Leading lock specialist Pickersgill-Kaye (Kaye), a brand under ASSA ABLOY’s High Security & Safety Group, is encouraging those responsible for critical infrastructure sites to consider servicing contracts to help minimise the risk of costly breaches of security. Perimeter protection With terrorism posing a serious threat to the UK’s interests, perimeter fencing, doors and their locks are the first line of defence against potential intruders at installations such as chemical and...
Surveon Technology, the enterprise NVR solutions provider, introduced its Milestone certified EonServ 7000 Series, which provides Milestone system integrators the best price-performance option for enterprise surveillance tenders. With Milestone XProtect Corporate VMS, the EonServ7000 Series supports up to 680 channel 2MP cameras with continuous recording and 436 HDDs with high density 4U 60-bay expansion enclosure. It is the perfect surveillance NVR for a wide range of industries, including air...
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access. It also secures networks by expanding its behavioural analytics to IoT devices, detecting anomalies and preventing their compromi...
ASSA ABLOY the global provider of door opening solutions, has issued its whitepaper in response to Dame Judith Hackitt’s Independent Review of Building Regulations and Fire Safety, following the Grenfell Tower incident of 2017. The whitepaper summarises practical recommendations derived from the key points made within the Independent Review and advises ways in which the industry can work together towards best practice. Fire door installation solutions Compartmentation has been highlight...
SmartTask, the provider of employee scheduling and mobile workforce management software, has launched a vetting solution to help security companies meet the stringent requirements of the BS7858 vetting standard. SmartTask Vetting has been designed to ensure that security service providers are not overlooking this essential staff screening requirement, while following a consistent and approved process. “We recognised a growing need for sophisticated and streamlined vetting procedures, espe...
Ho Chi Minh City welcomes Vietnam’s largest trade fair for the safety, security and fire sectors this week, as security industry stakeholders from around the world gather at the Saigon Exhibition and Convention Center for the 11th edition of Secutech Vietnam. The rising security requirements of Vietnam’s commercial and residential property sectors have set the stage for a fruitful three days of business at the show, which takes place from 16 – 18 August 2018. A new zone showca...
Greenpeace have posted footage on their Facebook page of them flying a drone into a French nuclear facility. The group have claimed the stunt was performed to highlight security issues around the facility. The facility was reportedly "at no time worried about the drone or attempted to intercept it". It was crashed into the tower in Bugey, a town around 30km away from the major city of Lyon. With the use of drones growing exponentially, now is the time to act against the potential negative threats that drones pose. Investing in drone detection technology Drone detection experts COPTRZ believe the crash seriously highlights the need for these major facilities to invest heavily in drone detection technology. The technology is there and readily available, so there is no excuse for incidents like this to happen again. This isn't the first stunt Greenpeace have performed at French nuclear facilities. It would, therefore, suggest they are vulnerable to attack if action isn't taken in the immediate future. Can these incidents be prevented with drone detection? Drone detection systems would have allowed the facility to not only be warned about the drone, but also the location of the drone and its pilot Incident prevention What's the solution to prevent incidents from happening again? The answer to that question is quite a simple one, drone detection. A lot of major facilities and businesses in the UK have begun to take ownership of this technology. It can help prevent these kinds of incidents and protect companies’ important assets from being accessed. Drone detection systems would have allowed the facility to not only be warned about the drone, but also the location of the drone and its pilot. It also collects data such as the altitude, speed, the location of take-off, the direction the drone is heading in. This data can allow facilities to quickly act in the event of a drone attack. If it's caught early enough, it can prevent similar incidents from happening, and this is what Greenpeace is clearly trying to show. Preparing against potential threats Steve Coulson, Managing Director and Founder of COPTRZ commented on the incident saying: "This incident further highlights just how important drone detection is. The Greenpeace incident has hopefully helped to show the facilities just how crucial it is to be wary of the potential negative threat that drones can have on their facilities. The time to act is now to ensure that these incidents don't occur outside of a controlled environment. Drone detection is going to play a key part moving forward, so it's important for businesses to get ahead of the game."
