Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access. It also secures networks by expanding its behavioural analytics to IoT devices, detecting anomalies and preventing their compromi...
ASSA ABLOY the global provider of door opening solutions, has issued its whitepaper in response to Dame Judith Hackitt’s Independent Review of Building Regulations and Fire Safety, following the Grenfell Tower incident of 2017. The whitepaper summarises practical recommendations derived from the key points made within the Independent Review and advises ways in which the industry can work together towards best practice. Fire door installation solutions Compartmentation has been highlight...
SmartTask, the provider of employee scheduling and mobile workforce management software, has launched a vetting solution to help security companies meet the stringent requirements of the BS7858 vetting standard. SmartTask Vetting has been designed to ensure that security service providers are not overlooking this essential staff screening requirement, while following a consistent and approved process. “We recognised a growing need for sophisticated and streamlined vetting procedures, espe...
Ho Chi Minh City welcomes Vietnam’s largest trade fair for the safety, security and fire sectors this week, as security industry stakeholders from around the world gather at the Saigon Exhibition and Convention Center for the 11th edition of Secutech Vietnam. The rising security requirements of Vietnam’s commercial and residential property sectors have set the stage for a fruitful three days of business at the show, which takes place from 16 – 18 August 2018. A new zone showca...
Greenpeace have posted footage on their Facebook page of them flying a drone into a French nuclear facility. The group have claimed the stunt was performed to highlight security issues around the facility. The facility was reportedly "at no time worried about the drone or attempted to intercept it". It was crashed into the tower in Bugey, a town around 30km away from the major city of Lyon. With the use of drones growing exponentially, now is the time to act against the potential negative threa...
Everyone can agree the convergence trend is in full force in the electronic security industry and organisations are pushing more and more for integrated solutions that can not only enhance ROI but also solve problems that have traditionally been out of the realm of electronic physical security systems. This leaves system integrators and other solution providers in a difficult position as they scramble to be competitive especially when faced with an industry dominated by a few power players. Tack...
Hikvision, the world's premier supplier of innovative video surveillance products and solutions, has launched a range of groundbreaking face recognition terminals. Hikvision’s face recognition terminals are embedded with deep-learning algorithms for access control and office scenarios for improving building operations, workforce management and safety operations. Hikvision's face recognition terminals Three face recognition terminal models are available, each one uniquely and flexibly designed for a wealth of applications and scenarios: Wall-Mounted Face Recognition Terminal – DS-K1T604MF & DS-K1T606MF Base- or Wall-Mounted Face Recognition Terminal – DS-K1T605MF Face Recognition Component for Access Turnstile – DS-K5603-Z All three of these models are easy to install and use. The wall-mounted terminal is well-suited for quick access at an entrance. The base & wall-mounted terminal can be mounted on convenient vertical surfaces or on the front desk. The face recognition component is designed for use in conjunction with access turnstiles. If needed, this model can be rotated horizontally upon installation for capturing facial images at the most effective angle. Various models and types are available with a wide variety of front-end or back-end combinations to meet a multitude of scenarios and environments. Hikvision’s face recognition terminals support 1:1 or 1:N matching modes, authentication via Mifare cards, and TCP/IP or RS-485 connectivity. Hikvision’s face recognition terminals apply to a wide variety of scenarios and environments and can be highly personalised Accurate & fast face recognition Hikvision has embedded deep-learning algorithms into its face recognition terminals, providing fewer transmission delays and a reduced load on backend components. As a result, the terminals have a high success rate – the face-capture rate can hit 99% accuracy at less than 0.5 seconds. Dring rush hours, access turnstiles equipped with Hikvision’s face recognition terminals can respond in less than a half-second, passing up to 40 persons per minute. Hikvision’s face recognition terminals apply to a wide variety of scenarios and environments and can be highly personalised. Multiple authentication modes are available: face images, swiping ID card and comparing images, custom modes, and more. Applications range from commercial real estate, government agencies, small to very large businesses or factories, just to name a few.
As one of the year’s key trade fairs for safety and security products, GPST together with Guangzhou Electrical Building Technology is preparing to welcome over 220 leading manufacturers and solution providers to the China Import and Export Fair Complex from 9 – 12 June 2018. Regional and international security industry players will converge in Guangzhou to do business, learn about new market trends and take inspiration from leading industry brands across 15,000 sqm of exhibition space. The most relevant technology for today’s security industry will be front and centre at GPST, as solution providers continue to move away from traditional mechanical security systems and towards the advanced digital solutions favoured by the market. AI-enabled smart city solutions With a total of 290 Chinese cities initiating smart city pilot projects among over 500 cities that made smart city proposals in 2017, China is currently leading the world in smart city projects. Because of this, AI enabled smart city technology, including IoT, big data, and video surveillance is in significantly high demand and will be among one of the key areas to be highlighted during the fair. In order to fulfil this demand, an array of leading brands that provide relevant solutions for smart city will be present at GPST. The likes of AJB Digital, Dahua Technology, Huawei, Hikvision, Intellifusion, NetPosa, PCI-Suntek, SenseTime, and SensingTech are just some of the well-known industry leading brands to have confirmed their participation. SenseTime will present some of their latest developments in AI powered facial recognition technology to visitors of the fair Facial recognition and traffic monitoring system on display One of the first time exhibitors at GPST, SenseTime, is among the countries leading developers of AI technology. The company will present some of their latest developments in AI powered facial recognition technology to visitors of the fair, giving participants insight into how AI enabled video surveillance systems can automatically process large volumes of data to monitor and improve public safety in crowded areas. Moving beyond facial recognition, the latest security industry innovations also have implications for traffic control and public resource monitoring. PCI-Suntek, for example, will be just one of the exhibitors to showcase an advanced traffic monitoring system at the fair. Using cloud computing, big data and AI, the system can respond intelligently to complex traffic management problems and improve transportation networks by making them safer and more efficient. Many of the technologies to be exhibited at GPST have applications that extend beyond smart city and stretch into intelligent retail, smart factory, and intelligent healthcare Advanced public safety