised on 19th and 20th July’19 gathers high level professionals of defence forces and gives them an overview of technologically advanced solutions. From telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for...
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announces it will display its flagship security platform, Security Centre 5.8, and its comprehensive suite of new features whilst exhibiting at IFSEC International 2019. This will be the first time the new functionality will have been displayed in Europe, taking place at ExCeL London from 18-20 June (Stand IF710). The unified platform has undergone a significant update recently, providi...
PSA, the security and systems integrator consortium, announces the call for presentations for PSA TEC 2020 is open. Sessions will be selected that serve a variety of disciplines and focus on emerging technologies, critical issues in the industry and tool development to augment attendees’ knowledge base needed to drive the industry forward. TEC, presented by PSA, is the premier education and networking event for all professional systems integrators in the security and audio-visual markets. TEC features education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. Professional systems integrators This premier training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organisation. TEC 2020 will be held at the Sheraton Downtown Denver in Denver, CO on April 20-23, 2020. PSA is accepting submissions to complete the education program with content that provides knowledge PSA is accepting submissions to complete the education program with content that provides knowledge for professional systems integrators in the physical security and pro-AV markets or sessions that will help advance their personal skillsets within their professional disciplines. Topics represented at TEC include cybersecurity, leadership/management, managed services, marketing, operations, procurement, sales and technical. General education sessions Proposals are welcome for both certification programs and general education sessions for the security and pro-AV markets. All sessions must be unbiased with no brand or product emphasis and minimise commercial references and overt branding. Submissions are evaluated based on topic relevance, speaker expertise and originality of the content. Additional guidelines are provided in the call for presentations submission process. Accepted and approved presenters will receive complimentary registration to TEC 2020 and will have the opportunity to solidify their reputation as an industry resource and subject matter expert while expanding their own professional network and gaining access to strategic partnerships. PSA does not pay honoraria or expenses for accepted proposals.
Cortech Developments is pleased to announce the integration of its Datalog Integrated Security Management Software with the Advanced Analytics Video platform from DAVANTIS, a specialist in video analytics for perimeter security. The seamless integration between Datalog and DAVANTIS provides end users with a means to reduce operator reaction times and increase overall situational awareness. Allowing consistent and timely response to different alarm triggers such as intruders, vehicle entry/exits, tampering and loitering to be managed seamlessly. The integration provides comprehensive information about security alerts in minimal clicks. Operators are provided with both alarm descriptions and visual data; it presents users with access to video from the camera with trace data (and any other associated cameras) that activated the alarm resulting in real-time analysis of the alarm trigger. Datalog provides quick and effective real time monitoring and control of events Local and remote site monitoring Datalog is a modular software suite that operates as a single or multi-user graphical user interface, providing local and remote site monitoring and control of building, fire, security and energy systems. The software provides smarter interoperability for multiple technologies across multiple sites; assisting organisations to reduce risk and costs, while maximising situation awareness and operational efficiency. Datalog provides quick and effective real time monitoring and control of events. System warnings, events and alarms are all clearly identified, prioritised, graphically located and visually verified with automatic CCTV video to enable a more efficient and accountable response. Innovation within perimeter detection The partnership will infuse both products with exciting new capabilities for Perimeter Intrusion Detection"Jason Blundell, Head of Sales & Marketing for Cortech Developments commenting on the integration said “We are delighted to welcome DAVANTIS into our portfolio of integration partners; we are looking forward to working together and providing innovation within perimeter detection. The partnership between DAVANTIS and Cortech demonstrates our on-going commitment to offer users flexibility and the widest choice, when selecting an integrated software platform.” Aaron Plant - Regional Sales Manager for DAVANTIS - UK and Nordics comments, “DAVANTIS are delighted to be in partnership with Cortech Developments, with integration into the DATALOG PSIM product. The partnership will infuse both products with exciting new capabilities for Perimeter Intrusion Detection, backed by CPNI Level 3 approval. “The combined solution delivers high performance, high reliability perimeter alarms via DATALOG to enable fast, efficient verification of real-time intrusions in a very simple and informative dialogue within DATALOG.”
