For those looking for a new and intelligent approach to fire detection, AVIOTEC, the artificial intelligence-based fire detection camera from Bosch Security Systems, detects fires quickly and reliably in challenging settings, such as dusty, humid, and dark areas. It is vital to detect fire as early as possible. AVIOTEC is an IP camera with built-in video analytics. The trained algorithm detects flames and smoke directly at the source. The device can, therefore, detect fires faster than a common...
3xLOGIC, Inc., a globally renowned provider of integrated, intelligent security solutions, is introducing its Gunshot Detection solution, which features a reliable dry contact that allows it to be easily integrated into existing security systems. Gunshot Detection solution Rather than utilising microphones, infrared sensors, or complex analytics, the self-contained device relies on affordably simple concussive force recognition sensors to detect gunshots. When a gun is fired, the bullet create...
Soloinsight, the workflow automation platform company announced the opening of its new location in Charleston, South Carolina named The Workflow Innovation Center. The opening signifies growth and an increased interest in innovative workflow automation solutions, such as Soloinsight’s flagship platform, CloudGate, which addresses the security and facility automation needs specifically to PIAM, VIAM, and space reservations. These systems enhance the way departments interact with the life...
With the continued rolling back of COVID restrictions in the UK, there is a palpable sense of relief. A mixture of mass vaccinations, widespread testing, and track and tracing of the infection is helping to enable a healthy bounce back for businesses – with secure access control taking an important role in facilitating this. However, rather than just being a reaction to the wake of the pandemic, there is every sign that the economy, and consequently the security sector as well, are both r...
LenelS2 announced a North America distribution agreement with its OpenAccess Alliance Program (OAAP) partner, Splan, a next-generation visitor check-in software solutions company. The agreement enables LenelS2 and its value-added reseller network to provide a more comprehensive touchless building access experience that includes visitor management. Splan’s visitor management solution integrates with LenelS2’s market-leading OnGuard®and NetBox™ systems as well as BlueDiamond...
Boon Edam Inc., a global pioneer in security entrances and architectural revolving doors announced the resumption of on-site entry evaluations, a building or campus analysis that aids security managers in creating a defensible physical security entrance strategy against the costly liabilities associated with tailgating and piggybacking. These evaluations have proven to be critical to the success of entrance projects. During the COVID pandemic, to support community health and safe...
Suprema, a global pioneer in access control, biometrics, and time & attendance solutions, announced the new product launch of the X-Station 2, a versatile intelligent terminal with credential options of mobile access, QR, and barcodes as well as RFID cards and PIN. Multiple credential options X-Station 2 enables flexible access control system design by supporting multiple credential options. The terminal is compatible with most types of existing RFID cards including EM, MIFARE, iCLASS, DESFire, and FeliCa, but also lets users go card-less by offering mobile credential options including QR codes and barcodes. The terminal can read QR codes and barcodes composed of up to 32 ASCII code strings issued on Suprema BioStar 2 or 3rd party systems. X-Station 2 can also communicate with NFC and BLE signals, allowing both Android and iOS device owners to use mobile access. Key features X-Station 2 improves security while safeguarding user data Equipped with a secure boot process, Open Supervised Device Protocol (OSDP), and cameras for image log capture, X-Station 2 improves security while safeguarding user data. X-Station 2 is also easy to install, use and maintain with features like Power over Ethernet (PoE), intuitive GUI on a 4” wide touchscreen, and IP65 rating. Versatile options X-Station 2’s various credential options allow it to meet all kinds of access control needs. Visitors can be issued QR codes or temporary mobile access cards while employees and registered users can use RFID cards and PIN codes to access areas that require additional security. When used in combination with BioStar 2 or 3rd party software with time and attendance, HR management features, X-Station 2 can track employee work hours, completed tasks as well as vacation days, photocopy credits, canteen tickets, and subscription validity. “X-Station 2 is a truly versatile terminal that can be installed in any facility with time and attendance, visitor management, and access control needs. Its mobile credential options of QR code and mobile access cards can also satisfy contactless and non-face-to-face needs. I’m excited to see how the market will respond to X-Station 2,” said Hanchul Kim, CEO of Suprema Inc.
Redline, an Air Partner company and a provider of global security solutions, has recently secured six business wins with both UK and international customers, totaling in excess of £1 million in revenues. Customers include international airports, public transport operators, regulatory bodies, and government support agencies. In a demonstration of continued customer trust in Redline's services, four of these six contracts were renewals or extensions. This includes a three-year contract renewal by Edinburgh Airport for Redline's x-ray threat image recognition training (TIRT) system. Included in the new work is a two-year contract with Teesside International Airport for a digital Security Management System (SeMS). Advanced TIRT system Redline is seeing increased demand for its security solutions as airports start to scale up operations, including for its user-friendly and technically advanced TIRT system, which has been designed to finetune x-ray image screeners' ability to detect even the smallest components of viable threats. Meanwhile, its proprietary SeMS, which allows managers to effectively assess and manage risk in an ever-changing threat environment, is also gaining good traction with customers. Launched training academy NSSA's new name reflects the fact that the academy now also provides Baines Simmons safety training In order to assist businesses across the aviation industry as they plan for the return of international travel, Air Partner has also recently launched its newly branded National Safety & Security Academy (NSSA) in Doncaster, which was previously the National Security Training Centre (NSTC). The NSSA's new name reflects the fact that the academy now also provides Baines Simmons safety training in addition to Redline's security courses. Digital SeMS Commenting on Redline's appointment, Phil Forster, Managing Director at Teesside International Airport, said, "The airport is on an exciting journey of transformation and growth, with Redline playing a key part in our future success. Digital SeMS is a welcome enhancement that will help us to manage and improve our security performance." Enhanced product offerings Mark Briffa, CEO of Air Partner, added, "We are very pleased to see a strong rebound in demand for Redline's services in anticipation of lockdown measures and travel restrictions lifting. It is a testament to our first-class product offering and customer service that both new and existing customers, from international airports to government departments, continue to place their trust in us.” “We are very confident about Redline's prospects and we expect to see the true value of this division come through in the current financial year. We look forward to welcoming customers old and new to our newly re-branded National Safety & Security Academy, where we now offer safety and security training from Baines Simmons and Redline under one roof."