Everyone can agree the convergence trend is in full force in the electronic security industry and organisations are pushing more and more for integrated solutions that can not only enhance ROI but also solve problems that have traditionally been out of the realm of electronic physical security systems. This leaves system integrators and other solution providers in a difficult position as they scramble to be competitive especially when faced with an industry dominated by a few power players. Tackling this problem can now be a matter of survival for small to medium players especially in regional markets. To address this need, Apollo Security Access Control has introduced the new ASP Series Controllers that promise to set a new standard in for secure, scalable and customisable solutions. For 30 years, Apollo has been known for producing some of the most robust hardware in the industry and with the ASP series a new layer of flexibility has been added by allowing ‘post-factory’ customisation in addition to many other feature upgrades. This will have the effect to put more control in the hands of integrators and even end-users so they are not locked into hardware solutions that are ‘off the shelf’ and don’t provide any ability to adapt to customer specific needs for the present or the future. The flagship of Apollo’s new controller series, the ASP-4 is an intelligent access controller designed to provide a high performance security solution Intelligent access controller The flagship of Apollo’s new controller series, the ASP-4 is an intelligent access controller designed to provide a high performance security solution with the ability to solve non-standard problems. Natively, the ASP-4 can support four readers and four doors, but when clustered with 32 other ASP devices it can secure up to 128 doors in one management unit by utilising inter-device communication across standard IT networks. Each ASP-4 can also support up to 16 additional readers by utilising OSDP Secure Channel communications, supporting configurations such as 4 Doors with In/Out (8 Readers) or even more doors by adding input/output modules for door control. Enterprise capacity of 250,000+ cardholders, 300 access levels with up to 50 access levels per card is provided at each device, providing total cardholder and access rights database redundancy, preventing reduced functionality modes such as ‘facility code check only’. The ASP’s real power lies however with the ability to customise the functions of the controller by loading customised App Scripts and third-party protocols. Using industry standard ‘C-like’ programming language, the ASP can have new functions designed by the integrator. Running customisations at the hardware level instead of in software offers the benefits of drastically reduced time/cost of implementation as well as superior reliability. Whereas before if an organisation wanted to integrate a new device such as an alarm panel, fire system or similar they would have to request software customisation which can take months and cost tens of thousands of dollars, with the ASP such a task can take days or weeks and be completed with a budget of hundreds of dollars. An example of how effective this customisation works was provided by a subsidiary of a large multi-national Corporate access control solutions An example of how effective this customisation works was provided by a subsidiary of a large multi-national that was struggling to comply with strict labor regulations. Under these rules, workers in their factory can only work six consecutive days, requiring the seventh day for rest. The HR department struggled to keep track of this as each employee’s rest day could be prior to when six days was expired; in addition to workers switching shifts and other complications the tracking was too difficult to be done manually, so an automated solution was necessary. The current access control solution the company was using didn’t provide any solution for this so the only possibility was expensive customisation which would take 3-4 months and then provide no guarantee in the future what would happen if needs changed. With ASP-4, Apollo’s local partner was able to offer a much more rapid solution. The requirements were programmed into a logic script that was loaded to the controller. This script checks every cardholder at time of access for any violation of the rules and will deny access if necessary, then displaying a reason on an LCD display as well as flash an indicator light so that the cardholder will know it is not simply an access level error that has denied their entry. This customisation took less than one man-day to program and was tested over the course of one week and was then ready to be deployed. The ability to do this customisation gave the partner the edge needed to provide a timely, cost effective solution to a problem that could have cost the company greatly if a work-related accident resulted in legal action. In the future, the logic script can be easily changed for example if the company would like to move to a five-day work week in the future. Additional customisation possibilities are possible using the serial connections of the ASP Real-time monitoring Additional customisation possibilities are possible using the serial connections of the ASP. This allows integration of input devices such as scales or barcode scanners, or interface to any device that has a serial interface such as displays, mimic panels, entry phone systems and more. Protocols for these devices can be embedded in scripts and the devices can assume alarm input/output functions or even new card reader types can be supported such as wireless locks or long-range RFID readers. In addition to being customisable, the ASP of course is designed with security in mind. With all communication channels being secured with 128-bit TLS encryption which prevents attempts to intercept or forge data. Security goes all the way down to the reader using OSDP Secure Channel to protect card reader data transmission lines. Being able to communicate simultaneously with up to five software hosts also gives the ASP ability to be monitored in real-time by redundant systems, ensuring that important alarms are always delivered in time for the security team to react. Software OEMs and System Integrators The ASP Series has been designed from the ground up to be friendly to Software OEMs and System Integrators using other systems in place of or in addition to Apollo Security’s software platform. A native Open Platform SDK allows tight integration with all the ASP’s standard features in addition to the customisations available through scripting and embedded software. The SDK comes with several integration pathways including .NET and Python and includes sample code, tutorials and online developer support. To better support Software OEM partners, Apollo Security’s parent company, ADME INC., has recently announced a new division, ApolloEM which will provide support for partners that utilise the ASP hardware platform in their own software solutions. William Lorber, Vice President of Sales and Marketing said, “Establishing a separate division to strengthen our role as an Access Hardware OEM became logical as more partners are coming on board to utilise our new product line. We are excited to see the solutions that our partners develop on this platform.” Lorber added that partners will be able to share and market their solutions on the upcoming App Script Library platform that Apollo will roll out later this year to expand the effectiveness of ASP solutions.
Hikvision, the world's premier supplier of innovative video surveillance products and solutions, has launched a range of groundbreaking face recognition terminals. Hikvision’s face recognition terminals are embedded with deep-learning algorithms for access control and office scenarios for improving building operations, workforce management and safety operations. Hikvision's face recognition terminals Three face recognition terminal models are available, each one uniquely and flexibly designed for a wealth of applications and scenarios: Wall-Mounted Face Recognition Terminal – DS-K1T604MF & DS-K1T606MF Base- or Wall-Mounted Face Recognition Terminal – DS-K1T605MF Face Recognition Component for Access Turnstile – DS-K5603-Z All three of these models are easy to install and use. The wall-mounted terminal is well-suited for quick access at an entrance. The base & wall-mounted terminal can be mounted on convenient vertical surfaces or on the front desk. The face recognition component is designed for use in conjunction with access turnstiles. If needed, this model can be rotated horizontally upon installation for capturing facial images at the most effective angle. Various models and types are available with a wide variety of front-end or back-end combinations to meet a multitude of scenarios and environments. Hikvision’s face recognition terminals support 1:1 or 1:N matching modes, authentication via Mifare cards, and TCP/IP or RS-485 connectivity. Hikvision’s face recognition terminals apply to a wide variety of scenarios and environments and can be highly personalised Accurate & fast face recognition Hikvision has embedded deep-learning algorithms into its face recognition terminals, providing fewer transmission delays and a reduced load on backend components. As a result, the terminals have a high success rate – the face-capture rate can hit 99% accuracy at less than 0.5 seconds. Dring rush hours, access turnstiles equipped with Hikvision’s face recognition terminals can respond in less than a half-second, passing up to 40 persons per minute. Hikvision’s face recognition terminals apply to a wide variety of scenarios and environments and can be highly personalised. Multiple authentication modes are available: face images, swiping ID card and comparing images, custom modes, and more. Applications range from commercial real estate, government agencies, small to very large businesses or factories, just to name a few.