solutions The changing dynamics in the security industry landscape will also be evident at GPST, as the fair hosts a number of newcomers across different sectors. Global telecoms and electronics giant Huawei, for example, has highlighted the growth potential in the smart city and public safety sectors by entering into the market. Huawei’s arrival has involved advanced end-to-end public safety solutions that include license plate and facial recognition technology, IoT technology, and data analytics. Many of the technologies to be exhibited at GPST have applications that extend beyond smart city and stretch into intelligent retail, smart factory, and intelligent healthcare. Access control systems that have applications across different sectors are just one such example. Providers of these systems at the show will include IntelliFusion, Misobone, Sayee Intelligent Technology, Sensingtech, Soplar, Taichuan Cloud Technology and Wicrown. For many of these companies, access control systems represent one element of a broad portfolio of security products that will be of interest to fairgoers. Some of the development topics to be discussed will include: ‘the rise of AI as a force for revolutionising the security industry’, ‘smart city solutions across multiple industries’Asia intelligent Security Forum The show will also be supplemented by the Asia intelligent Security Forum (AiST), which is scheduled to take place from 9 – 11 June 2018. Jointly organised by the Guangdong Public Security Protection Technology Association, Guangzhou Guangya Messe Frankfurt Co Ltd, Messe Frankfurt New Era and a&s Media, the forum will allow security industry players to exchange information and learn about the latest trends and developments in Asia’s security industry. Some of the most pressing development topics to be discussed will include: ‘the rise of AI as a force for revolutionising the security industry’, ‘a comprehensive analysis on Guangdong’s urban multi-dimensional security protection construction’, and ‘smart city solutions across multiple industries’.
Western Digital Purple microSDAs announces the adoption of 4K Ultra HD video, emerging artificial intelligence (AI) applications and analytics drive the rapid growth and evolution of data in surveillance, Western Digital Corp. unveiled the Western Digital Purple microSD card, purpose-built for the complex and dynamic data demands of modern surveillance cameras and edge systems. Surveillance system operators can count on the robust Western Digital Purple microSD card to support a continuous surveillance workload 24x7 surveillance video capture Whether it’s a business employing surveillance video to keep their assets secure or a retailer utilising surveillance to accurately analyse shopping behavior through video facial recognition, capturing and assessing every moment is critical. Optimised for 24x7 surveillance video capture, surveillance system operators can count on the robust Western Digital Purple microSD card to support a continuous surveillance workload. With its outstanding performance, the card captures and preserves video in a variety of high-definition and next-generation formats, including 4K Ultra HD video, as well as nimbly supports the movement of data to core data systems for analytics and fast business insights. The rugged and humidity-resistant design of this new card enables trusted video capture in a wide range of environmental conditions, including outdoors in snowy winters and indoors in hot and humid factory settings. Mainstream commercial surveillance “From Big Data, to Fast Data, to data-centric applications such as surveillance, the volume, speed, variety and value of data continues to exponentially grow and transform. Leveraging our proven capabilities in consumer and industrial memory card innovation, the Western Digital Purple microSD card is the ideal solution for mainstream commercial surveillance data at the edge,” said Christopher Bergey, vice president of embedded and integrated solutions at Western Digital. Western Digital now provides the industry’s most comprehensive offering for surveillance data, from the edge to the core" “Whether capturing 4K video, used in AI-enabled cameras, or part of a larger data system supporting ‘smart surveillance’ applications, this rugged and intelligent card delivers ‘surveillance-class’ endurance and tremendous performance to enable trusted video capture in some of the harshest conditions." "When combined with our popular Purple and Ultrastar hard disk drives (HDDs) to support data preservation and real-time analytics, Western Digital now provides the industry’s most comprehensive offering for surveillance data, from the edge to the core.” Data-centric surveillance demands Designed to support a wide range of video resolutions and surveillance video recording implementations, additional highlights of the new microSD card include: Robust Endurance for Continuous Recording: Supports up to 1,000 PE Cycles Card Health Status Functionality for Easy Card Maintenance: In compatible cameras, a unique health monitor offers reporting capabilities to provide users and system installers valuable information, including the card’s endurance and capacity status, enabling predictive maintenance and taking the “guess work” out of when to service the card. High Performance for Next-Generation Video: Offers speeds of up to 80 MBs sequential read and 50 MBs sequential write and supports Speed Class 10 and UHS Speed Class 11. Trusted Video Capture in Wide Range of Climates: Designed for use in temperatures ranging from -25°C to 85°C, it enables reliable video capture indoors and outdoors. High Capacity to Capture and Preserve Video if Connection to Network Connection is Lost: Offered in capacities up to 64GB2 Today’s surveillance systems have moved beyond simple low-resolution video capture, to massive networks capturing 4K video"Advanced analytics software “Today’s surveillance systems have moved beyond simple low-resolution video capture, to massive networks capturing 4K video and leveraging advanced new analytics software to unlock new business value from video recordings,” said Michael Palma, IDC Research Director for Semiconductor and Enabling Technologies. “This has resulted in a surge in the volume and velocity of surveillance data at the edge and is creating demand for storage solutions that support the performance requirements of 4K video, 24x7 operation, and movement of video for smart insights.” Portfolio of data storage devices The new Western Digital Purple microSD card complements a full portfolio of data storage devices purpose-built for today’s surveillance needs, including the Western Digital Purple Surveillance HDD for high-capacity support for NVRs and DVRs and the Ultrastar HDD series for use in back-end servers performing surveillance analytics. Together, they provide surveillance system integrators and installers a complete solution to capture, preserve, access and transform surveillance data. Additionally, Western Digital offers original equipment manufacturers industrial-grade SanDisk Industrial card storage solutions for use with cameras with in-camera analytics capabilities and a variety of connected surveillance applications. The new microSD card will be available worldwide through Western Digital’s authorised reseller network Product availability The new microSD card will be available worldwide through Western Digital’s authorised reseller network in April in 32GB and 64GB capacities for $18.99 and $31.99 MSRP (in the U.S.) respectively; cards available in single and convenient 25-packs for surveillance system installers and integrators. For more information on the Western Digital Purple microSD card and the complete Western Digital Purple surveillance portfolio, visit the Western Digital booth at ISC West International Security Conference & Exposition (Booth #2089).