Zscaler, Inc., a pioneer in cloud security announced its new Ransomware Report featuring analysis of key ransomware trends and details about the most prolific ransomware actors, their attack tactics, and the most vulnerable industries being targeted. The Zscaler™ ThreatLabz embedded research team analysed over 150 billion platform transactions and 36.5 billion blocked attacks between November 2019 and January 2021 to identify emerging ransomware variants, their origins, and how to stop them. The report also outlines a growing risk from “double-extortion” attacks, which are being increasingly used by cybercriminals to disrupt businesses and hold data hostage for ransom Increasing ransomware threats “Over the last few years, the ransomware threat has become increasingly dangerous, with new methods like double extortion and DDoS attacks making it easy for cybercriminals to sabotage organisations and do long-term damage to their reputation,” said Deepen Desai, CISO and VP of Security Research at Zscaler. Source and measures “Our team expects ransomware attacks to become increasingly targeted in nature where the cybercriminals hit organisations with a higher likelihood of ransom payout. We analysed recent ransomware attacks where cybercriminals had the knowledge of things like the victim's cyber insurance coverage as well as critical supply-chain vendors bringing them in the crosshairs of these attacks." "As such, it is critical for businesses to better understand the risk ransomware represents and take proper precautions to avoid an attack. Always patch vulnerabilities, educate employees on spotting suspicious emails, back up data regularly, implement data loss prevention strategy, and use zero trust architecture to minimise the attack surface and prevent lateral movement.” National security threat Ransomware was the third most common and second most damaging type of malware attack recorded in 2020 According to the World Economic Forum 2020 Global Risk Report, ransomware was the third most common and second most damaging type of malware attack recorded in 2020. With payouts averaging $1.45M per incident, it's not difficult to see why cybercriminals are increasingly flocking to this deepens new style of high-tech extortion. As the rewards that result from this type of crime increase, risks to government entities, company bottom lines, reputation, data integrity, customer confidence, and business continuity also grow. Zscaler’s research supports the narrative recently established by the U.S. federal government, which classifies ransomware as a national security threat; underscoring the need to prioritise mitigation and contingency measures when protecting against these ongoing threats. Double-extortion method In late 2019, ThreatLabz noticed a growing preference for “double-extortion” attacks in some of the more active and impactful ransomware families. These attacks are defined by a combination of unwanted encryption of sensitive data by malicious actors and exfiltration of the most consequential files to hold for ransom. Affected organisations, even if they are able to recover the data from backups, are then threatened with public exposure of their stolen data by criminal groups demanding ransom. In late 2020, the team noticed that this tactic was further augmented with synchronised DDoS attacks, overloading victim’s websites, and putting additional pressure on organizations to cooperate. According to Zscaler ThreatLabZ, many different industries have been targeted over the past two years by double-extortion ransomware attacks. The most targeted industries include the following: Manufacturing (12.7%) Services (8.9%) Transportation (8.8%) Retail & wholesale (8.3%) Technology (8%) Most active in ransomware Over the last year, ThreatLabz has identified seven “families” of ransomware that were encountered more often than others. The report discusses the origins and tactics of the following top five highly active groups: 1) Maze/Egregor Maze targeted were high-tech (11.9%) manufacturing (10.7%), and services (9.6%) industries Originally encountered in May 2019, Maze was the ransomware most commonly used for double-extortion attacks (accounting for 273 incidents) until it seemingly ceased operations in November 2020. Attackers used spam email campaigns, exploit kits such as Fallout and Spelevo, and hacked RDP services to gain access to systems, and successfully collected large ransoms after encrypting and stealing files from IT and technology companies. The top three industries Maze targeted were high-tech (11.9%) manufacturing (10.7%), and services (9.6%). Mase notably pledged to not target healthcare companies during the COVID-19 pandemic. 2) Conti First spotted in February 2020 and the second most common attack family accounting for 190 attacks, Conti shares code with the Ryuk ransomware and appears to be its successor. Conti uses the Windows restart manager API before encrypting files, allowing it to encrypt more files as part of its double-extortion approach. Victims that won’t or are unable to pay the ransom have their data regularly published on the Conti data leak website. The top three industries most impacted are manufacturing (12.4%), services (9.6%), and transportation services (9.0%). 