Datalog MV operates with the latest version of Datalog which provides local and remote site monitoring and control of building, fire, security and energy systems and significantly enhances the ability of operators to manage video surveillance systems which may be part of an integrated security solution. Integration with Wisenet Network Video Recorders (NVRs) means that operators will now be able to view live or recorded images captured by Wisenet cameras on the Datalog graphical user interface. Greater situational awareness When there is an alarm event, images from Wisenet cameras installed in the vicinity of the incident are automatically displayed by Datalog, allowing operators to visually verify what is occurring and have greater situational awareness. Wisenet cameras and domes with PTZ functionality can be directly controlled via Datalog The presentation of live images can also be triggered by any number of user defined real-time ‘cause & effect’ events, whilst Wisenet cameras and domes with PTZ functionality can be directly controlled via Datalog to enable operators to observe close up activity of any activity. “We are excited to welcome Hanwha Techwin into our portfolio of integration partners and we are looking forward to working with them,” said Jason Blundell, Head of Sales & Marketing for Cortech Developments. Integrated software platform “The partnership between Hanwha Techwin and Cortech demonstrates our on-going commitment to offer users flexibility and the widest choice when selecting an integrated software platform.” Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe added: “Wisenet cameras are increasingly being specified for mission critical and high security infrastructure applications. Datalog has proved to be an ideal solution for these types of projects and we are therefore very pleased to have the opportunity to work with Cortech to ensure our mutual customers achieve maximum benefit from their safety and security systems.”
Advancis is a pioneer in the PSIM industry and helps protect critical infrastructure and high security sites around the globe with its leading-edge control room solution. This year at IFSEC, Southwest Microwave and TKH Security will be exhibiting in partnership with Advancis on its stand as part of the Advancis community of technology partners. For security system buyers and decision makers IFSEC International in London is an important event in the calendar with over 27,000 international visitors from more than 113 countries expected to attend on 18-20 June 2019. Excellent technology integration Advancis works very closely with its technology partners in a community approach to ensure that end clients experience excellent technology integration and seamless unification of disparate systems into the WinGuard PSIM software. Our mission is to offer the most stable and innovative PSIM solution on the market that provides the benefits of open architecture, cost efficiency and scalability as well as to provide high levels of support throughout a project’s life cycle. This unique and innovative community demonstration at IFSEC will be located at stand IF 2414, close to a main entrance and is expected to generate a great deal of interest amongst buyers who will be able to see an integrated security control room with the latest WinGuard X4 features with live integration of perimeter protection systems from Southwest Microwave as well as access control, security and video management from TKH Security.
Percepto, the global market provider for autonomous industrial drone solutions, announces that it will operate and broadcast live overseas autonomous drone missions from its stand (IF2146) at IFSEC International 2019 in London. The company will also launch the next generation of its industrial and enterprise grade drone-in-a-box system solution, including new software improvements and enhanced all-weather base station. This is the first time that Percepto, which last week announced a Round A completion, has brought its autonomous drone solution to the UK and Europe's leading security event. The company will give security practitioners the opportunity to discover how the technology can be used to improve security and safety, reduce risk and optimise operations. Aerial surveillance On Wednesday 19th June at 11.00am, Percepto will host an exclusive media event to get up-close to the Percepto Solution and watch a live broadcast of an autonomous drone mission being carried out in Israel. There will also be a question and answer session with the Co-Founder and Chief Commercial Officer of Percepto, Ariel Avitan, who comments: “We will demonstrate how the Percepto solution delivers aerial surveillance through patrols, real-time detection and tracking of humans and vehicles, as well as anomaly detection, all without the need for an on-site operator or pilot.” Sparrow drones can also be used as first responders when launched on-demand by an operator Visitors to IFSEC International will witness how our Sparrow drones take-off automatically to perform pre-scheduled missions such as patrolling a perimeter. Should a drone detect an object of interest (i.e. a person or a vehicle in a restricted area), an alert is automatically triggered and the control room operator is able to instantly view the real-time camera footage as the drone tracks the object. In addition, Sparrow drones can also be used as first responders when launched on-demand by an operator, or when triggered via an integrated system such as a smart fence. Fast battery charging Once a mission has been completed it returns to its base station - a highly secure enclosed weather-proof box, stationed in the field - where automated post flight checks and fast battery charging is completed, ensuring the drone is primed for the next mission. Percepto’s all new base station is a key feature of its next generation release and will be on display for the first time at IFSEC International. “Drones will become part of the fabric of security and surveillance operations,” adds Avitan. “Whether deployed stand-alone or fully integrated with the control room VMS or other security systems, Percepto provide security teams with a level of aerial surveillance that was inconceivable and unattainable for the vast majority of large enterprises until recently.”