ASSA ABLOY Security Doors, a UK division of ASSA ABLOY, a provider of door opening solutions, is launching a new range of high-performance timber doors for the public, commercial & high-end residential market. The new SMARTec timber door range has been developed to offer a complete doorset solution of high-quality, high-performing doors and frames complete with all ironmongery solutions. The doors are suitable for an extensive range of applications, including offices, high-end residential buildings, education facilities, factory premises, mixed-use developments, healthcare environments and premium hotels. Certified security doors Doorsets within the SMARTec range can offer certified performance including fire resistance, security and sound reduction properties and are available to order in a wide range of aesthetically pleasing finishes and styles. With ASSA ABLOY Security Doors already offering Powershield and Prima steel doors, as well as Safeguard high-security timber doors, the launch of its SMARTec high-performance timber doors range ensures architects, specifiers and contractors can now source a complete doorset solution from one trusted single point of contact. SMARTec will meet the needs of all customers and specifiers by providing a durable solution which achieves performance demands Ensuring health and safety compliance Brian Sofley, Managing Director at ASSA ABLOY Security Doors, explains, “We pride ourselves on the development, quality and performance of our doors, and our new high-performance timber range maintains this standard. We are confident that SMARTec will meet the needs of all customers and specifiers by providing a durable solution which achieves the performance demands required.” “Our portfolio provides a total solution of complete door assemblies in both steel and timber, which for fire safety products meets with the latest Government recommendations. We can deliver the entire process from start to finish, from initial specification to the manufacture of product, on site installation and after sales inspections and maintenance of our doors.” “Finally, our extended service offering—covering service, maintenance and fire door inspections—means we can deliver complete doorset solutions that remain fit for purpose and compliant with mandatory health and safety regulations at all times.”
The rapid adoption of employee scheduling and workforce management software SmartTask gathered pace last year with record levels of growth in the UK and internationally. In particular, there was an 81% increase in the number of field service businesses using the system during 2017, which now includes over 100 manned security providers and 15% of the ACS Pacesetters. “Over the past few years we have worked hard to understand the needs of the manned security industry to develop a solution that possesses the right mix of employee scheduling and workforce management functionality,” explains Paul Ridden, CEO of SmartTask. “This has enabled us to achieve impressive growth last year both domestically and worldwide, with our software now being used in 15 countries and successful trials underway in mainland Europe, the Middle East, Africa and Australasia.” Intelligent rostering functionality The number of locations that are now coordinated using SmartTask grew by 160% in 2017 to over 16,000, across a 17,000-strong employed and subcontracted workforce. In fact, the variety of managed sites expanded significantly to include: Football stadiums, national museums, retail developments, industrial estates, science parks, schools, universities, factories, airports, banks, hospitals and even a F1 racing team.The intelligent rostering functionality is being used to schedule almost one million hours of work per month SmartTask continued to help manned security providers to gain visibility and control over customer sites with more than 250,000 patrols monitored, over 5.5 million NFC checkpoints scanned, and 50,000 electronic Smartforms processed during 2017. Meanwhile, the intelligent rostering functionality is being used to schedule almost one million hours of work per month, as well as calculating £40 million of employee pay and £50 million of customer billing over the past year. Towards cloud-based solutions A number of new innovations were introduced in 2017 in response to changing needs within the security marketplace. Using its established expertise within the sector and taking advantage of the latest technological developments, SmartTask introduced a new vetting capability to simplify appropriate employee screening and background checks. A comprehensive trial of Smartbeacons was also undertaken as part of a project to extend patrol monitoring and proof of presence options. “2017 saw the number of businesses depending on SmartTask expand by more than 80%. This record growth is down to our ability to develop a highly adaptable, scalable and affordable cloud-based solution that achieves proven business and operational benefits for manned security providers. We are looking forward to building on this success and expect to continue this growth trend through 2018 and beyond.”