3) Doppelpaymer First noticed in July 2019 and 153 documented attacks, Doppelpaymer targets a range of industries and often demands large payouts - in the six and seven figures. Initially infecting machines with a spam email that contains either a malicious link or malicious attachment, Doppelpaymer then downloads Emotetand Dridex malware into infected systems. Doppelpaymer’s top three most targeted organisations were manufacturing (15.1%), retail & wholesale (9.9%), and government (8.6%). 4) Sodinokibi Sodinokibi uses spam emails, exploit kits, and compromised RDP accounts in Oracle WebLogic Also known as REvil and Sodin, Sodinokibi was first spotted in April 2019 and has been encountered with increasing frequency with 125 attacks. Similar to Maze, Sodinokibi uses spam emails, exploit kits, and compromised RDP accounts, as well as frequently exploiting vulnerabilities in Oracle WebLogic. Sodinokibi started using double-extortion tactics in January 2020 and had the greatest impact on transportation (11.4%), manufacturing (11.4%), and retail/wholesale (10.6%). 5) DarkSide DarkSide was first spotted in August 2020 after putting out a press release advertising its services. Using a “Ransomware-as-a-Service” model, DarkSide deploys double-extortion methods to steal and encrypt information. The group is public about its targeting manifesto, writing that it does not attack healthcare organisations, funeral services, education facilities, non-profit organisations, or government entities on its website. Instead, the primary targets of choice are services (16.7%), manufacturing (13.9%), and transportation services (13.9%). Similar to Conti, those that cannot pay the ransom to have their data published on the DarkSide leak website.
ASSA ABLOY has invested in Paravision, an advanced facial recognition solutions provider, and is recognised for its world-class leadership in accuracy. Facial recognition solution "The investment in Paravision is a strategic technological investment for the ASSA ABLOY Group and will accelerate the development of biometric solutions that leverage facial recognition algorithms and provide complementary growth opportunities,” says Nico Delvaux, President, and CEO of ASSA ABLOY. “In partnership, HID and Paravision have already cooperated on projects and we look forward to further advancing our collaboration across a number of different markets and use cases,” says Björn Lidefelt, Executive Vice President and Head of Global Technologies business unit HID Global. Secure user experience The investment aligns with HID Global’s strategic direction to embed facial recognition into solutions for a seamless and highly secure user experience in a variety of identity verification and authentication applications, including access control.
LenelS2 introduced its indoor location subscription-based service for businesses and other organisations using LenelS2’s BlueDiamond™ mobile app version 2.1.8 for smartphones. Touchless solutions This new premium mobile app service complements LenelS2’s touchless access solutions by providing users with: the ability to quickly pull up a map to determine the current location within a building, search for points of interest, use turn-by-turn directions for efficient navigation and unlock doors directly from a building map. The service is an advanced solution in Carrier’s Healthy Buildings Program. LenelS2, an advanced security systems, and services company is a part of Carrier Global Corporation, the global provider of healthy, safe, and sustainable building, and cold chain solutions. Efficient building navigation “Our new BlueDiamond Indoor Location service raises the bar for mobile credential app capabilities. BlueDiamond mobile credential holders can confidently find their way within buildings, enabling easier, more efficient building navigation,” said Ernie Chan, General Manager, BlueDiamond and Value-Added Services, LenelS2. “This new capability expands the ways credentialed users experience touchless access control, including unlocking doors in their path.” Unlock with voice commands For customers utilising the LenelS2™ OnGuard® or NetBox™ access control security systems, the Indoor Location service provides app users with convenient facility-wide navigation. From corporate campuses to entertainment venues, hospitals, convention centres, and more, users can quickly get directions by pulling up a map from their smartphone to show their current location and search for points of interest such as meeting rooms, exits, and more. Users can also unlock doors using voice commands for an enhanced touchless access experience In combination with BlueDiamond readers, users can also unlock doors using voice commands or other app features for an enhanced touchless access experience. Compatible with various technologies The Indoor Location service is hardware-agnostic, allowing it to work with various technologies including Wi-Fi, Bluetooth Low Energy, and virtual beacons. Organisations can digitise facility maps and define dynamic points of interest. The beacons deployed throughout the facility enable the app to triangulate the smartphone’s location for display on the map. The Indoor Location service joins the recently announced Contact Notification service as part of BlueDiamond mobile app version 2.1.8 that also includes a variety of non-subscription-based updates to improve the access control and user experience.