Johnson Controls announces that its flagship access control and event management system Tyco Software House C•CURE 9000 is supported on Infrastructure as a Service (IaaS), enabling customers to take advantage of the many benefits of cloud computing with the choice of best-suited service providers. With C•CURE 9000 deployable in the cloud, integrators and end users can leverage cloud service providers such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform, to reduce server infrastructure and maintenance costs with greater business continuity options. Physical security operations Beyond IT modernisation and cost management, organisations are approaching cloud adoption strategies through the lens of broader enterprise business efficiency and growth objectives. Companies are aggressively moving to the cloud to maximise their IT spend" As organisations identify and migrate critical application workloads to the cloud, physical security operations are able to increase C•CURE 9000 application availability by leveraging redundancy and disaster recovery infrastructure that geographically extends well beyond their on-premise constraints. “Companies are aggressively moving to the cloud to maximise their IT spend while improving their agility to respond to business needs and market changes,” said Jason Ouellette, general manager of Enterprise Access & Video Solutions, Building Technologies & Solutions, Johnson Controls. Artificial intelligence “When moving infrastructure to the cloud, learning how to provision the right type and size of resources required for customer specific environments is critical to optimise performance and cost. Customers who take this approach in their C•CURE 9000 cloud migration planning can easily avoid overspending while maintaining flexibility to quickly scale resources based on actual need.” To assist customers seeking C•CURE 9000 cloud deployment support, the Software House Professional Services organisation provides a broad range of consulting and implementation services, including technical guidance on best practices and system architecture considerations regarding customer specific cloud strategies. Cloud solutions are an integral part of the strategic focus of the Tyco Access Control and Video Solutions unit of Johnson Controls, along with artificial intelligence, unification and cybersecurity, comprising of four key technology pillars.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialised featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialised featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customised recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduction in error rates since 2013 is due to wholesale replacement of the old algorithms with new ones based on deep convolutional neural networks — completely revolutionising the technology. Optimal recognition results SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds One entrant in the newly energised market is RealNetworks, whose SAFR for Security is an AI-based facial recognition solution for live video that integrates video management system (VMS) solutions. With 24/7 monitoring, SAFR detects and matches millions of faces accurately in real time, enabling teams to manage a watchlist across any number of video feeds. SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds, even in real-world conditions where faces are in motion, at different angles, under poor lighting, or partially obscured. SAFR builds on RealNetworks’ 23-year history in video technologies. Launched in July 2018, SAFR — secure, accurate facial recognition — is enabling new applications for security, convenience, and analytics. Create security responses “We seek to be the world’s most trusted facial recognition platform and are delighted to partner with customers in the security industry and elsewhere to shape a more secure, convenient future worldwide,” says Dan Grimm, Vice President of Computer Vision and General Manager of SAFR at RealNetworks. “Security professionals are asked to keep us safe 24/7, monitoring a burgeoning number of cameras, and we help make them more effective.” SAFR targets facial recognition for live video, identifying camera-unaware faces moving in real-world conditions. In the April 2019 NIST results, SAFR tested as the fastest and most compact solution among algorithms with less than 0.022 False Non-Match Rate — 62 percent faster than the average speed, according to the company. SAFR now provides capabilities such as live video overlays alerting security professionals to events in real time, automatic bookmarks with rich metadata for investigative work, and alerts that can be customised to create security responses. SAFR uses one-sixth the compute power of competing facial recognition solutions Facial recognition algorithms Five years ago, facial recognition algorithms would struggle to match forward-facing people from still images, let alone camera-unaware moving faces from live video with variations in rotation and tilt. SAFR says they have achieved a balance of accuracy and performance for live video. A contributor to this accuracy is consistency across a range of skin tones. The algorithm was trained on a highly diverse global set of over 10 million non-simulated real-world faces. SAFR was optimised for speed and can sample a face multiple times during the same period of time as other algorithms, subsequently increasing its accuracy. SAFR achieves the performance through edge processing. Distributed architecture enables efficient bandwidth consumption, reducing the roundtrip latency of facial recognition speed to under 100 milliseconds. The savings lower total cost of ownership (TCO): SAFR uses