The Industrial Internet of Things (IIoT) connects all technologies, systems, and components involved in the industrial value creation process to each other as well as to company networks and the Internet. With connectively playing a critical role in this scenario, BitFlow announced it is shipping a new I/O device for machine vision which provides an unprecedented 36 inputs and 36 outputs in a compact, DIN-rail mounted form factor supporting TTL, LVDS, open collector, opto-isolated and 24V signaling. Amazingly simple to deploy, the BitFlow BitBox is controlled solely by a BitFlow frame grabber, using the same API, driver and manual -- reducing space requirements and flattening the learning curve for customers. It contains 12-pin connector blocks that are added or removed easily, yet still lock securely in place for factory floor reliability. Blocks are logically grouped by signal type and have snap-in connectors that allow the fabrication of a harness without directly wiring the BitBox. Machine vision monitors production processes "In IIoT environments, machine vision helps in the monitoring of production processes to pinpoint weak spots and optimisation potentials, along with the technology's traditional duty of identifying faulty parts; the challenge is connecting machine vision with other systems," said Donal Waide, Director of Sales for BitFlow. "Our new BitBox is a cost-effective, reliable way to connect and control dozens of devices such as strobes, solenoids and actuators, while acquiring data input from equipment ranging from photo detectors to triggers. It is the ideal solution for high-density networked systems."In IIoT environments, machine vision helps in the monitoring of production processes to pinpoint weak spots and optimisation potentials" Until now, Waide explains, the answer for connecting machine vision components has been to purchase an I/O card. However, this step requires additional costs, software, system complexity, and the use of a PC slot. In addition, traditional I/O cards put all transmitters and receivers on the actual board in the PC, thus requiring wires to travel from their sources all the way back to the PC, which is often located quite a distance from other equipment. Besides being added potential points of failure, this extended wiring can cause signal lag, and even lead to employee trip-and-fall accidents. Maximum flexibility In contrast, the BitBox contains all transmitters and receivers with a small high-speed 15-wire cable running between the BitBox and the frame grabber. Maximum length cable is a generous 10 metres, providing maximum flexibility in positioning equipment within the machine. This arrangement isolates noisy, high-voltage signals generated by the PC away from the machine where they could cause data drops, video problems, malfunctions and random network errors. The BitBox was designed with maximum flexibility in mind. For example, outputs can be elected to be driven either to the static level via software API or configuration files, or from a frame grabber's internal signal generators. Likewise, inputs can be routed to a number of different blocks on the frame grabber. Input signals can also be routed to other outputs, including to the camera where it can also cause an interruption, or start/end acquisition.
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Security Professionals will need to develop an effective site plan to include where and when to conduct vulnerability assessments, implement focused mitigation strategies, and examine resources available to the food defence practitioner to minimise risk exposure and meet outlined regulatory requirements. Food Drug Administration’s proposed rule on food defence The FDA’s proposed rule on food defence would require facilities to address vulnerable processes in their food supply operations to prevent acts of intentional adulteration intended to cause large-scale public harm. Some background on what led to this aspect of the rule may provide insight into its key elements. The Act was signed into law on January 4, 2011 to better protect human and animal health by helping to guarantee the safety and security of the food and feed supply. Its focus was to ensure that the U.S. food supply is safe by shifting the focus of federal regulators from responding to contamination to preventing contamination. The law also provides FDA with new enforcement authorities designed to achieve higher rates of compliance with prevention & risk-based food safety standards, and to better respond to and contain problems when they do occur. Danger of large-scale public health harm Intentional adulteration includes those types of acts committed by disgruntled employees, consumers, or competitors where the intention is to cause large-scale public health harm; or by economically-motivated adulteration. Acts of disgruntled employees, consumers, or competitors are generally directed at attacking the reputation of the company and not at causing public health harm. The primary purpose of economically-motivated adulteration is to obtain economic gain, and not to impact public health, although public health harm may occur. From a historical perspective, the threat to the food supply chain has been evident for decades. Examples include during World War I when German agents in the U.S. infected horses and cattle in transit across the Atlantic to France; to al Qaeda documents and manuals found in Afghanistan after the 2001 U.S.-led invasion revealed interest in conducting chemical & biological attacks on food supplies; to 2014 when a Chinese court sentenced a former plant employee to life in prison after the poisoning of frozen dumplings that made at least 10 individuals ill. An effective overall site security plan will soon require the aspect of food defence to protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal, intentionally harmful means. The rule applies to facilities required to register as “food facilities” under Section 415 of the Food, Drug, and Cosmetics Act. Facilities covered under the rule would be required to develop a “Food Defence Plan” and identify and implement mitigation strategies to minimise or prevent significant vulnerabilities in food operations. The four key activities within the food system that are the most vulnerable to intentional adulteration, and have the potential to cause large scale public harm, are defined as liquid receiving and loading; liquid storage and handling; secondary ingredient handling; and mixing and similar activities. Each facility will be required to conduct a reanalysis of its Food Defence Plan at least once every three years Food Defence Plan against intentional contamination Covered facilities would be required to review their production systems to determine if they have any of these activity types and conduct their own vulnerability assessment to identify and prioritise points in their food operations that may be vulnerable to intentional adulteration. For the first time, FDA will have a legislative mandate to require comprehensive preventive controls across the food supply. This mandate includes compulsory preventive controls for food facilities to include the implementation of a written preventive controls plan. This plan involves: Evaluating the hazards that could affect food safety Specifying what preventive steps, or controls, will be put in place to significantly minimise or prevent the hazards Specifying how the facility will monitor these controls to ensure they are working Maintaining routine records of the monitoring Specifying what actions the facility will take to correct problems that arise. Each facility would be required to conduct a reanalysis of its Food Defence Plan at least once every three years, or following certain conditions (e.g., significant change in facility operations, new information about potential vulnerability, etc.). Personnel and supervisors assigned to the Actionable Process Steps would be required to receive appropriate training in food defence awareness and in their responsibilities for implementing Focused Mitigation Strategies. Facilities would be required to maintain certain records, including the written Food Defence Plan, personnel training documentation, and records related to monitoring, verification, and corrective actions. Lastly, as the issuing of the Final Rule approaches, the FDA has proposed to also publish a guidance document that provides the requirements in plain language to help businesses, particularly small businesses, comply with the identification of actionable process steps and implementation of focused mitigation strategy requirements. Industry can prepare now by conducting a comprehensive security assessment of their facilities to include the site perimeter, access control, security & emergency procedures, shipping, receiving & warehouse storage security practices, on-site security personnel, law enforcement outreach, site utilities, suppliers, hazardous materials/chemicals, criminal background check programs, cyber security, employee security awareness training, incident reporting & documentation, and recordkeeping requirements. The FDA website also includes useful information on FSMA, as well as links to their software programs such as the “Food Defence Plan Builder” that is designed to assist in developing a food defence plan based on a user entering specific answers relevant to their facility.
Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from greater awareness of the different uses for surveillance, as well as more accurate and robust technology. According to research firm Memoori's 2015 annual report on physical security, video surveillance products were 54 percent of total sales and accounted for $14.68 billion, topping intruder alarms which came in at 23.5 percent and $6.40 billion and with access control garnering $6.13 billion and 22.5 percent of the total. The report further indicates that the industry overall has edged up at a compound annual rate of 7.82 percent since 2010 and forecasts growth for total security equipment up some eight percent in 2016, reaching almost $42 billion over the next five years to 2020. Steve Stowe, Vice President of BAP Security in Macon, Georgia., is keen on the higher feature sets and intrinsic value of video surveillance applications for the company’s prospects and customers. BAP Security has been in business since 1967, offering custom security solutions for residential and commercial subscribers in Georgia, North Carolina, South Carolina and Florida. Video analytics on a roll Stowe says he expects to see higher adoption of video analytics as it becomes a more common feature in even lower-cost equipment. “We have more and more people asking about line-crossing detection in particular. Many customers are also looking at upgrading older analogue CCTV equipment since we can economically match the 1080P resolutions they are used to seeing on their televisions with HD-TVI, HD-SDI and other HDcctv technologies while still using their existing cabling infrastructure. There are still many customers who have seen the value at one point in time to invest in a CCTV system – we can now help them migrate cost-effectively and offer much improved picture quality than what they are used to,” Stowe says. Video analytics is becoming an increasingly common video surveillance feature,even in lower-cost equipment According to Stowe, businesses with personnel who have one-on-one contact with their customers such as office reception areas, teller stations and others are looking at adding cameras to record these interactions in case there is a problem, possibly even recording video with audio when appropriate. “Even customers who don't want a complete CCTV solution can use a more limited, standalone system or even IP cameras with edge recording,” he says. Replacing intrusion detection with CCTV Increased awareness by the general public regarding the advantages of surveillance is also fuelling an interest in video installations, Stowe says. “Homeowners are asking about CCTV more than ever before, and most of the people we are talk to are looking for a lot more than the simple plug-and-play cameras being sold by mass marketers. They want good, high-definition cameras to watch their driveways, HVAC units, garages, shops and even their pets.” The commercial market is also experiencing an uptick, especially for integrated installations. “Some commercial markets such as factories, multi-tenant properties and churches are looking more at integrating CCTV with other systems such as access control. Capturing the video as the door is accessed along with who and what might be with the cardholder is information that is important to them, whether it is to catch internal theft or making sure the tenant is not letting others access the property or even for child safety.” Looking ahead, word on the street is that CCTV installations may eventually take the place of traditional intrusion detection sensors. Motion detection, analytics and integration with audio or other technology continues to increase the power of surveillance specifications for loss prevention and more.
Cybersecurity is a fast-changing field and 2015 was no exception. The proliferation of cybersecurity issues continued to make headlines, including the very dramatic hacking of a vehicle to allow for remote control over steering, brakes, the transmission and other critical functions. There was also state-sponsored hacking that targeted government, defence and other strategic sectors of the marketplace. Staying on top of these breaches still remains a challenge. Securing the Internet of Things While we can’t discuss the details of our projects over the past year, we are proud to say that NTT Com Security has been successful in identifying new vulnerabilities in mobile devices, home security systems, and automotive telematics interfaces. These are all part of the important area of the “Internet of Things” that will continue their climb into the information security headlines in 2016. For the New Year, we are anticipating a broader focus beyond the servers, workstations and communications infrastructure that we are used to, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices, and myriad other devices that will eventually all be connected to the Internet – and therein lies the ongoing task. The Internet in general is extremely vulnerable, and companies and individuals have a long way to go in learning how to protect themselves. We can expect continued attacks targeting payment card data wherever it can be found along with attempts to commit financial fraud with stolen banking credentials or via social engineering tricks like spear phishing emails. High profile breaches, such as the Edward Snowden leaks, have brought security to the forefront of the public consciousness Security and risk management Fortunately, these high-profile breaches, hack demonstrations (like the Jeep hack), and the Snowden leaks have all helped bring the topic of security directly into the public consciousness. With consumers becoming aware of the value of their information and the importance of protecting their privacy, companies will be forced to design security into their products. We are already seeing a public demonstration of this with the new security and encryption controls Apple has implemented on the iPhone. Meanwhile, talking about risks and vulnerabilities can sometimes feel like shouting at a crowd that refuses to listen despite the obvious danger they are in. The good news is that we are taking active steps to guard against risk and combat it where it happens. NTT Com Security has developed a global cybersecurity and risk management portfolio of managed services, consulting and technology solutions to protect critical and confidential data from attacks. See the full coverage of 2015/2016 Review and Forecast articles here