Installing effective security infrastructure on a property involves a thorough risk assessment and deploying a comprehensive solution that takes all possible threats into consideration. For example, if the security solution only addresses the threat of vehicular attack and disregards the risk associated with pedestrian trespassers, one may be leaving themselves unnecessarily vulnerable to breaches by unauthorised personnel on foot. Delta Scientific understands the risks that trespasses by pedestrians can pose to a facility, especially one where sensitive operations take place. That’s why; the company is pleased to introduce a new product, the anti-climb pedestrian door. Standard security features The anti-climb door comes equipped with an electronic keypad door handle, as well as a manual to guide through the programming process. One can specify whether they want a weather-proof keypad for an outdoor installation or a standard one for indoors. In addition to the electronic keypad, there is also a latch to secure the door further with a padlock if desired. The latch is standard, but a padlock is not included. No matter the weight of the door, the standard heavy-duty hinges allow for ease of opening and closing. The door can easily be installed by drilling into an existing fence post and using the tamper-resistant lock nuts and carriage bolts to connect it to the frame. These connections are on the secure side of the fence, making them even more difficult to compromise. A standard anti-climb screen fence consists of 14-gauge wire in a 5/8 mini-mesh. Customisation options Regardless of the size of the opening one needs to protect, the door will be built to fit it. While fence meshing is standard, one may choose from several other materials for the door: Glass (tinted or non-tinted Pickets Solid panels Expanded metal All of these options are designed to prevent climbing by pedestrians, just as the standard fence meshing is. Additionally, one may choose from either the standard door closers or automatic door closers. If one wishes to improve ease of egress, they may have a push bar installed for exiting quickly through the door from the secure side. This will not affect the functioning of the features on the outside. If one requires a gun port for the door, this is an option as well. Electric door latches are also available, and one may choose from hard-wired or battery-powered options. Some applications The anti-climb pedestrian door would be suitable for a facility with restricted access due to sensitive operations, such as a military installation or research facility. Not only would it deter bad actors trying to breach the property with malicious intent, but it would also discourage casual trespassers with no specific objective other than to go where they are not supposed to. A breach by any unauthorised personnel represents a security risk, even if it was carried out with no specific criminal intent. A hardened anti-climb pedestrian door is a component of a comprehensive security solution for the property.
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Security Professionals will need to develop an effective site plan to include where and when to conduct vulnerability assessments, implement focused mitigation strategies, and examine resources available to the food defence practitioner to minimise risk exposure and meet outlined regulatory requirements. Food Drug Administration’s proposed rule on food defence The FDA’s proposed rule on food defence would require facilities to address vulnerable processes in their food supply operations to prevent acts of intentional adulteration intended to cause large-scale public harm. Some background on what led to this aspect of the rule may provide insight into its key elements. The Act was signed into law on January 4, 2011 to better protect human and animal health by helping to guarantee the safety and security of the food and feed supply. Its focus was to ensure that the U.S. food supply is safe by shifting the focus of federal regulators from responding to contamination to preventing contamination. The law also provides FDA with new enforcement authorities designed to achieve higher rates of compliance with prevention & risk-based food safety standards, and to better respond to and contain problems when they do occur. Danger of large-scale public health harm Intentional adulteration includes those types of acts committed by disgruntled employees, consumers, or competitors where the intention is to cause large-scale public health harm; or by economically-motivated adulteration. Acts of disgruntled employees, consumers, or competitors are generally directed at attacking the reputation of the company and not at causing public health harm. The primary purpose of economically-motivated adulteration is to obtain economic gain, and not to impact public health, although public health harm may occur. From a historical perspective, the threat to the food supply chain has been evident for decades. Examples include during World War I when German agents in the U.S. infected horses and cattle in transit across the Atlantic to France; to al Qaeda documents and manuals found in Afghanistan after the 2001 U.S.-led invasion revealed interest in conducting chemical & biological attacks on food supplies; to 2014 when a Chinese court sentenced a former plant employee to life in prison after the poisoning of frozen dumplings that made at least 10 individuals ill. An effective overall site security plan will soon require the aspect of food defence to protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal, intentionally harmful means. The rule applies to facilities required to register as “food facilities” under Section 415 of the Food, Drug, and Cosmetics Act. Facilities covered under the rule would be required to develop a “Food Defence Plan” and identify and implement mitigation strategies to minimise or prevent significant vulnerabilities in food operations. The four key activities within the food system that are the most vulnerable to intentional adulteration, and have the potential to cause large scale public harm, are defined as liquid receiving and loading; liquid storage and handling; secondary ingredient handling; and mixing and similar activities. Each facility will be required to conduct a reanalysis of its Food Defence Plan at least once every three years Food Defence Plan against intentional contamination Covered facilities would be required to review their production systems to determine if they have any of these activity types and conduct their own vulnerability assessment to identify and prioritise points in their food operations that may be vulnerable to intentional adulteration. For the first time, FDA will have a legislative mandate to require comprehensive preventive controls across the food supply. This mandate includes compulsory preventive controls for food facilities to include the implementation of a written preventive controls plan. This plan involves: Evaluating the hazards that could affect food safety Specifying what preventive steps, or controls, will be put in place to significantly minimise or prevent the hazards Specifying how the facility will monitor these controls to ensure they are working Maintaining routine records of the monitoring Specifying what actions the facility will take to correct problems that arise. Each facility would be required to conduct a reanalysis of its Food Defence Plan at least once every three years, or following certain conditions (e.g., significant change in facility operations, new information about potential vulnerability, etc.). Personnel and supervisors assigned to the Actionable Process Steps would be required to receive appropriate training in food defence awareness and in their responsibilities for implementing Focused Mitigation Strategies. Facilities would be required to maintain certain records, including the written Food Defence Plan, personnel training documentation, and records related to monitoring, verification, and corrective actions. Lastly, as the issuing of the Final Rule approaches, the FDA has proposed to also publish a guidance document that provides the requirements in plain language to help businesses, particularly small businesses, comply with the identification of actionable process steps and implementation of focused mitigation strategy requirements. Industry can prepare now by conducting a comprehensive security assessment of their facilities to include the site perimeter, access control, security & emergency procedures, shipping, receiving & warehouse storage security practices, on-site security personnel, law enforcement outreach, site utilities, suppliers, hazardous materials/chemicals, criminal background check programs, cyber security, employee security awareness training, incident reporting & documentation, and recordkeeping requirements. The FDA website also includes useful information on FSMA, as well as links to their software programs such as the “Food Defence Plan Builder” that is designed to assist in developing a food defence plan based on a user entering specific answers relevant to their facility.
Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from greater awareness of the different uses for surveillance, as well as more accurate and robust technology. According to research firm Memoori's 2015 annual report on physical security, video surveillance products were 54 percent of total sales and accounted for $14.68 billion, topping intruder alarms which came in at 23.5 percent and $6.40 billion and with access control garnering $6.13 billion and 22.5 percent of the total. The report further indicates that the industry overall has edged up at a compound annual rate of 7.82 percent since 2010 and forecasts growth for total security equipment up some eight percent in 2016, reaching almost $42 billion over the next five years to 2020. Steve Stowe, Vice President of BAP Security in Macon, Georgia., is keen on the higher feature sets and intrinsic value of video surveillance applications for the company’s prospects and customers. BAP Security has been in business since 1967, offering custom security solutions for residential and commercial subscribers in Georgia, North Carolina, South Carolina and Florida. Video analytics on a roll Stowe says he expects to see higher adoption of video analytics as it becomes a more common feature in even lower-cost equipment. “We have more and more people asking about line-crossing detection in particular. Many customers are also looking at upgrading older analogue CCTV equipment since we can economically match the 1080P resolutions they are used to seeing on their televisions with HD-TVI, HD-SDI and other HDcctv technologies while still using their existing cabling infrastructure. There are still many customers who have seen the value at one point in time to invest in a CCTV system – we can now help them migrate cost-effectively and offer much improved picture quality than what they are used to,” Stowe says. Video analytics is becoming an increasingly common video surveillance feature,even in lower-cost equipment According to Stowe, businesses with personnel who have one-on-one contact with their customers such as office reception areas, teller stations and others are looking at adding cameras to record these interactions in case there is a problem, possibly even recording video with audio when appropriate. “Even customers who don't want a complete CCTV solution can use a more limited, standalone system or even IP cameras with edge recording,” he says. Replacing intrusion detection with CCTV Increased awareness by the general public regarding the advantages of surveillance is also fuelling an interest in video installations, Stowe says. “Homeowners are asking about CCTV more than ever before, and most of the people we are talk to are looking for a lot more than the simple plug-and-play cameras being sold by mass marketers. They want good, high-definition cameras to watch their driveways, HVAC units, garages, shops and even their pets.” The commercial market is also experiencing an uptick, especially for integrated installations. “Some commercial markets such as factories, multi-tenant properties and churches are looking more at integrating CCTV with other systems such as access control. Capturing the video as the door is accessed along with who and what might be with the cardholder is information that is important to them, whether it is to catch internal theft or making sure the tenant is not letting others access the property or even for child safety.” Looking ahead, word on the street is that CCTV installations may eventually take the place of traditional intrusion detection sensors. Motion detection, analytics and integration with audio or other technology continues to increase the power of surveillance specifications for loss prevention and more.
Cybersecurity is a fast-changing field and 2015 was no exception. The proliferation of cybersecurity issues continued to make headlines, including the very dramatic hacking of a vehicle to allow for remote control over steering, brakes, the transmission and other critical functions. There was also state-sponsored hacking that targeted government, defence and other strategic sectors of the marketplace. Staying on top of these breaches still remains a challenge. Securing the Internet of Things While we can’t discuss the details of our projects over the past year, we are proud to say that NTT Com Security has been successful in identifying new vulnerabilities in mobile devices, home security systems, and automotive telematics interfaces. These are all part of the important area of the “Internet of Things” that will continue their climb into the information security headlines in 2016. For the New Year, we are anticipating a broader focus beyond the servers, workstations and communications infrastructure that we are used to, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices, and myriad other devices that will eventually all be connected to the Internet – and therein lies the ongoing task. The Internet in general is extremely vulnerable, and companies and individuals have a long way to go in learning how to protect themselves. We can expect continued attacks targeting payment card data wherever it can be found along with attempts to commit financial fraud with stolen banking credentials or via social engineering tricks like spear phishing emails. High profile breaches, such as the Edward Snowden leaks, have brought security to the forefront of the public consciousness Security and risk management Fortunately, these high-profile breaches, hack demonstrations (like the Jeep hack), and the Snowden leaks have all helped bring the topic of security directly into the public consciousness. With consumers becoming aware of the value of their information and the importance of protecting their privacy, companies will be forced to design security into their products. We are already seeing a public demonstration of this with the new security and encryption controls Apple has implemented on the iPhone. Meanwhile, talking about risks and vulnerabilities can sometimes feel like shouting at a crowd that refuses to listen despite the obvious danger they are in. The good news is that we are taking active steps to guard against risk and combat it where it happens. NTT Com Security has developed a global cybersecurity and risk management portfolio of managed services, consulting and technology solutions to protect critical and confidential data from attacks. See the full coverage of 2015/2016 Review and Forecast articles here