one-sixth the compute power of competing facial recognition solutions, equating to $500,000 or so in savings on a 250-camera deployment. Integrated experience SAFR also uses off-the-shelf hardware and is optimised to leverage inexpensive GPUs SAFR also uses off-the-shelf hardware and is optimised to leverage inexpensive GPUs. SAFR can be deployed on premises or in the cloud, and supports Windows, Linux, macOS, iOS, and Android. When SAFR is paired with a VMS, such as Milestone XProtect or Genetec Security Center, the integrated experience includes 24/7 monitoring to detect and match faces in real-time. Features include live video overlays within the VMS to identify strangers, threats, concerns, unrecognised persons, VIPs, employees, or other tagged individuals in live video. Real-time alerts can be customised for when persons of interest appear on a video camera feed. Additionally, automatic bookmarks with rich metadata make for easier investigative review of security footage. Facial recognition technology is increasingly in demand to improve safety across various industry verticals. Better customer experience Large enterprises with high-visitor flows and heightened security — such as transportation hubs, stadiums, universities, and hospitals — need to know in real time when persons of interest or those on watchlists appear on camera. Sports stadiums could apply facial recognition to deny entry to banned patrons, locate lost children, or recognise VIPs to deliver a better customer experience. Hospitals need access control to restricted areas and pharmaceutical storage closets Hospitals need access control to restricted areas and pharmaceutical storage closets. Airports and transit centres value traffic flows, demographic composition, and dwell times to help improve scheduling. SAFR for Security is available worldwide, and the company partners with VMS providers such as Milestone, Genetec, Digifort, and IPConfigure by Paliton Networks. They are actively working to support additional VMS solutions and have sales teams located in major metropolitan cities around the world. Security professionals “The job of the security professional is critical in today’s world,” says Grimm. “SAFR for Security helps mitigate the challenges of the important work security professionals do to keep us all safe.” In designing and developing SAFR, RealNetworks considered diversity and the uniqueness of each person; Grimm says their massive global training data set is a competitive advantage. SAFR is designed with privacy in mind. All facial images and signatures are AES-256 encrypted in transit or at rest. “SAFR is powerful enterprise-grade software that is continuously improving through innovation and many years of expertise,” says Grimm.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-wave signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, Washington-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar technology for border surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar sensor for security applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a lot of different verticals together with IT and network security, physical security and robots and drones. It’s one-stop shopping and the number one security show in North America.” Identifying buying influencers The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show. The ISC West Executive’s Club is a ‘top buyer program’ created to welcome high-level buying influencers who have current projects in the pipeline. The program works throughout the year, networking, researching and identifying buying influencers among end users, integrators, dealers/installers and consultants who are working on current projects. Approximately 1,300 attendees are participating in the program this year. An Executive’s Club member might be an integrator working with several large projects or represent a school system that is building a new campus or retrofitting their systems. During the trade show, these guests get the VIP treatment with a variety of benefits, including a lounge, cocktail receptions, and continental breakfasts. Personalised matchmaking programs ISC West also provides personalised matchmaking programs to bring together these buyers with companies that can meet their needs. The Executive Club members are also led on guided exhibit hall tours, based on product interest, that highlight new and innovative solutions. The program also contributes to ISC West’s goal to grow its end user audience. In this case, it is a group of eager buyers with immediate needs. Another growing aspect of ISC West is its role shaping exhibiting companies’ technology roadmaps, in particular the timing of new product releases. Many new products and technologies are announced at ISC West, and attendees are conditioned to attend the show to see what’s new in the marketplace. “Vendors try and work to get whatever solutions they are promoting together in time for ISC West,” says Shaughnessy. “Vendors know that attendees have fresh budgets and new initiatives early in the year.” Network security products ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11 ISC West showcases the latest products, services, and technology including access control, video surveillance, disaster recovery, IT security products, network security products, wireless security products, and thousands more helping ensure safety by giving attendees the right tools and defenses to protect against security risks. In addition to the exhibition, ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11. SIA Education@ISC will kick off the day before the start of the exhibition. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape.