Keeping the food supply safe was not an issue for Furman Foods back in 1921, when John W. Furman canned 360 glass jars of tomatoes with his wife, Emma, and their six children. Just as food processing practices have evolved over time, so too has the nation’s approach to securing food processing facilities. Today, Furman Foods uses ID cards as the first step of a greater plan to enhance its plant security. Furman Foods is a family-owned business. By 1969, the company had sold a million cases of tomatoes and was complementing its tomato crop with beans, peppers and other vegetables sold under the Furmano’s name. The company’s roots are planted firmly in the soil of the Susquehanna River Valley of Pennsylvania. Despite this remote location, Frank Furman, Vice President of Quality, is ready to take the facility to the next level of security and quality. “The need is here,” he said. “Everything is coming together at once. Not only does security make good business sense, but it also is something we need to do for our customers.” Food safety and security While the company has focused on food safety for many years, the U.S. Food and Drug Administration’s (FDA’s) Bioterrorism Act of 2002 made security a top concern for food producers such as Furman’s. Title III of the act specifically addresses protecting the safety and security of food and drug supplies. In addition, because Furman Foods provides food for U.S. Department of Agriculture (USDA) food programs, it is subject to USDA security measures. Security isn’t new to the company. It began incorporating additional security measures shortly after September 2001. The well heads for the water supply are locked and checked daily, for example, and a third-party security service is on duty during off-hours. Delivery truck doors now must be sealed, the company’s computer systems have new access controls in them, and locks now adorn all bulk storage areas, such as those for corn sweeteners and vinegar, some of the most vulnerable areas in the company. An important part of the security system at Furman’s is a new ID card program Time and attendance tracking An important part of the security system at Furman’s is a new ID card program. “We needed to replace our time clocks,” said Mark Slear, Systems Administrator, “so we took advantage of the opportunity to introduce employee ID cards to track time and attendance.” “I wanted some kind of control so that people who don’t work here don’t get in,” Furman said, “Despite the fact that we are located in a rural area, we still were seeing people here who shouldn’t be here. We had to figure out some way to limit access.” In the past, the company had pre-printed, pre-numbered, bar coded cards for hourly employee access. Employees were assigned a number, but that was it. HID Fargo Printer/Encoder Slear and Furman selected the Fargo DTC550 Direct-to-Card Printer/Encoder with lamination capabilities from ID Wholesaler (www.idwholesaler.com), a Fargo Value-Added Retailer and the largest online reseller of photo ID products. “I looked around quite a bit,” said Slear, “and all of my research kept coming back to Fargo.” Furman’s warehouse employees require a stronger card to withstand the everyday wear and tear associated with their active jobs" “We determined that Furman Foods needed a higher level of security than a basic photo ID card could offer,” said Shane Stark, Account Manager, ID Wholesaler. “The FDA keeps tight regulations on who has access to food processing areas. Along with using bar codes and magnetic encoding for security measures, Furman’s warehouse employees require a stronger card to withstand the everyday wear and tear associated with their active jobs. This led us to lamination and a Mylar card, which offers greater durability.” Slear was also interested in the printer’s speed. “When we ramp up during the summer, we produce a year’s worth of product in three months,” he said. “We have to print a lot of ID cards quickly to accommodate our seasonal workers.” Security access cards Furman’s bought the Fargo printer in October, took employee pictures in November and began issuing new ID cards in January. The ID cards contain a full photo, and the program includes all employees, even the extra 300 that are hired during the July-to-October busy season. While tracking time and attendance with the ID cards was the company’s first concern, Slear and Furman were thinking ahead when they chose an ID card printer, knowing that security needs would be enhanced down the road. “We added a magnetic stripe and photo in preparation for future security,” said Slear. “We haven’t defined yet what else we might do, but much of it will be driven by FDA and USDA directives.” “We liked the fact that the DTC550 printer can print on proximity cards if we decide to upgrade our ID cards someday,” said Slear. Furman agreed. “Eventually, we will go to smart cards, especially for the room where our ingredients are mixed,” he said. “We need to limit this area to those who are designated to be there. They will have to swipe an ID card for access. We chose a printer that will allow us to upgrade the cards, knowing that sooner or later we’ll have to go further with security.” Our product and industry knowledge enable us to assess our customers’ needs and present options that meet their requirements" Comprehensive identification solutions “Everything has been going well,” Slear said. “The person printing the cards picked up on it quickly.” Slear gives high marks to ID Wholesaler for their customer service. “Every time I talk to Shane, I get the answers I need,” he said. “He also checks in from time to time, just to see how things are going.” “Our product and industry knowledge enable us to assess our customers’ needs and present options that meet their requirements and their budgets,” said Jennifer Clancy, Marketing Manager, ID Wholesaler. Currently there are three variations to the Furman’s ID cards: yellow background for employees, green background for visitors and blue background for vendors. “Certain vendors are allowed on site without an escort,” said Furman. “For instance, because we are a kosher facility, once a month a rabbi comes in to check our operations. He has his own vendor ID card and is pre-approved, so he can move throughout our facility unescorted.” Facility security One of our big concerns is having someone follow a carded employee into the plant Furman Foods prides itself on its strong values, its quality products, its sustainability and its food security. Yet Furman isn’t satisfied. “We are still not where we should be,” he said. “We have come a long way, but we have a long way to go. If I could wave a magic wand, we would have one entrance, where everybody has to enter and exit. This entrance would be secured by a card reader, so individuals would have to swipe an ID card to get in. One of our big concerns is having someone follow a carded employee into the plant. Restricted areas should require special access cards, and I’d like a fence around the entire facility, with a guard shack where everyone checks in and out,” he further added. Right now, there are multiple entrances for traffic. The facility is very spread out, and the road in front is a public road. Photo ID access card Yet, all agree that the ID cards are an important step on Furman Foods’ journey toward enhanced security. “A safe workplace is fundamental,” said Clancy. “Photo ID cards provide at-a-glance validation that the card wearer is authorised to be on the premises. This is especially important for food manufacturers.” “I tell our employees security is only going to get tighter,” Furman said. “More safeguards will be put in place. We are in the food business. If we don’t have safe foods, we don’t have jobs.”