Integrated security manufacturer TDSi announces the new integration of its powerful GARDiS access control range with Thinking Software’s RotaOne Time & Attendance platform. The new integration enables businesses and organisations to incorporate the two market-leading solutions, providing a complete overview of staff movements and the security of facilities. Time & attendance solution Reflecting on the new integration, Gwen Curran, Channel Partner Manager North at TDSi commented, “GARDiS is designed to not only deliver the most secure of integrated access control solutions but also to be highly flexible and adaptable to the needs of our customers.” “As a highly popular Time & Attendance solution, RotaOne is the perfect integration partner for GARDiS, enabling users of both systems to link their technology investments and enjoy the benefits of combining data and having a powerful overview of operations.” Integrated access control TDSi’s GARDiS represents the best-of-breed in access control and working together means ease of benefits to our customers The integration with TDSi’s GARDiS platform was a clear choice for Thinking Software too, as Paul Coombes, Sales and Marketing Director also commented, “No systems developer can specialise in all areas of expertise, so integration is a far better approach than trying to be the best at everything.” “TDSi’s GARDiS represents the best-of-breed in access control and working together means we can both add additional ROI and ease of management benefits to our customers.” Central monitoring Integrating GARDiS with RotaOne enables businesses to mitigate risk by ensuring staff is safe and facilities are secure. It also provides an accurate record of people's movement, which is perfect for the time and cost savings when running a business that employs contracted, casual, and salaried staff on complex or repeating shift patterns. The integrated solution also ensures full monitoring for compliance reporting and safety. Cloud compatibility Integration is backward compatible with existing installations to provide a professional solution for customers For added flexibility and resilience RotaOne can be deployed remotely and hosted in the cloud (either private or securely shared) and is fully scalable - from a small SME team up to a full multi-national enterprise. Integration is backward compatible with existing installations (running the latest updates of both platforms) and both TDSi and Thinking Software offer their solutions through fully trained installation partners, to provide a professional integration solution for customers that can be swiftly implemented. Integrated systems Gwen Curran concluded, “As the world begins to adjust to the complex post-pandemic landscape, integrated systems will be at the forefront of enabling people to get back to work successfully, managing social distancing and reducing the possibilities of cross-infection.” “We are proud that by integrating two solutions that are best-of-breed in their respective spheres, we can help businesses get back to concentrating on their core functions with full peace of mind.”
As a small town in Belgium became one of the most important vaccine sites in the world, in the global fight against the coronavirus (COVID-19 virus), the G4S team in Puurs was ready to scale up rapidly, to meet the growing demand for security on site. At the beginning of 2020, nobody in the Belgian town of Puurs, located between Brussels and Antwerp, could have known how globally significant a role their small town would come to play in the year that followed. COVID-19 vaccine manufacturing facility Mostly known for producing the strong Belgian beer, Duvel, Puurs has also been the home of one of Pfizer’s largest production and packaging sites worldwide for over 50 years. In a normal year, before COVID-19 was a concern, the American pharmaceutical company produced more than 400 million doses of vaccines and medicines in Puurs every year. Now, with the global COVID-19 pandemic continuing to cause devastation across the world, Pfizer has become a household name, synonymous with one of the leading COVID-19 vaccines being distributed worldwide, in order to help countries emerge from the crisis. G4S security services For the last ten years, G4S has been a proud part of the team providing security services for the site in Puurs, Belgium For the last ten years, G4S has been a proud part of the team providing security services for the site in Puurs, Belgium. However, the security solutions provided have changed substantially since then. “There has definitely been a significant evolution over the years in G4S’s role for Pfizer at Puurs,” said Dirk Clauwaert, Senior Operations Coordinator for G4S Belgium, adding “When we started out we were only contracted to provide on-call security. Now, we have a fully integrated security solution at the site that gives Pfizer’s employees and assets a very high standard of security.” Site safety and security The high standard of security recently caught the attention of King Filip of Belgium’s personal security team, during a visit to the Puurs site, who congratulated the G4S team for the sophisticated security measures, keeping the site safe and secure. The solutions that G4S provides at all hours at the site include camera surveillance, access control, safety checks, security officer patrols and response, and personnel checks of anybody attending the site. Highly robust service and operational excellence “We’re especially proud to have played our part at a site that has become so globally significant due to the COVID-19 vaccine,” said Dirk Clauwaert, adding “The site has had to expand substantially, with many new buildings and car parks. We’ve ensured our security operations are flexible and can scale up as needed to meet any extra requirements.” The G4S Puurs team was also awarded the G4S Excellence Award for the Best Performing Security Site across Europe and the Middle East for 2020. “Pfizer demands a highly robust service with operational excellence,” said Ciaran Comiskey, G4S Director of Global Operations, adding “The G4S team has always strived to meet and exceed this expectation, in particular, during the ongoing COVID -19 pandemic.”