Beijing Daxing Airport, due to open in September, will soon be the second in Beijing to secure daily operations with state-of-the-art technology by Airbus. Airbus will provide one Tetra DXTA server, and nine TB3 base stations with eight TTRX 32-channel receivers per base station for Bejing’s second international Airport communication structure. The system will be mutually backed up by the Beijing Capital International Airport to enhance the communication and management of the two airports. The whole network will be put in use before the 30th of September, the official opening date of the airport. This new airport will possess eight runways and serve around 100 million passengers annually, all of which will be secured with Airbus technology. Seamless communications Airbus Tetra system has played a vital role in securing tasks relating to passenger transportation Tests carried out in April proved the interconnectivity between the digital trunk communication systems of both airports to be reliable, as stable and clear communications were recorded. The two Tetra systems provided by Airbus are fully interconnected; this will allow for Airport related entities such as Airlines and ground service companies to benefit from seamless communications between both airports. Beijing International Airport is also equipped with an Airbus Tetra system, which has provided highly stable, reliable, and flexible communication security for daily operations since its deployment in 2008. Over the past ten years, it has played a vital role in securing tasks relating to passenger transportation, as well as the logistics of high-scale world sports events. The current system serves over 10,000 subscribers. In 2018, the Beijing Capital International Airport saw over 100 million passengers for the first time, making it the second busiest airport in the world.
Business Finland together with Metsä Group is creating the Metsä pavilion for the 2020 summer Olympics and Paralympics in the grounds of Embassy of Finland in the heart of Tokyo. The pavilion will operate as the official National Hospitality House during the Olympics and Paralympics for Finnish teams. Digital locking systems Among the topics promoted in the pavilion are smart energy, sustainability, digitalisation, health and wellbeing Among the topics promoted in the pavilion are smart energy, sustainability, digitalisation, health and wellbeing. It was a logical decision therefore that iLOQ would be a partner of the Metsä pavilion, and deliver its self-powered, digital locking system to the house. iLOQ is an innovator in the locking industry and has a strong portfolio of safe and sustainable products that maximise safety and minimise administration and lifecycle costs. iLOQ’s mobile and digital locking systems are self-powered and enable electronic locking without batteries or cables. They cater to the needs of industry and the utility sector by providing smart locking and secure and simple access management solutions for the buildings and spaces used daily. President and CEO of iLOQ, Heikki Hiltunen, commented: “We are delighted to showcase our state-of-the-art and environmentally friendly digital and mobile access management systems in the Metsä pavilion. This will open business opportunities for us in the Japanese markets and among Japanese customers and will help us establish new connections with partners in the region and globally”. Advanced remote control services In accordance with the Company’s environmental program, iLOQ conserves natural resources and the environment. For example, it maximises the usability of their products, minimises battery and metal waste, favors recyclable packaging and reduces the need for maintenance-related travel by developing advanced remotely control services. Every year, iLOQ’s solutions save 27,000 kg or battery waste and, compared to mechanical locking solutions, 7000 kg of metal waste. The aim of the pavilion is to provide Finnish companies with the opportunity to create new business in Japan and gain new contacts in the market. iLOQ – Metsa platform integartion We are happy to cooperate with iLOQ and present their locking solutions" “We are happy to cooperate with iLOQ and present their locking solutions among other leading Finnish technologies in the Metsä pavilion. We believe that Finland can offer numerous complementary products, services and innovations for Japan” states Petri Tulensalo, Head of Sports Cluster, Business Finland. Joni Lampinen, Chief Marketing Officer, explains: “We are looking forward to working closely with the Metsä pavilion and raising iLOQ’s brand awareness in Asia. We have a lot to offer customers and partners in the region, and they will be able to see this firsthand as our locking systems will be in use in the pavilion”.