As one of the year’s key trade fairs for safety and security products, GPST together with Guangzhou Electrical Building Technology is preparing to welcome over 220 leading manufacturers and solution providers to the China Import and Export Fair Complex from 9 – 12 June 2018. Regional and international security industry players will converge in Guangzhou to do business, learn about new market trends and take inspiration from leading industry brands across 15,000 sqm of exhibition space. The most relevant technology for today’s security industry will be front and centre at GPST, as solution providers continue to move away from traditional mechanical security systems and towards the advanced digital solutions favoured by the market. AI-enabled smart city solutions With a total of 290 Chinese cities initiating smart city pilot projects among over 500 cities that made smart city proposals in 2017, China is currently leading the world in smart city projects. Because of this, AI enabled smart city technology, including IoT, big data, and video surveillance is in significantly high demand and will be among one of the key areas to be highlighted during the fair. In order to fulfil this demand, an array of leading brands that provide relevant solutions for smart city will be present at GPST. The likes of AJB Digital, Dahua Technology, Huawei, Hikvision, Intellifusion, NetPosa, PCI-Suntek, SenseTime, and SensingTech are just some of the well-known industry leading brands to have confirmed their participation. SenseTime will present some of their latest developments in AI powered facial recognition technology to visitors of the fair Facial recognition and traffic monitoring system on display One of the first time exhibitors at GPST, SenseTime, is among the countries leading developers of AI technology. The company will present some of their latest developments in AI powered facial recognition technology to visitors of the fair, giving participants insight into how AI enabled video surveillance systems can automatically process large volumes of data to monitor and improve public safety in crowded areas. Moving beyond facial recognition, the latest security industry innovations also have implications for traffic control and public resource monitoring. PCI-Suntek, for example, will be just one of the exhibitors to showcase an advanced traffic monitoring system at the fair. Using cloud computing, big data and AI, the system can respond intelligently to complex traffic management problems and improve transportation networks by making them safer and more efficient. Many of the technologies to be exhibited at GPST have applications that extend beyond smart city and stretch into intelligent retail, smart factory, and intelligent healthcare Advanced public safety solutions The changing dynamics in the security industry landscape will also be evident at GPST, as the fair hosts a number of newcomers across different sectors. Global telecoms and electronics giant Huawei, for example, has highlighted the growth potential in the smart city and public safety sectors by entering into the market. Huawei’s arrival has involved advanced end-to-end public safety solutions that include license plate and facial recognition technology, IoT technology, and data analytics. Many of the technologies to be exhibited at GPST have applications that extend beyond smart city and stretch into intelligent retail, smart factory, and intelligent healthcare. Access control systems that have applications across different sectors are just one such example. Providers of these systems at the show will include IntelliFusion, Misobone, Sayee Intelligent Technology, Sensingtech, Soplar, Taichuan Cloud Technology and Wicrown. For many of these companies, access control systems represent one element of a broad portfolio of security products that will be of interest to fairgoers. Some of the development topics to be discussed will include: ‘the rise of AI as a force for revolutionising the security industry’, ‘smart city solutions across multiple industries’Asia intelligent Security Forum The show will also be supplemented by the Asia intelligent Security Forum (AiST), which is scheduled to take place from 9 – 11 June 2018. Jointly organised by the Guangdong Public Security Protection Technology Association, Guangzhou Guangya Messe Frankfurt Co Ltd, Messe Frankfurt New Era and a&s Media, the forum will allow security industry players to exchange information and learn about the latest trends and developments in Asia’s security industry. Some of the most pressing development topics to be discussed will include: ‘the rise of AI as a force for revolutionising the security industry’, ‘a comprehensive analysis on Guangdong’s urban multi-dimensional security protection construction’, and ‘smart city solutions across multiple industries’.
Western Digital Purple microSDAs announces the adoption of 4K Ultra HD video, emerging artificial intelligence (AI) applications and analytics drive the rapid growth and evolution of data in surveillance, Western Digital Corp. unveiled the Western Digital Purple microSD card, purpose-built for the complex and dynamic data demands of modern surveillance cameras and edge systems. Surveillance system operators can count on the robust Western Digital Purple microSD card to support a continuous surveillance workload 24x7 surveillance video capture Whether it’s a business employing surveillance video to keep their assets secure or a retailer utilising surveillance to accurately analyse shopping behavior through video facial recognition, capturing and assessing every moment is critical. Optimised for 24x7 surveillance video capture, surveillance system operators can count on the robust Western Digital Purple microSD card to support a continuous surveillance workload. With its outstanding performance, the card captures and preserves video in a variety of high-definition and next-generation formats, including 4K Ultra HD video, as well as nimbly supports the movement of data to core data systems for analytics and fast business insights. The rugged and humidity-resistant design of this new card enables trusted video capture in a wide range of environmental conditions, including outdoors in snowy winters and indoors in hot and humid factory settings. Mainstream commercial surveillance “From Big Data, to Fast Data, to data-centric applications such as surveillance, the volume, speed, variety and value of data continues to exponentially grow and transform. Leveraging our proven capabilities in consumer and industrial memory card innovation, the Western Digital Purple microSD card is the ideal solution for mainstream commercial surveillance data at the edge,” said Christopher Bergey, vice president of embedded and integrated solutions at Western Digital. Western Digital now provides the industry’s most comprehensive offering for surveillance data, from the edge to the core" “Whether capturing 4K video, used in AI-enabled cameras, or part of a larger data system supporting ‘smart surveillance’ applications, this rugged and intelligent card delivers ‘surveillance-class’ endurance and tremendous performance to enable trusted video capture in some of the harshest conditions." "When combined with our popular Purple and Ultrastar hard disk drives (HDDs) to support data preservation and real-time analytics, Western Digital now provides the industry’s most comprehensive offering for surveillance data, from the edge to the core.” Data-centric surveillance demands Designed to support a wide range of video resolutions and surveillance video recording implementations, additional highlights of the new microSD card include: Robust Endurance for Continuous Recording: Supports up to 1,000 PE Cycles Card Health Status Functionality for Easy Card Maintenance: In compatible cameras, a unique health monitor offers reporting capabilities to provide users and system installers valuable information, including the card’s endurance and capacity status, enabling predictive maintenance and taking the “guess work” out of when to service the card. High Performance for Next-Generation Video: Offers speeds of up to 80 MBs sequential read and 50 MBs sequential write and supports Speed Class 10 and UHS Speed Class 11. Trusted Video Capture in Wide Range of Climates: Designed for use in temperatures ranging from -25°C to 85°C, it enables reliable video capture indoors and outdoors. High Capacity to Capture and Preserve Video if Connection to Network Connection is Lost: Offered in capacities up to 64GB2 Today’s surveillance systems have moved beyond simple low-resolution video capture, to massive networks capturing 4K video"Advanced analytics software “Today’s surveillance systems have moved beyond simple low-resolution video capture, to massive networks capturing 4K video and leveraging advanced new analytics software to unlock new business value from video recordings,” said Michael Palma, IDC Research Director for Semiconductor and Enabling Technologies. “This has resulted in a surge in the volume and velocity of surveillance data at the edge and is creating demand for storage solutions that support the performance requirements of 4K video, 24x7 operation, and movement of video for smart insights.” Portfolio of data storage devices The new Western Digital Purple microSD card complements a full portfolio of data storage devices purpose-built for today’s surveillance needs, including the Western Digital Purple Surveillance HDD for high-capacity support for NVRs and DVRs and the Ultrastar HDD series for use in back-end servers performing surveillance analytics. Together, they provide surveillance system integrators and installers a complete solution to capture, preserve, access and transform surveillance data. Additionally, Western Digital offers original equipment manufacturers industrial-grade SanDisk Industrial card storage solutions for use with cameras with in-camera analytics capabilities and a variety of connected surveillance applications. The new microSD card will be available worldwide through Western Digital’s authorised reseller network Product availability The new microSD card will be available worldwide through Western Digital’s authorised reseller network in April in 32GB and 64GB capacities for $18.99 and $31.99 MSRP (in the U.S.) respectively; cards available in single and convenient 25-packs for surveillance system installers and integrators. For more information on the Western Digital Purple microSD card and the complete Western Digital Purple surveillance portfolio, visit the Western Digital booth at ISC West International Security Conference & Exposition (Booth #2089).
ASSA ABLOY Security Doors, a UK division of ASSA ABLOY, a provider of door opening solutions, is launching a new range of high-performance timber doors for the public, commercial & high-end residential market. The new SMARTec timber door range has been developed to offer a complete doorset solution of high-quality, high-performing doors and frames complete with all ironmongery solutions. The doors are suitable for an extensive range of applications, including offices, high-end residential buildings, education facilities, factory premises, mixed-use developments, healthcare environments and premium hotels. Certified security doors Doorsets within the SMARTec range can offer certified performance including fire resistance, security and sound reduction properties and are available to order in a wide range of aesthetically pleasing finishes and styles. With ASSA ABLOY Security Doors already offering Powershield and Prima steel doors, as well as Safeguard high-security timber doors, the launch of its SMARTec high-performance timber doors range ensures architects, specifiers and contractors can now source a complete doorset solution from one trusted single point of contact. SMARTec will meet the needs of all customers and specifiers by providing a durable solution which achieves performance demands Ensuring health and safety compliance Brian Sofley, Managing Director at ASSA ABLOY Security Doors, explains, “We pride ourselves on the development, quality and performance of our doors, and our new high-performance timber range maintains this standard. We are confident that SMARTec will meet the needs of all customers and specifiers by providing a durable solution which achieves the performance demands required.” “Our portfolio provides a total solution of complete door assemblies in both steel and timber, which for fire safety products meets with the latest Government recommendations. We can deliver the entire process from start to finish, from initial specification to the manufacture of product, on site installation and after sales inspections and maintenance of our doors.” “Finally, our extended service offering—covering service, maintenance and fire door inspections—means we can deliver complete doorset solutions that remain fit for purpose and compliant with mandatory health and safety regulations at all times.”
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Security Professionals will need to develop an effective site plan to include where and when to conduct vulnerability assessments, implement focused mitigation strategies, and examine resources available to the food defence practitioner to minimise risk exposure and meet outlined regulatory requirements. Food Drug Administration’s proposed rule on food defence The FDA’s proposed rule on food defence would require facilities to address vulnerable processes in their food supply operations to prevent acts of intentional adulteration intended to cause large-scale public harm. Some background on what led to this aspect of the rule may provide insight into its key elements. The Act was signed into law on January 4, 2011 to better protect human and animal health by helping to guarantee the safety and security of the food and feed supply. Its focus was to ensure that the U.S. food supply is safe by shifting the focus of federal regulators from responding to contamination to preventing contamination. The law also provides FDA with new enforcement authorities designed to achieve higher rates of compliance with prevention & risk-based food safety standards, and to better respond to and contain problems when they do occur. Danger of large-scale public health harm Intentional adulteration includes those types of acts committed by disgruntled employees, consumers, or competitors where the intention is to cause large-scale public health harm; or by economically-motivated adulteration. Acts of disgruntled employees, consumers, or competitors are generally directed at attacking the reputation of the company and not at causing public health harm. The primary purpose of economically-motivated adulteration is to obtain economic gain, and not to impact public health, although public health harm may occur. From a historical perspective, the threat to the food supply chain has been evident for decades. Examples include during World War I when German agents in the U.S. infected horses and cattle in transit across the Atlantic to France; to al Qaeda documents and manuals found in Afghanistan after the 2001 U.S.-led invasion revealed interest in conducting chemical & biological attacks on food supplies; to 2014 when a Chinese court sentenced a former plant employee to life in prison after the poisoning of frozen dumplings that made at least 10 individuals ill. An effective overall site security plan will soon require the aspect of food defence to protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal, intentionally harmful means. The rule applies to facilities required to register as “food facilities” under Section 415 of the Food, Drug, and Cosmetics Act. Facilities covered under the rule would be required to develop a “Food Defence Plan” and identify and implement mitigation strategies to minimise or prevent significant vulnerabilities in food operations. The four key activities within the food system that are the most vulnerable to intentional adulteration, and have the potential to cause large scale public harm, are defined as liquid receiving and loading; liquid storage and handling; secondary ingredient handling; and mixing and similar activities. Each facility will be required to conduct a reanalysis of its Food Defence Plan at least once every three years Food Defence Plan against intentional contamination Covered facilities would be required to review their production systems to determine if they have any of these activity types and conduct their own vulnerability assessment to identify and prioritise points in their food operations that may be vulnerable to intentional adulteration. For the first time, FDA will have a legislative mandate to require comprehensive preventive controls across the food supply. This mandate includes compulsory preventive controls for food facilities to include the implementation of a written preventive controls plan. This plan involves: Evaluating the hazards that could affect food safety Specifying what preventive steps, or controls, will be put in place to significantly minimise or prevent the hazards Specifying how the facility will monitor these controls to ensure they are working Maintaining routine records of the monitoring Specifying what actions the facility will take to correct problems that arise. Each facility would be required to conduct a reanalysis of its Food Defence Plan at least once every three years, or following certain conditions (e.g., significant change in facility operations, new information about potential vulnerability, etc.). Personnel and supervisors assigned to the Actionable Process Steps would be required to receive appropriate training in food defence awareness and in their responsibilities for implementing Focused Mitigation Strategies. Facilities would be required to maintain certain records, including the written Food Defence Plan, personnel training documentation, and records related to monitoring, verification, and corrective actions. Lastly, as the issuing of the Final Rule approaches, the FDA has proposed to also publish a guidance document that provides the requirements in plain language to help businesses, particularly small businesses, comply with the identification of actionable process steps and implementation of focused mitigation strategy requirements. Industry can prepare now by conducting a comprehensive security assessment of their facilities to include the site perimeter, access control, security & emergency procedures, shipping, receiving & warehouse storage security practices, on-site security personnel, law enforcement outreach, site utilities, suppliers, hazardous materials/chemicals, criminal background check programs, cyber security, employee security awareness training, incident reporting & documentation, and recordkeeping requirements. The FDA website also includes useful information on FSMA, as well as links to their software programs such as the “Food Defence Plan Builder” that is designed to assist in developing a food defence plan based on a user entering specific answers relevant to their facility.
Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from greater awareness of the different uses for surveillance, as well as more accurate and robust technology. According to research firm Memoori's 2015 annual report on physical security, video surveillance products were 54 percent of total sales and accounted for $14.68 billion, topping intruder alarms which came in at 23.5 percent and $6.40 billion and with access control garnering $6.13 billion and 22.5 percent of the total. The report further indicates that the industry overall has edged up at a compound annual rate of 7.82 percent since 2010 and forecasts growth for total security equipment up some eight percent in 2016, reaching almost $42 billion over the next five years to 2020. Steve Stowe, Vice President of BAP Security in Macon, Georgia., is keen on the higher feature sets and intrinsic value of video surveillance applications for the company’s prospects and customers. BAP Security has been in business since 1967, offering custom security solutions for residential and commercial subscribers in Georgia, North Carolina, South Carolina and Florida. Video analytics on a roll Stowe says he expects to see higher adoption of video analytics as it becomes a more common feature in even lower-cost equipment. “We have more and more people asking about line-crossing detection in particular. Many customers are also looking at upgrading older analogue CCTV equipment since we can economically match the 1080P resolutions they are used to seeing on their televisions with HD-TVI, HD-SDI and other HDcctv technologies while still using their existing cabling infrastructure. There are still many customers who have seen the value at one point in time to invest in a CCTV system – we can now help them migrate cost-effectively and offer much improved picture quality than what they are used to,” Stowe says. Video analytics is becoming an increasingly common video surveillance feature,even in lower-cost equipment According to Stowe, businesses with personnel who have one-on-one contact with their customers such as office reception areas, teller stations and others are looking at adding cameras to record these interactions in case there is a problem, possibly even recording video with audio when appropriate. “Even customers who don't want a complete CCTV solution can use a more limited, standalone system or even IP cameras with edge recording,” he says. Replacing intrusion detection with CCTV Increased awareness by the general public regarding the advantages of surveillance is also fuelling an interest in video installations, Stowe says. “Homeowners are asking about CCTV more than ever before, and most of the people we are talk to are looking for a lot more than the simple plug-and-play cameras being sold by mass marketers. They want good, high-definition cameras to watch their driveways, HVAC units, garages, shops and even their pets.” The commercial market is also experiencing an uptick, especially for integrated installations. “Some commercial markets such as factories, multi-tenant properties and churches are looking more at integrating CCTV with other systems such as access control. Capturing the video as the door is accessed along with who and what might be with the cardholder is information that is important to them, whether it is to catch internal theft or making sure the tenant is not letting others access the property or even for child safety.” Looking ahead, word on the street is that CCTV installations may eventually take the place of traditional intrusion detection sensors. Motion detection, analytics and integration with audio or other technology continues to increase the power of surveillance specifications for loss prevention and more.
Cybersecurity is a fast-changing field and 2015 was no exception. The proliferation of cybersecurity issues continued to make headlines, including the very dramatic hacking of a vehicle to allow for remote control over steering, brakes, the transmission and other critical functions. There was also state-sponsored hacking that targeted government, defence and other strategic sectors of the marketplace. Staying on top of these breaches still remains a challenge. Securing the Internet of Things While we can’t discuss the details of our projects over the past year, we are proud to say that NTT Com Security has been successful in identifying new vulnerabilities in mobile devices, home security systems, and automotive telematics interfaces. These are all part of the important area of the “Internet of Things” that will continue their climb into the information security headlines in 2016. For the New Year, we are anticipating a broader focus beyond the servers, workstations and communications infrastructure that we are used to, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices, and myriad other devices that will eventually all be connected to the Internet – and therein lies the ongoing task. The Internet in general is extremely vulnerable, and companies and individuals have a long way to go in learning how to protect themselves. We can expect continued attacks targeting payment card data wherever it can be found along with attempts to commit financial fraud with stolen banking credentials or via social engineering tricks like spear phishing emails. High profile breaches, such as the Edward Snowden leaks, have brought security to the forefront of the public consciousness Security and risk management Fortunately, these high-profile breaches, hack demonstrations (like the Jeep hack), and the Snowden leaks have all helped bring the topic of security directly into the public consciousness. With consumers becoming aware of the value of their information and the importance of protecting their privacy, companies will be forced to design security into their products. We are already seeing a public demonstration of this with the new security and encryption controls Apple has implemented on the iPhone. Meanwhile, talking about risks and vulnerabilities can sometimes feel like shouting at a crowd that refuses to listen despite the obvious danger they are in. The good news is that we are taking active steps to guard against risk and combat it where it happens. NTT Com Security has developed a global cybersecurity and risk management portfolio of managed services, consulting and technology solutions to protect critical and confidential data from attacks. See the full coverage of 2015/2016 Review and Forecast articles here
Amthal has worked closely with Garrard Windows to install smart CCTV systems for its showroom and factory site, to present ultimate protection for staff, customers and premium products in storage. Garrard Windows is one of the largest suppliers in England, presenting PVC-U and aluminium windows, bifold and patio doors, together with conservatories to the trade, with an objective to remain reliable, efficient and customer orientated. Manufacturing around 2,500 products a week, to ensure the security of products and supply on site, Gerrard Windows called upon Amthal to enhance its security and install CCTV systems throughout its factory and show room site. Smart CCTV facilities Our aim is to supply the window trade with high quality products, always delivered on time and at competitive prices" Adam Webb, Director of Garrard Windows: “Our aim is to supply the window trade with high quality products, always delivered on time and at competitive prices. Many of our existing customers are fabricators themselves, relying on us for extra capacity in busy periods.” “To maintain this commitment and ability to respond quickly to customer requests, we have to ensure maximum security on site at all times. Amthal identified the subtle installation of smart CCTV facilities throughout our premises as added visual protection, to ensure we can view activity on a 24 / 7 / 365 basis, even when we are off site. Our staff are already feeling the benefits and peace of mind security.” Improved technology David Williamson, Amthal Sales Account Manager: “Garrard Windows has a renowned reputation in the industry, not only as one of the largest suppliers, but also in responding quickly to client requests to a high-quality standard. It’s essential security on site is maintained to a maximum standard to sustain this level of efficiency and reliability.” The added visuality provides total peace of mind the right security is in place to protect against any risk" “Following an on-site inspection, Amthal made the recommendation of smart CCTV solutions to ensure Directors can feel the benefits of having new and improved technology helping to safeguard assets. The added visuality provides total peace of mind the right security is in place to protect against any risk, or possible disruption due to theft, to the smooth-running operation and delivery to our customers.” Satisfying end user needs Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
Iris ID, a global provider of iris recognition technology, has partnered with Africa’s leading manufacturing conglomerate, Dangote Group, to provide a time and attendance solution for more than 30,000 employees working at Dangote Cement manufacturing plants in five countries. The Dangote Group is a Nigerian multinational industrial conglomerate, founded by Aliko Dangote. It is the largest conglomerate in West Africa and one of the largest on the African continent. The group employs about 35,000 people, generating revenue in excess of US$4.1 billion in 2017. Contactless facial recognition system Prasanna Burri, group chief Information officer, Dangote, Group, said the company wanted a biometric solution that provided greater accuracy than a facial recognition system previously used at the company’s cement manufacturing plants in Nigeria, Ethiopia, Senegal, Sierra Leone and Congo. The new system also had to be contactless to reduce the chances of spreading colds, flu and other diseases. The Iris ID readers provide us with a secure time and attendance solution" “Iris-based technology is not only contactless and more accurate but also faster than our previous system,” he said. “The Iris ID readers provide us with a secure time and attendance solution, deployed in Dangote Group’s public cloud that integrates seamlessly with the enterprise resource planning system at our Nigerian headquarters.” Early success Burri said the system’s early success has Dangote considering expanding it to more of its African operations. Mohammed Murad, vice president global sales and business development, Iris ID, said the iris-based solution was ideal for use in the Dangote cement manufacturing operations. “Our contactless readers work well in a dusty environment and are unaffected by employees wearing safety glasses and other protective gear,” he said. “Dangote is the largest indigenous industrial conglomerate in sub-Saharan Africa, helping to drive the continent’s growth. We’re happy to play a part.” Time and attendance system Initial installation of the time and attendance system was completed by Maxut Consulting Ltd. Of Lagos, Nigeria. Iris ID technology is used in several African nations providing identity authentication for national ID, voter registration and other public and private programs.
Manufacturer ROCKWOOL International A.S. has chosen Nedap’s Global Client Programme to secure its offices and factories worldwide. AEOS, the physical security platform by Nedap, installed during the programme, enables ROCKWOOL to establish a truly global security policy and unified work processes. An advanced project rollout, the Global Client Programme is developed for large multinationals and offers several benefits, including standardisation across sites, shorter implementation times and cost efficiencies. Standardising company’s security measures The Global Client Programme connects all of ROCKWOOL’s factories and office premises, and standardises the company’s security measuresROCKWOOL has 28 factories across the world. The Global Client Programme connects all of these factories and ROCKWOOL’s office premises, and standardises the company’s security measures throughout the world. Fokko van der Zee, managing director at Nedap Security Management, says: “The implementation of a standardised security solution across the world is a complex process. It involves a large project spanning many years and involving many stakeholders, and demands a high level of project management. In the absence of a structured program with defined guidelines, a global security rollout is likely to be a stressful execution. That’s why we set up our carefully designed Global Client Programme.” ROCKWOOL Digital Service Lead, Matthew Thorne, agrees: “We’ve worked with Nedap over the past few years and recently became a member of their Global Client Programme. Now we’re equipped with the people and tools we needed to standardise our physical security solution. The Global Client Programme also minimises risk and guarantees compliance. It really meets our needs in every possible way.” Central security platform saves money The programme helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of severalThe Global Client Programme is designed to ensure monitoring and control during every step of the rollout process. Timon Padberg, responsible for business development at Nedap Security Management, explains: “The repetitive nature of local site deployments allows us to work with models and templates, such as standard proposal and calculation documents. We can therefore produce a scalable process that ensures uniformity and a consistently high quality of implementation across each site.” By using the Global Client Programme, ROCKWOOL is aiming for uniformity and alignment across all sites. The programme also helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of several. Moreover, there are significant savings on operational and maintenance costs due to shared services and economies of scale.
Keeping the food supply safe was not an issue for Furman Foods back in 1921, when John W. Furman canned 360 glass jars of tomatoes with his wife, Emma, and their six children. Just as food processing practices have evolved over time, so too has the nation’s approach to securing food processing facilities. Today, Furman Foods uses ID cards as the first step of a greater plan to enhance its plant security. Furman Foods is a family-owned business. By 1969, the company had sold a million cases of tomatoes and was complementing its tomato crop with beans, peppers and other vegetables sold under the Furmano’s name. The company’s roots are planted firmly in the soil of the Susquehanna River Valley of Pennsylvania. Despite this remote location, Frank Furman, Vice President of Quality, is ready to take the facility to the next level of security and quality. “The need is here,” he said. “Everything is coming together at once. Not only does security make good business sense, but it also is something we need to do for our customers.” Food safety and security While the company has focused on food safety for many years, the U.S. Food and Drug Administration’s (FDA’s) Bioterrorism Act of 2002 made security a top concern for food producers such as Furman’s. Title III of the act specifically addresses protecting the safety and security of food and drug supplies. In addition, because Furman Foods provides food for U.S. Department of Agriculture (USDA) food programs, it is subject to USDA security measures. Security isn’t new to the company. It began incorporating additional security measures shortly after September 2001. The well heads for the water supply are locked and checked daily, for example, and a third-party security service is on duty during off-hours. Delivery truck doors now must be sealed, the company’s computer systems have new access controls in them, and locks now adorn all bulk storage areas, such as those for corn sweeteners and vinegar, some of the most vulnerable areas in the company. An important part of the security system at Furman’s is a new ID card program Time and attendance tracking An important part of the security system at Furman’s is a new ID card program. “We needed to replace our time clocks,” said Mark Slear, Systems Administrator, “so we took advantage of the opportunity to introduce employee ID cards to track time and attendance.” “I wanted some kind of control so that people who don’t work here don’t get in,” Furman said, “Despite the fact that we are located in a rural area, we still were seeing people here who shouldn’t be here. We had to figure out some way to limit access.” In the past, the company had pre-printed, pre-numbered, bar coded cards for hourly employee access. Employees were assigned a number, but that was it. HID Fargo Printer/Encoder Slear and Furman selected the Fargo DTC550 Direct-to-Card Printer/Encoder with lamination capabilities from ID Wholesaler (www.idwholesaler.com), a Fargo Value-Added Retailer and the largest online reseller of photo ID products. “I looked around quite a bit,” said Slear, “and all of my research kept coming back to Fargo.” Furman’s warehouse employees require a stronger card to withstand the everyday wear and tear associated with their active jobs" “We determined that Furman Foods needed a higher level of security than a basic photo ID card could offer,” said Shane Stark, Account Manager, ID Wholesaler. “The FDA keeps tight regulations on who has access to food processing areas. Along with using bar codes and magnetic encoding for security measures, Furman’s warehouse employees require a stronger card to withstand the everyday wear and tear associated with their active jobs. This led us to lamination and a Mylar card, which offers greater durability.” Slear was also interested in the printer’s speed. “When we ramp up during the summer, we produce a year’s worth of product in three months,” he said. “We have to print a lot of ID cards quickly to accommodate our seasonal workers.” Security access cards Furman’s bought the Fargo printer in October, took employee pictures in November and began issuing new ID cards in January. The ID cards contain a full photo, and the program includes all employees, even the extra 300 that are hired during the July-to-October busy season. While tracking time and attendance with the ID cards was the company’s first concern, Slear and Furman were thinking ahead when they chose an ID card printer, knowing that security needs would be enhanced down the road. “We added a magnetic stripe and photo in preparation for future security,” said Slear. “We haven’t defined yet what else we might do, but much of it will be driven by FDA and USDA directives.” “We liked the fact that the DTC550 printer can print on proximity cards if we decide to upgrade our ID cards someday,” said Slear. Furman agreed. “Eventually, we will go to smart cards, especially for the room where our ingredients are mixed,” he said. “We need to limit this area to those who are designated to be there. They will have to swipe an ID card for access. We chose a printer that will allow us to upgrade the cards, knowing that sooner or later we’ll have to go further with security.” Our product and industry knowledge enable us to assess our customers’ needs and present options that meet their requirements" Comprehensive identification solutions “Everything has been going well,” Slear said. “The person printing the cards picked up on it quickly.” Slear gives high marks to ID Wholesaler for their customer service. “Every time I talk to Shane, I get the answers I need,” he said. “He also checks in from time to time, just to see how things are going.” “Our product and industry knowledge enable us to assess our customers’ needs and present options that meet their requirements and their budgets,” said Jennifer Clancy, Marketing Manager, ID Wholesaler. Currently there are three variations to the Furman’s ID cards: yellow background for employees, green background for visitors and blue background for vendors. “Certain vendors are allowed on site without an escort,” said Furman. “For instance, because we are a kosher facility, once a month a rabbi comes in to check our operations. He has his own vendor ID card and is pre-approved, so he can move throughout our facility unescorted.” Facility security One of our big concerns is having someone follow a carded employee into the plant Furman Foods prides itself on its strong values, its quality products, its sustainability and its food security. Yet Furman isn’t satisfied. “We are still not where we should be,” he said. “We have come a long way, but we have a long way to go. If I could wave a magic wand, we would have one entrance, where everybody has to enter and exit. This entrance would be secured by a card reader, so individuals would have to swipe an ID card to get in. One of our big concerns is having someone follow a carded employee into the plant. Restricted areas should require special access cards, and I’d like a fence around the entire facility, with a guard shack where everyone checks in and out,” he further added. Right now, there are multiple entrances for traffic. The facility is very spread out, and the road in front is a public road. Photo ID access card Yet, all agree that the ID cards are an important step on Furman Foods’ journey toward enhanced security. “A safe workplace is fundamental,” said Clancy. “Photo ID cards provide at-a-glance validation that the card wearer is authorised to be on the premises. This is especially important for food manufacturers.” “I tell our employees security is only going to get tighter,” Furman said. “More safeguards will be put in place. We are in the food business. If we don’t have safe foods, we don’t have jobs.”
Ellams, a global manufacturer and supplier of telephone scratch cards based in Nairobi, Kenya, required a foolproof security solution, integrated with access control and video surveillance for their manufacturing units. Matrix provided Ellams with an Integrated Access Control solution comprising of Card based Entry and Exit Readers. Established in the year 1977, Ellams primarily started off as a Security Documents Printer and Business Forms Manufacturer. In the year 2001, Ellams started off with the new venture of developing Telephone Scratch Cards for local telecom and cellular operators. Ellams has two manufacturing units based in Nairobi that supply secure pre-paid scratch cards to Central, Western, Eastern, and Northern Africa. Security being crucial for Ellams with respect to its manufacturing unit, the company was on a look out for a vendor who could meet the below mentioned requirements. Challenges: Dual verification of credentials at main entrance Allow entry or exit to a user in an employee zone if a guard is present in his cabin Guard does not leave while employees are present in an employee zone Keep a check on employees’ movements – whether they enter after gaining access or not, etc. Access Control in each department Pre-defined number of users allowed in a department When a user enters an area, the event is recorded till he/she leaves Generate alarm on violation of access rules Solutions: Web-based access control solution with card-based entry and exit readers Integration with beam detector for checking user availability in an area after entering the premises Man-Trap feature to open one gate at a time Employees allowed access only if guard is present Occupancy control to ensure defined number of people are allowed in the respective zone Camera remains on in presence of employees in a respective zone and turns off in their absence Instant alarm notification to take immediate action upon violation of access rules Benefits: Improves security with integrated solution Real-time alarm notification helps take immediate action upon violation of access rules Ensures the guard continuously monitors entry and exit of employees Products: COSEC DOOR CAP - RF card based premium door controller COSEC PATH RDCE – EM proximity card-based reader COSEC PANEL LITE- Site controller for multiple door controllers COSEC CENTRA GE- Application software for 100 users, expandable up to 500 users COSEC GE ACM- Access control module for COSEC CENTRA GE
Vanderbilt’s ACT access control solution was recently installed by BDI Security Solutions Ltd at sites in Burnaston, Derbyshire, and Deeside, North Wales, for car manufacturer Toyota Motor Manufacturing (UK) Ltd. At Deeside, Toyota operates a 115-acre engine plant. Together, the two sites represent investment of £2.5bn and employ 3,000 people. For the plant’s security, Toyota wanted a tailored solution that would enable them to operate from a virtual environment and respond promptly to requests. Unified access control solution The installation replaced a legacy system that was no longer future-proof and did not allow access control listings to be integrated with Toyota’s general corporate database. Toyota now has a unified solution with badge-printing as an integral and cost-effective element when it had previously been a separate process. The equipment installed at the manufacturing plant includes ACT Mifare1030 mullion proximity readers at both indoor and outdoor locations. These slim-line readers support third-party smart cards and fobs, feature a robust polycarbonate housing and have an ingress rating of IP67. They are particularly suited to this type of project where the smart card is used for multiple applications across access control and HR. ACT eLock MIFARE Classic Toyota is also using ACT eLock MIFARE Classic. This is a wireless door lock that includes an access control reader and opening mechanism, all powered by batteries. ELocks operate with an ACT eLock hub and up to 32 locks can communicate over a wireless network with each hub.