Traffic management takes many forms. Traffic management can involve closing a roadway during a major city event such as a motion picture awards show or traffic management can simply entail a traffic arm that raises and lowers after a fee has been paid in a parking garage. Traffic management can include directing traffic in one direction during peak hours or closing a facility to vehicle traffic after hours. It can also prevent wrong-way entry or ensuring vehicles cannot encroach on pedestrian areas. Barriers for security In most cases, it is quite easy to breach the entrance to the parking lot. Once entered, the vehicle can pick up speed to crash through one of the gates or entrances to get within the stadium itself. To provide increased security, Delta Scientific DSC501 barriers are used at the Mercedes Benz Stadium in Atlanta at main entrances where players and VIPs, among others, enter with their cars. K54 certification The DSC501 protects against a “second hit” risk from a second vehicle The DSC501 is the only K54-certified retractable vehicle barricade in the world. Set in a foundation only 18 inches deep, it will survive and operate after a 5.4-million foot-pound impact. That’s equivalent to a 65,000-pound truck hitting it at 50 mph. Stopping the truck or car dead in its tracks, the DSC501 protects against a “second hit” risk from a second vehicle. Deployable vehicle crash barriers In another example, on May 22, 2020, an armed assailant attempted to drive through entryway gates at the Naval Air Station-Corpus Christi. The suspect was stopped almost instantaneously. A wounded sailor, a security team member, managed to raise a barricade despite her injuries. The shooter, the would-be trespasser, died in the incident, which could have been made much worse had the station not taken appropriate measures to keep intruders at bay. At this location, the totally self-contained Delta Scientific MP5000 mobile deployable vehicle crash barriers guarding that base carries an ASTM rating as high as M50, able to stop and disable a 15,000 lb (66.7 kN) G.V.W. vehicle moving at 50 mph (80.4 kph). The barricade tows into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. To remove, procedures are reversed and the barriers are towed away. Traffic control devices With so many traffic management scenarios, it is no wonder that Delta Scientific manufacturer’s more than fifty types of barriers and traffic control devices. Delta can assist any facility in controlling the flow of traffic through devices such as traffic arms, lights, spike teeth or even crash tested vehicle barricades.
FLIR Systems, Inc. announced it has won a contract with the Defense Advanced Research Projects Agency (DARPA) to rapidly develop novel fabrics with embedded catalysts and chemistries that can fight and reduce chemical and biological threats upon contact. The revolutionary fabrics will be incorporated into protective suits and other equipment such as boots, gloves, and eye protection that can be worn by troops on the battlefield, medical experts, healthcare workers, and more. FLIR received $11.2 million in initial funding for the potential five-year effort worth up to $20.5 million, including options. Incorporating lightweight materials The goal of DARPA’s Personalized Protective Biosystems (PPB) program is to reduce the substantial weight and physiological burden of current Personal Protective Equipment (PPE) so soldiers and other specialists can better perform their tasks. PPB will combine novel, lightweight protective materials with new prophylactic medical technologies that mitigate chemical and biological threats at vulnerable tissue barriers, notably the eyes, skin, and lungs. The complete system will enable first responders to operate without the burden of carrying and wearing PPE The complete system will enable troops and first responders to operate without the burden of carrying and wearing PPE, which can cause heat stress and reduce time spent completing the mission. First-of-its-kind protective fabrics “With lives at stake, future operators wearing PPB suits will gain a major edge in staying protected from toxic chemicals and emerging biological threats such as dangerous viruses,” said Mark Stock, VP, and general manager of the Sensor Systems business at FLIR. “We’re honored DARPA has chosen us to lead this extraordinary and highly innovative effort to develop first-of-its-kind protective fabrics for our nation’s warfighters, health, and public safety officials.” Prototype for testing FLIR and its teaming partners will develop a prototype fabric material, the Integrated Soldier Protective System (ISPS), for testing by government laboratories. Work will be performed at FLIR facilities in Pittsburgh. The ISPS award consists of a two-year base period, two-year first option, and one-year final option. The result after five years will be a suite of prototype protective fabrics and garments ready for the transition to a program of record with the U.S. Department of Defense.
Since 2016, the cannabis industry has advanced quickly and so has the company. They’ve become a world pioneer in the research and development of plant genetics, specialising in cannabinoid extracts. With this in mind, a security solution was required to detect, deter, and defend the three sites in which Rua Bioscience operates within New Zealand. Integrated security solution “When the medicinal cannabis regulations were released in December 2019, we needed a security system in place that would not only meet these regulations but also limit access and keep staff safe,” said Paul Naske, Chief Operations Officer at Rua Bioscience. Naske continued, “When we built the sites to cultivate medicinal cannabis, there were no defined standards for such sites. We looked at what other sites across the world had done and so we chose to learn from those." "We worked with Aotea Security to develop an integrated security solution that included a monitored pulse fence, access control, and CCTV, which provides a high-security environment for what we require. The Gallagher system was the best option for us because it can provide all this and more.” Multi-site access A security system that would not only meet the regulations but also limit access and keep staff safe With two sites used for the growing and cultivation of cannabis plants and one head office, Rua Bioscience required multi-site access. Naske said, “In the future, we will increase employee numbers and employ contractors, and so access to zones will be more prominent along with access to multiple sites. We are also investigating the requirement for personal duress because of the nature of the work we do here.” Rua Bioscience has huge growth plans and is working towards the manufacture of GMP-certified, quality-assured medicinal cannabis as Active Pharmaceutical Ingredients and products, for domestic and global customers. The flexibility of the Gallagher system is key as the business evolves.
The Tatua Co-operative Dairy Company manufactures markets and sells specialised dairy ingredients and food products, 90% of which are exported around the world. Tatua’s security system was recently upgraded to ensure world-class access control and boundary security that enhanced Tatua’s globally recognised food safety and quality programme. This upgrade has provided additional assurances for customers who purchase the company’s food and ingredient products. Layered security solution At its manufacturing site at Tatuanui, near Morrinsville in New Zealand’s dairying region, Tatua invested in a layered security solution, protecting the site from the outside in. The Gallagher monitored pulse fence acts to deter and defend against would-be intruders. Inside the facility, a range of access control products are used to ensure people entering the facility are who they should be, and have current Health & Safety site induction competencies. This allows them authorisation to work on-site and, if required, in specific production areas. Tatua operates 24/7 and has 370 employees, over 1300 inducted contractors, and numerous trucks and milk tankers accessing the site daily. It is crucial the access control system can perform several functions to ensure the site is safe and secure. Integrated security The Gallagher system can integrate with multiple security products from CCTV to biometric readers Integration was a key factor when choosing a Gallagher system. Projects Engineer, Grant Webb, said, “We have multiple areas which need specific security requirements. As the Gallagher system can integrate with multiple security products ranging from CCTV to biometric readers, it ensures the right people have the right access to specific areas on site.” Fingerprint recognition Morpho fingerprint readers provide primary access onto the site and into buildings. As there are so many people on-site, and because contractors can change on a regular basis, fingerprint readers eliminate the need for access cards, which saves both time and money. It also reduces the need for anyone entering production areas to carry an access card, which is a potential source of product contamination. Licence plate recognition Milestone Licence Plate Recognition (LPR) is used at the three entrance gates to the tanker bay. Details of the tankers delivering milk and chemicals to the site are loaded into the CCTV system interface. This links to the Gallagher Command Centre, so when a tanker arrives at a gate, the LPR system identifies the pre-registered licence plate. This feeds back to Command Centre and grants access to approved vehicles. “There are over 60 tankers registered, that previously had key fobs that would go missing with no record of who held the fob,” says Webb. “LPR makes the delivery of milk and chemicals more efficient and has eliminated the need for swipe card readers and mounting posts that would traditionally be required to gain entry to this area.” Command centre The milk testing system in the tanker bay has been integrated into Command Centre. The hoses in the bay are always locked. When a tanker arrives, the driver first completes an inhibitory substance test on a load of milk. If the milk test is clear, the Gallagher system releases the locks on the milk inlet hoses via integration with the site’s supervisory control and data acquisition (SCADA) system, programmable logic controller (PLC), and milk testing system. If the test is positive, an external alarm is raised within the SCADA system, and the hoses remain locked so milk can’t be delivered. This mitigates milk contamination and improves product safety. PLC system integration The integration with the PLC system has allowed the Command Centre lockdown feature to be enabled within the tanker bay Further integration with the site PLC system has allowed the Command Centre lockdown feature to be enabled within the tanker bay. So, when clean-in-place (CIP) cleaning is active, the area is automatically placed into lockdown. This excludes trucks and personnel from entering the area when dangerous chemicals and hot water are being used. Window button integration Forklift entry into warehouses is access controlled via Nedap Window Button integration with Command Centre. The Nedap system provides a long-range vehicle identification tag for secure vehicle access to major airlocks into manufacturing plants, where forklifts deliver raw goods and ingredients. This system ensures that only authorised forklift drivers can open the airlock. The doors on either side of the airlocks are controlled via interlock door rules created in Command Centre. The interlock rules only allow one door to be open at a time, thereby maintaining the integrity of the hygiene zone of the manufacturing plant. Both of these systems help mitigate product safety risks on site. Simplifying security processes Department employees also find the personal data fields important for recording health and safety qualifications, such as working at heights. When a contractor arrives, staff can check the contractor has the right qualifications to work in the area they are entering. Contractor management When the site induction competency is due to expire, the contractor receives an SMS notification. Their supervisor will also receive an email. Another feature of the Gallagher system that Tatua uses is the reporting function. This is used as part of the company’s ongoing contractor management. The use of a QR code for preregistered visits and visitor passes makes the sign in and sign out process very quick and simple A separate report is sent to each company with an inducted employee, to advise contractor managers/ supervisors on the induction status of their employees, which are emailed out on a monthly basis. This ensures the contracting companies have people with authorised access to the site and allows them to schedule their own re-inductions when required. Reporting is also used to check activity at the monitored pulse fence. Visitor management A visitor management kiosk is located at the main reception for all visitor registrations. It requires all visitors to read and accept Tatua’s terms and conditions of entry, including Health and Safety rules before a visitor pass is issued. Once signed in, the Tatua host receives an automatic SMS and email notification of their visitor’s arrival. “The use of a QR code for preregistered visits and visitor passes makes the sign in and sign out process very quick and simple,” says Webb. Multiple levels of security Webb concludes, “Our security solution from Gallagher offers so much more than access control. Integration is key to ensuring we add multiple levels of security in areas such as delivery and dispatch, milk collection, and more. This ensures the site runs smoothly, minimising health and safety risks to employees and contractors, and maintaining quality and product safety standards.”