Each of Denmark’s 550 individual Free Schools shares a common ethos: parents and students participate together in activities outside school hours, including weekends. It’s excellent for building a school community. Not so easy for managing security, when issuing and tracking keys becomes a 7-day task every week. The Vejle Friskole turned to SMARTair® wireless access control for a solution. Previously, key management ate up “a very long time, approximately 5 hours a week,” explains Henrik Kækel, Technical Service Officer at Vejle Friskole. Individual access permissions Vejle Friskole’s mechanical keys have been replaced by a SMARTair access control system Secure wireless electronic locks, already proven in schools across Europe, were the answer. Vejle Friskole’s mechanical keys have been replaced by a SMARTair® access control system. Over 80 doors and cabinets around the school are secured with SMARTair® wireless devices. Even at a historic property like Vejle Friskole, battery-powered SMARTair® devices are easy and unobtrusive to retrofit. Now approximately 250 students, teachers and parents each carry their own key fob, programmed with individual access permissions. Because the SMARTair® system portfolio has locking devices tailored to different kinds of openings, everyone at the Friskole opens the right doors and cabinets with a single fob. There’s no more need for the school to distribute separate keys for student or staff lockers, for example. Issuing fobs “It was really bad because we had big problems with keys that were lost,” says Henrik Kækel. “There was a lot of work in key administration.” SMARTair® is easy for the school to manage. Today, Vejle Friskole staff spend around 5 minutes a week managing their access system. It's incredibly easy to figure out... it takes 1 minute to code a student" “It's incredibly easy to figure out... it takes 1 minute to code a student,” he adds. Even managing the leasing of school buildings for non-school events is simple and secure. School facilities staff issue fobs for the duration of the event, then cancel them immediately afterwards – with no concerns someone may have copied a physical key. Saving staff time In addition to making everyday life easier and saving staff time and admin costs, SMARTair® has increased security. Using the intuitive SMARTair® software, they always have an overview of who has been at the school, and when. Audit trails are generated and monitored in real time using their SMARTair® system. And it's no disaster if a credential gets lost. Henrik adds: “Then we cancel the credential and issue a new one.” Vejle Friskole’s SMARTair® system is easy, fast and cost-effective to extend to new doors, cabinets and users — at the beginning of a new school year, or any time they choose.
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling campus security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-time list In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
This year’s Super Bowl LIII American football game to determine the champions of the National Football League (NFL), has been protected by 360 Vision Technology’s ruggedised-Hybrid Invictus PTZ camera. The cameras were deployed as part of Security Centres International’s high-performance Mobile Advanced Safety Tower (MAST) rapid deployment camera solution. In all, 10 rapid deployment MAST units were deployed in various areas surrounding the brand new, Mercedes-Benz Stadium and State Farm Arena in Atlanta Georgia. With over 1 million fans expected to participate in Super Bowl and the 10-day fan festival, the Metropolitan Atlanta Rapid Transit Authority (MARTA), was keen to complement the existing CCTV networks around the grounds and mass transit point footfall areas, such as bus and rail stations. HD surveillance imaging MAST is the only product of its kind that would readily integrate into the existing CCTV infrastructure" Stuart Bostock, Executive Group President at Security Centres International explains why the 360 Vision Invictus camera based MAST system was chosen by MARTA: “Featuring world-class HD surveillance imaging, leading-edge design, robustness, zero infrastructure requirements and seamless Video Management System (VMS) integration, MAST is the only product of its kind that would readily integrate into the existing CCTV infrastructure. Additionally, MAST benefits from a significantly smaller footprint than similar trailer based stand-alone surveillance systems.” “MAST has been developed to answer the need for a more sophisticated and flexible surveillance system for infrastructure and public space safety, including large crowd gatherings, as in this application. MAST is unique, as it combines a rapidly deployable unit with some of the most advanced safety and surveillance technology available – the very reason why we selected 360 Vision Technology’s Invictus camera for its core imaging technology.” Full 1080P HD PTZ camera Invictus’ low-power consumption greatly assists the longevity of critical battery power when deployed in the field" Mark Rees Managing Director of 360 Vision Technology added: “360 Vision Technology’s Invictus is a high-performance, ruggedized all-in-one PTZ camera with full 1080P HD and ultra low-light camera technology - making it the perfect choice for off-grid temporary/rapid deployment mobile surveillance rigs, such as MAST. Additionally, Invictus’ low-power consumption greatly assists the longevity of critical battery power when deployed in the field – extending MAST’s operational performance for deployment in more remote applications.” “The Invictus camera’s unparalleled mix of competitive cost and advanced Predator low-light camera imaging technology makes it the perfect imaging component for the innovative MAST system.” MAST units at Super Bowl LIII The use of the MAST units integrated to the existing fixed camera points during Super Bowl LIII week proved a huge success with high-definition images transmitted back to the MARTA Emergency Operations Centre via a mobile network. System operators were able to identify and tackle a number of incidents Thanks to the high quality of images received, system operators were able to identify and tackle a number of incidents, including a vehicle theft. Additionally, the images were also used to predict areas of dense footfall, tackle crowd control safety issues, and manage general health and safety concerns. The deployment of the Invictus based camera system at Super Bowl LIII proved such a success that plans are already in place for deployment at other large-scale US sporting events, including the NCAA Final Four Basketball Championship in 2020 and for city centre deployment across Atlanta.
Apstec Systems (Apstec) announces that its Human Security Radar (HSR) system will be deployed at the Palexpo Exhibition and Congress Centre in Geneva to improve safety and security for the International Motor Show 2019. Asptec’s HSR system is the world’s first fully automatic real-time mass people screening solution. Held over a period of ten days, the Geneva International Motor Show is one of the automotive industry’s flagship events and attracts large numbers of visitors every year. The organisers are anticipating up to three-quarters of a million visitors over the duration of this year’s event, with capacity reaching 150,000 attendees a day during peak times. Largest conference centres The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors HSR is uniquely well suited to managing this level of throughput and providing a high level of security without causing disruption to the flow of visitors into the venue, or negatively impacting their experience. Two HSR systems will be deployed for the show, each capable of screening up to 10,000 people per hour. The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors. Traditional security checkpoints or manual searches, which scan one individual at a time, are not suited to large venues and public places, leading to queues and delays. Although security is still paramount, attention has moved towards the need to add a critical level of defence that doesn’t impede visitor experience. Cost-effective solution HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in high footfall scenarios. The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. Developed by specialists in the fields of radio physics, electronics and software engineering, the walkthrough system has been built in conjunction with authorities and ‘end users’ in security and counter-terrorism. HSR screens for mass casualty threats including improvised explosive devices concealed on the body or in body-worn bags, and firearms wherever they are carried, without the need for an operator to inspect suspect materials. It leverages centimeter wave technology, meaning it can discriminate explosives from benign materials, with a high degree of accuracy. Security screening The Palexpo’s deployment of HSR is the latest major implementation of this new technology Gregory Labzovsky, CEO, Apstec, explained: “Until recently, it’s been almost impossible to secure public spaces in a simple and cost-effective way, with existing approaches to security screening proving to be impractical, inconvenient and expensive to operate. HSR enables venue owners to close a critical security capability gap without impacting the experience of their patrons. We’re delighted to be working with The Geneva International Motor Show to enhance safety for thousands of motoring exhibitors and enthusiasts.” The Palexpo’s deployment of HSR is the latest major implementation of this new technology. The system has been installed in some of the world’s busiest airports, as well as in sports stadiums, entertainment venues, mass transport hubs and networks.
Round table discussion
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?
When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate into business for security companies of various types. But should security companies seek to capitalise on these opportunities? We asked this week’s Expert Panel Roundtable: Is it fair game for manufacturers or marketers to leverage recent violent incidents or terrorist attacks to promote sales of security systems or products?