Ellams, a global manufacturer and supplier of telephone scratch cards based in Nairobi, Kenya, required a foolproof security solution, integrated with access control and video surveillance for their manufacturing units. Matrix provided Ellams with an Integrated Access Control solution comprising of Card based Entry and Exit Readers. Established in the year 1977, Ellams primarily started off as a Security Documents Printer and Business Forms Manufacturer. In the year 2001, Ellams started off with the new venture of developing Telephone Scratch Cards for local telecom and cellular operators. Ellams has two manufacturing units based in Nairobi that supply secure pre-paid scratch cards to Central, Western, Eastern, and Northern Africa. Security being crucial for Ellams with respect to its manufacturing unit, the company was on a look out for a vendor who could meet the below mentioned requirements. Challenges: Dual verification of credentials at main entrance Allow entry or exit to a user in an employee zone if a guard is present in his cabin Guard does not leave while employees are present in an employee zone Keep a check on employees’ movements – whether they enter after gaining access or not, etc. Access Control in each department Pre-defined number of users allowed in a department When a user enters an area, the event is recorded till he/she leaves Generate alarm on violation of access rules Solutions: Web-based access control solution with card-based entry and exit readers Integration with beam detector for checking user availability in an area after entering the premises Man-Trap feature to open one gate at a time Employees allowed access only if guard is present Occupancy control to ensure defined number of people are allowed in the respective zone Camera remains on in presence of employees in a respective zone and turns off in their absence Instant alarm notification to take immediate action upon violation of access rules Benefits: Improves security with integrated solution Real-time alarm notification helps take immediate action upon violation of access rules Ensures the guard continuously monitors entry and exit of employees Products: COSEC DOOR CAP - RF card based premium door controller COSEC PATH RDCE – EM proximity card-based reader COSEC PANEL LITE- Site controller for multiple door controllers COSEC CENTRA GE- Application software for 100 users, expandable up to 500 users COSEC GE ACM- Access control module for COSEC CENTRA GE
Vanderbilt’s ACT access control solution was recently installed by BDI Security Solutions Ltd at sites in Burnaston, Derbyshire, and Deeside, North Wales, for car manufacturer Toyota Motor Manufacturing (UK) Ltd. At Deeside, Toyota operates a 115-acre engine plant. Together, the two sites represent investment of £2.5bn and employ 3,000 people. For the plant’s security, Toyota wanted a tailored solution that would enable them to operate from a virtual environment and respond promptly to requests. Unified access control solution The installation replaced a legacy system that was no longer future-proof and did not allow access control listings to be integrated with Toyota’s general corporate database. Toyota now has a unified solution with badge-printing as an integral and cost-effective element when it had previously been a separate process. The equipment installed at the manufacturing plant includes ACT Mifare1030 mullion proximity readers at both indoor and outdoor locations. These slim-line readers support third-party smart cards and fobs, feature a robust polycarbonate housing and have an ingress rating of IP67. They are particularly suited to this type of project where the smart card is used for multiple applications across access control and HR. ACT eLock MIFARE Classic Toyota is also using ACT eLock MIFARE Classic. This is a wireless door lock that includes an access control reader and opening mechanism, all powered by batteries. ELocks operate with an ACT eLock hub and up to 32 locks can communicate over a wireless network with each hub.
Security and surveillance systems are becoming critical to manufacturing plants and factories by helping to address the theft of raw materials, the theft of IP, and the tampering of equipment, machinery and cargo. They can also serve as an effective monitoring tool for overseeing assembly line production and worker safety. A Micron/Repon case study Repon, a manufacturer of high-quality ball bearing slides used in various industries including server- and rack-mount systems, office/home furniture, white appliances, tool boxes and medical carts, recently deployed an advanced security and surveillance system—an edge storage solution—at their newly built manufacturing plant in the south of Taiwan. Their system architect, Apogear, integrated Micron’s industrial microSD cards into this solution. In the case of Repon’s deployment, 24x7 operational requirements needed to be met while minimising the risk of data lossIn this case study, we discuss why Repon implemented an edge storage solution and how they will benefit—from a total cost of ownership (TCO) perspective—with Micron’s industrial microSD cards. Why edge storage? The simple answer: to enhance overall system reliability. In the case of Repon’s deployment, 24x7 operational requirements needed to be met while minimising the risk of data loss. Edge storage—the recording of video and storing it at the camera—provides recording redundancy, helping to reduce the risk of data loss. By storing a second copy of recorded video in a microSD card, edge storage provides backup in case there are any issues with the primary network storage (including network reliability issues). In the event the primary network storage goes offline, video continues recording in the microSD card. The recorded video can then be synchronised to network video recorders (NVRs) or video management systems (VMS) after the primary system is restored. Selecting the right industrial microSD Card Historically, memory manufacturers sell the lowest quality NAND flash (media grade) memory to the memory card market. While this quality of NAND can be sufficient for storing pictures and video (where data is written to once and stored), using it in microSD cards for edge storage (where data can be written and rewritten to often) is not recommended. Figure 1: Edge Storage for Recording Redundancy Edge recording with memory specifically designed to support 24x7 recording over a long period of time requires a new understanding of how that memory is made— from silicon selection, to manufacturing flow, to product design, to qualification testing. Many microSD cards available in the market today are intended for consumer use in digital still cameras (DSCs), car dash cams, or home cameras; they are not designed for commercial and industrial edge storage in IP video surveillance cameras. As such, edge storage can often be viewed as ‘unreliable’ by system integrators and installers.Users may not understand that the lifetime and quality of a microSD card can vary significantly depending on the quality of the card Users may not understand that the lifetime and quality of a microSD card can vary significantly depending on the quality of the card. Selecting the wrong quality of microSD card can result in costly field failures, often occurring within months after deployment. The importance of selecting the right memory card in an edge storage solution is illustrated in Apogear’s analysis of Repon’s edge storage solution. The analysis also shows the cost savings Repon anticipates from using Micron’s Industrial microSD cards in their solution. Project cost analysis and assumptions Apogear’s total cost of ownership (TCO) analysis (below) is reflected in relative percentages, and not on actual dollars and cents given regional and vendor differences. To create an understanding of the project scale, the TCO was estimated at approximately $850,000 USD over a three-year contract term in regards to deploying a 600-camera system at Repon’s manufacturing facility using Micron Industrial microSD cards. Figure 2: Cost Distribution Data, as provided by Apogear Figure 2 provides the percentage of costs during the estimated lifecycle of the edge storage system. The cost per system phase amounts to: Equipment cost (68%) - the cost of an IP camera, networking equipment (switch, cables, etc.), accessories, NVR and central monitoring system (CMS), and storage (HDD and microSD card). Deployment cost (20%) - the cost of installation, configuration and integration. Design cost (2%) - the cost of consulting and system architecture design. Maintenance cost (8%) - the cost of planned, regular and additional maintenance services. Decommission cost (2%) – the cost of dismounting and recycling equipment at the end of its lifetime Why Micron’s industrial microSD card? Micron’s solution is backed with a 3-year product warranty under professional surveillance use casesThe importance of product reliability is often underestimated when considering the cost of maintenance and field service. When a retail-grade microSD card fails, the card must be replaced. Not only are there direct costs of sending a crew to service and replace the card, but there are also outage times that can result in significantly more costs. By implementing Micron’s industrial microSD card, which is designed for 24/7 video surveillance edge storage usage, it is estimated that Repon will see an approximate $141,000, or about 16%, improvement in TCO compared to using an off-the-shelf retail microSD card1. High reliability and quality, lower maintenance and replacement costs Micron’s industrial microSD card supports 3 years of high-quality continuous 24/7 video recording with a quality specification of 2 million hours mean time to failure (MTTF) and 0.44% annualized failure rate (AFR) —2X better than a typical HDD today. Additionally, Micron’s solution is backed with a 3-year product warranty under professional surveillance use cases, helping to keep maintenance and replacement costs to a minimum. Figure 3: Maintenance and Replacement Cost Comparison, as provided by Apogear Advanced features minimise risk of data loss Micron’s industrial microSD card contains firmware optimised to provide stable performance for 24x7 high quality video recording with minimal frame drops.Micron understands the unique needs of this market and has developed deep application-level expertise In addition, Micron’s industrial microSD card offers a health monitoring feature for IP camera integration that reports card usage and lifetime remaining. Systems can integrate this feature into their software to alert predictive maintenance service. Micron’s industrial microSD card comes with password protected lock/unlock features to keep the device secure. Conclusion The move to edge recording and high endurance storage is happening across the Industrial IoT landscape. Targeted solid state storage solutions are emerging, and with it, new entrants into the security and surveillance ecosystem. As a leader in automotive and industrial memory solutions, Micron’s new product line of industrial microSD cards are built to meet the requirements of this industry. As a trusted advisor to its embedded customers for more than 25 years, Micron understands the unique needs of this market and has developed deep application-level expertise and a portfolio designed with that in mind. Most importantly, it brings to the market a mindset to deliver sustainable value to its customers.
JK Tyre & Industries Ltd. is an automotive tyre, tubes and flaps manufacturing company based in Delhi, India. The company is the only tyre manufacturer offering the entire range of four-wheeler radials for trucks, buses, and cars. JK Tyre has a worldwide customer base in over 80+ countries. With production facilities in nine plants, total production capacity is almost 20 million tyres per annum. Employee shift and visitor management JK Tyres have its biggest manufacturing setup in Mysore. The premise consists of a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for the company. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tiresome process. JK Tyres was looking for a vendor who could offer them a complete solution related to time-attendance and visitor management. Matrix time-attendance solution Matrix offered a time-attendance solution, which centrally handled multiple shifts of workers and employees. Numerous shifts were created to manage time-attendance of over 500+ workers. Moreover, they provided employee self service, which helped the employees view day-to-day attendance, apply for leave/tour, etc. JK Tyres further required a record of visitors so Matrix delivered visitor management software, which helped them create a visitor pass, fetch visitor records, and generate reports of the same. Results: Reduction in cumbersome HR tasks Automatic maintenance of visitor records on day-to-day basis 40% increase in productivity of employees and workers
Surveon, the enterprise NVR solutions provider, announced a factory in Kuwait City has deployed Surveon’s IP surveillance solutions as their partner for security application, including 100+ megapixel cameras and 10 enterprise-grade network video recorders, which not only fulfill the need of 180-day non-stop recording, but also ensure a strong protection for the safety in the factory.Ensuring long-term video retentionWhen it comes to an effective surveillance system for factory application, megapixel solutions offer significant benefits for surveillance purpose as the clarity of images offers efficiency in monitoring and help prevent possible events such as intrusion in forbidden areas like production line or operation station.However, it’s challenging to plan a reliable system with sufficient storage to cope with large number of cameras that cover every critical area for 24/7 recording requirement. With Surveon NVR7316, these problems can easily be solved. Supporting up to 128CH 1080P full HD cameras with non-stop recording and 16-bay hot-swappable HDDs, NVR7316 is an ideal solution for industrial application. In addition, NVR7316 is able to expand the storage via local SAS port or iSCSI interface, making it suitable to projects that require long-term video retention.Wide-range monitoringDue to its spacious environment and the limited number of security guards, not all the places in the factory can be well monitored. Surveon 3MP cameras, CAM3461LV and CAM3471HEV, provide 1.5-times larger monitoring range at 30 FPS and allow the whole production line to be seen clearly, giving the factory cost-effective options without installing other cameras for wide-range monitoring.Meanwhile, Surveon 5MP cameras, CAM3571VP and CAM4521LV, ensure all details can be seen without any missed, even under the low light conditions such as the gateway of factory. All Surveon megapixel cameras are with industrial-grade components to ensure product reliability for long-term operations.Affordable yet professional solution"Surveon can always provide the affordable yet professional solutions for our projects. Without searching other solution providers for months, Surveon's total solutions have met all of our expectations and delivered the performance that is tailored to our needs," said the Project Partner, Advanced Technology Company for Computers ATCC.Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects.