Fleet surveillance
Global Security Exchange (GSX) 2024, the annual conference of ASIS International, the world’s largest association for security management professionals, closed on day two in Orlando, FL. Concluding the afternoon of Wednesday 25 September, the event features an extensive program with more than 200 education sessions, daily keynote speakers and general sessions, and a show floor with approximately 500 pioneering innovators from the security industry. Prevalence of AI Tuesd...
Smiths Detection, a global pioneer in threat detection and security screening technologies, and a business of Smiths Group plc, announces the launch of the SDX 6040 Enhanced Image Quality (EIQ), a cutting-edge screening solution designed to meet the dynamic demands of modern security environments. SDX 6040 The SDX 6040 offers the best image quality on the market, ensuring unparalleled clarity when detecting threats. Unlike fixed screening equipment, the SDX 6040 is highly mobile, allowing it t...
ISC East, with its premier sponsor the Security Industry Association (SIA), and in partnership with the ASIS NYC Chapter, announced 2024’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination. ISC East Keynote Series Day 1 Keynote: Proactive Security Strategies at Navy Pier, Chicago: A Unified Approach to Emergency Preparedness and Response – Brian Murphy, chief operating officer at Navy Pier in Chicago, Illinois,...
Teledyne FLIR, part of Teledyne Technologies Incorporated, announced a limited-time promotion for SIRAS™, a professional drone that includes a quick-connect dual radiometric thermal and visible camera payload. First responders, including police, fire, and search and rescue agencies, can now purchase one unit per agency at a significantly marked-down price of $6,995, a discount of more than 28 percent, through the end of the 2024 calendar year. SIRAS drones SIRAS drones are engineer...
HMS Networks now announces the launch of the Anybus Defender Lineup, a suite of industrial network security appliances designed to safeguard critical infrastructures. As cyber threats increasingly target industrial environments, the Anybus Defender series provides a firewall to protect operational technology (OT) networks. New protection strategies Specifically designed for Industrial Control Systems, the primary use-cases are network segmentation in line with ISA/IEC 62443-3-3, Network Addre...
Sustainability is a hot topic. Everyone knows about it. Governments have active Net Zero strategies and implementation plans, while organisations are establishing plans and activities to reduce their environmental impact. In many instances, it is evident that failing to act can also have an effect on a company’s reputation, culture, and brand perception. In most cases, businesses are not shy about promoting their achievements through different communication channels, understanding that b...
News
Vehicle safety specialist Durite is expanding its van range with reverse-view brake light cameras. Brake light cameras are retrofitted to the vehicle, replacing the existing brake light assembly and enhancing rear visibility, whilst retaining brake light function and ensuring compliance with safety regulations. Offering a wide-angle view, they provide the driver with extra visibility and reduce manoeuvring errors - particularly when reversing. Light commercial vehicle operators can choose from a range of universal kits compatible with major makes and models. Alternatively, they can create a customised solution using Durite’s online kit builder. Covering 10 pioneering brands including Ford, Mercedes and Volkswagen, the kit builder features 11 cameras and a choice of mirror-mounted monitor or 7-inch display screen. Both monitors have dual camera inputs, allowing for the addition of a side-mounted camera where needed. Durite Brake Light Reverse Cameras John Nobbs, Durite UK Sales Manager said: “Durite Brake Light Reverse Cameras offer van operators another way to further enhance road safety while also protecting vehicle assets. This is an innovative and robust range of van camera solutions specifically devised by Durite to improve safety. They provide greater visibility, reducing the risk of collisions and accidents, which in turn leads to reduced repair and insurance costs as well as minimising van down time.” Each kit comes with all the necessary cables needed to power the cameras and brake lights Each kit comes with all the necessary cables needed to power the cameras and brake lights, while sending the signal from the cameras to the monitor. They are designed to be quick and easy to install. “Our online brake light camera kit builder makes it easy for van operators to find and purchase the right kit for all types of van,” added John Nobbs. Range of vehicle safety products A claim agreed by Glen Bugden, owner of Auto Electrical Supplies Southampton Ltd: “Durite offers one of the most comprehensive ranges of brake light cameras and it’s useful to have one place to go to find the kit I need. Plus, as the camera is a direct replacement for the existing one, it makes installation faster, neater and more straightforward.” Durite has been supplying vehicle cameras for more than 20 years and has sold more than 100,000 systems. The company also provides a comprehensive range of vehicle safety products, making it a one-stop shop for fleet operators. In total, it offers more than 5,000 quality parts. Durite is the UK’s pioneering brand in vehicle safety, lighting and auto electrical parts for commercial vehicles and the general automotive aftermarket.
In harsh, disconnected, or mobile environments like disaster zones, remote research stations, or long-haul trucking operations, organisations face significant challenges in providing computing capabilities. Previously, organisations with mission-critical workloads lacked access to important cloud and AI capabilities when in demanding edge environments, including those that present unique challenges and requirements. Cloud and AI capabilities Google Cloud is excited to announce the general availability of Google Distributed Cloud air-gapped appliance, a new configuration of Google Distributed Cloud that brings Google’s cloud and AI capabilities to tactical edge environments. The integrated hardware and software solution unlocks real-time local data processing for AI use cases such as object detection, medical imaging analysis, and predictive maintenance for critical infrastructure. The appliance can be conveniently transported in a rugged case or mounted in a rack within customer-specific local operating environments. Key features Google Distributed Cloud air-gapped appliance offers: Department of Defence (DoD) Impact Level 5 (IL5) accreditation: The appliance has achieved Impact Level 5 accreditation, the highest level of security controls and protection required for unclassified, but sensitive information. The appliance is also designed to meet Impact Level 6 and higher accreditations and is actively working towards achieving these certifications. Advanced AI capabilities: Customers can enhance the performance of their mission-critical applications by utilising built-in AI solutions from the Google Distributed Cloud air-gapped appliances like translation, speech, and optical character recognition (OCR). For instance, they can use OCR and translation features to scan and translate documents written in different languages, making them accessible and understandable for their end users. Rugged and portable design: Built to withstand harsh environmental conditions, including extreme temperatures, shock, and vibration, Google Distributed Cloud air-gapped appliance has a rugged and portable design that meets stringent accreditation requirements like MIL-STD-810H, ensuring reliable operation even in challenging scenarios. Weighing approximately 100 lbs, it's human-portable, making it easy to transport and deploy in various locations. Full isolation: Google Distributed Cloud air-gapped appliance is designed to operate without any connectivity to Google Cloud or the public internet. The appliance remains fully functional in disconnected environments, preserving the security and isolation of the infrastructure, services, and the APIs that it manages. This makes it ideal for processing sensitive data while meeting strict regulatory, compliance, and sovereignty requirements. Integrated cloud services: Google Distributed Cloud air-gapped appliance offers both infrastructure-as-a-services (IaaS) features like compute, networking, and storage, and Google Cloud services like data transfer and data analytics technologies. Data security: Google Distributed Cloud air-gapped appliance includes robust security features like encryption, data isolation, firewalls, and secure boot to protect sensitive information. Applications The Google Distributed Cloud air-gapped appliance enables a wide array of use cases for organisations with stringent security requirements, including: Disaster response: In the aftermath of a disaster, timely and accurate information is crucial for coordinating relief efforts and saving lives. However, disaster-stricken areas often lack the necessary infrastructure to support traditional communication and data processing systems. As a self-contained, ruggedised device, the Google Distributed Cloud air-gapped appliance can be rapidly deployed to disaster-affected areas, even in the absence of internet connectivity. It comes pre-loaded with essential software and tools for data collection and analysis, enabling immediate response to emergencies. By leveraging the Google Distributed Cloud air-gapped appliance, aid organisations can enhance their disaster response capabilities, improve coordination, and save lives in times of crisis. Industrial automation: Google Distributed Cloud air-gapped appliance offers an innovative solution for remote equipment monitoring, predictive maintenance, and process optimisation in challenging environments at the edge. For instance, in the manufacturing sector, the appliance can be leveraged to track and optimise equipment performance in remote plants, pioneering enhanced productivity and minimised downtime. Transportation and logistics: Google Distributed Cloud air-gapped appliance supports the unique demands of fleet management, autonomous vehicles, and real-time logistics optimisation. For example, the appliance can facilitate the deployment and operation of autonomous vehicles by enabling real-time collection, processing, and decision-making, helping autonomous vehicles safely and efficiently navigate complex environments. Restricted workloads for federal and defence: Google Distributed Cloud's air-gapped appliance is designed to meet the demands of restricted workloads, such as sensitive data analysis, AI inference and simulations, and intelligence translation while adhering to security and supporting compliance regulations. Digital ecosystem “Google Distributed Cloud air-gapped appliance will enable the Air Force Rapid Sustainment Office (RSO) to bring the maintenance digital ecosystem to Airmen in austere and forward deployed locations, supporting the Air Force's agile objectives while prioritising security and reliability,” said Michael Roquemore, Director of the RSO’s Rapid, Agile, Integrated Capabilities Team. “By delivering a secure and compliant edge compute platform, the RSO can leverage already developed Google-based technologies in both connected cloud and disconnected edge to bring digital innovation to the Service Members wherever they operate.”
JumpCloud Inc. released the results of its Q3 2024 SME IT Trends Report, “Detours Ahead: How IT Navigates an Evolving World.” The seventh edition of the report provides new insights around the challenges and opportunities facing IT teams at small and medium-sized enterprises (SMEs). It covers topics such as: The growing threat of shadow IT and AI How teams manage complicated device and IT environments The relationship between IT and managed service providers (MSPs) IT professionals' biggest fears and wants Top of the latest challenges JumpCloud commissions this survey twice a year to stay on top of the latest challenges, trends, and experiences of IT professionals. This edition surveyed IT teams from the U.S. and the U.K. JumpCloud tasks this survey twice a year to stay on top of the latest challenges, trends “IT teams are dealing with many obstacles. They face uncertainty about economic conditions and elections. There are growing security threats, complex tech stacks, and device varieties. Despite this and more, IT admins are resilient and resourceful,” said Greg Keller, co-founder and chief technology officer. “What’s keeping them up at night is what they can’t see — 84% of IT admins worry about shadow IT. To help combat the security holes shadow IT creates, IT needs to deploy tools to help spot rogue apps. This will give IT teams the control and visibility they need to keep organisations safe.” Below are select findings from the report. For the full report, download “Detours Ahead: How IT Navigates an Evolving World.” The rise of shadow IT and the need for admin control Shadow IT creates security holes. It also creates compliance violations, data loss risk, and fragmented, inefficient IT. As cloud applications increase and AI use grows, IT teams want to mitigate risks by identifying and managing unauthorised apps and resources. Centralising IT empowers admins to enforce security policies. They could also enforce access controls and data governance across their whole IT system. Lack of visibility and control are creating substantial concerns. Eighty-four percent of SMEs are concerned about applications managed outside of IT (i.e., shadow IT), with 35% reporting they're very concerned. When asked what has prevented them from addressing shadow IT, 36% say they have more important priorities. Thirty-one percent say their business users move too fast to keep up with their needs. Thirty-two percent say they don't have the ability to discover all the applications used by employees. Twenty-nine percent say they lack partnership and communication with business partners, and 24% say they don't have a SaaS management or asset management solution to manage shadow IT. SMEs experiencing a steady stream of cyberattacks. Nearly half (45%) of SMEs have been the victim of a cybersecurity attack in the first half of 2024. Of those, 28% experienced two attacks, 17% experienced three, and 5% suffered three or more. The most common source for cyberattacks was phishing (43%), followed by shadow IT (37%), stolen or lost credentials (33%), and a breach in a partner's organisation (30%). IT admins are struggling to keep organisations safe. Forty-nine percent of IT teams say that despite their best efforts, their organisation lacks the resources and staffing to secure the organisation against cybersecurity threats. Managing a mixed environment in uncertain times Flexibility and support are key for organisations with global employees using a variety of different devices. Admins expect to continue supporting such variety. But, without the ability to centrally manage devices, organisations face security risks. These come from workers’ abysmal security practices or unauthorised devices accessing company resources. SMEs continue to support a diverse device environment. The average SME allows their employees to use a variety of devices. The average device landscape is made up of 24% macOS devices (up from 22% in Q1 2024), 18% Linux devices (down from 22%), and 63% Windows devices (up from 60%). Such a variety of devices and a growing number of digital identities has admins continuing their plea for a centralised IT. Eighty-four percent of IT teams prefer a single platform to manage user identity, access, and security over many best-in-class point solutions. Too many credentials are causing chaos. Nearly half of IT admins (45%) require five to 10 tools to manage the worker lifecycle, and over a quarter (28%) need 11 applications or more. This is because of dilemmas like legacy systems and complicated integrations. Only 26% of employees can access all their IT resources with just one to two passwords. Nearly 17% have to manage 10 or more. Keeping up with security Security continues to be the number one challenge facing IT teams as cyberattacks increase in both frequency and sophistication. IT teams have worked hard to prepare their organisations to withstand the threats by staying on top of best practices and tools. But it's a lack of visibility, control, and easy management of employees and their devices that continues to vex them. Security fears dominate. Sixty percent of SMEs consider security the biggest IT challenge, followed distantly by new service and application rollouts (42%), the cost of solutions necessary to enable remote work (40.8%), and device management (39%). The four biggest security concerns are network attacks (40%), followed by software vulnerability exploits (31%), ransomware (31%), and shadow IT (29%). The threat is rising, as are worries about security budget cuts. Half (50%) of IT teams report being more concerned about their organisation's security posture than they were six months ago, down slightly from the 56% who said the same in Q1 2024. Seventy-one percent say any cuts to their security budget would increase organisational risk. SMEs still need to securely manage passwords. While the industry pushes for passwordless authentication, 95% of respondents use passwords to secure at least some IT resources. Making more out of the MSP relationship The steadfast relationship between managed service providers (MSPs) and SMEs continues. While MSPs are seen as delivering better security, productivity, and cost savings, there are also signs that SMEs are starting to expect more from their MSP partners. MSPs are a critical tool for SMEs and investment is expected to increase. Seventy-six percent of SMEs rely on an MSP for at least some functions, the same as the 76% who reported so in Q1 2024. Over the next 12 months, 67% of SMEs say they'll increase their MSP investment. While MSPs drive cost savings, SMEs report improvements in security and efficiency as the biggest return. When asked about the results of working with an MSP, 56% said MSPs led to better security. Fifty-seven percent said MSPs increased their effectiveness at managing IT, and 37% said they saved money for their organisation. Not all IT teams are eager to work with MSPs. For the 24% who don't use an MSP, nearly half say it's because they prefer to handle IT themselves (47%), and 39% say it's because MSPs are too expensive. To be successful, MSPs should keep an eye on security, costs, scale, and customer experience. For all SMEs, including those that use MSPs, 39% have concerns about how MSPs manage security. The main reason SMEs stopped working with an MSP was cost (28%). Next, they outgrew the MSP's service offerings (26%), moved IT internal (24%), or had a bad customer service or sales team experience (23%). Balancing the unexpected and unknown of AI IT teams hope that AI can streamline operations and are actively preparing to integrate AI into operations. At the same time, admins are also concerned about AI’s impact on security and unsure about how AI may impact their jobs. IT teams have a varied response to AI. When asked how their opinion changed in the last six months about how AI will impact their job, 22% say the impact of AI is much lower than they thought. Thirty-four percent say the potential impact of AI is the same but it's moving slower than they thought it would. Twenty-one percent say their opinion hasn't changed, and 23% say they feel the impact of AI is even greater than they thought it would be. AI fears remain while IT teams work to adopt it responsibly. Sixty-one percent agree that AI is outpacing their organisation's ability to protect against threats. Over one-third of IT admins (35%) say they're worried about AI's impact on their job. This is down from the 45% who said the same in Q1 2024. Unified open directory platform JumpCloud delivers a unified open directory platform that makes it easy to securely manage identities Thousands of organisations worldwide rely on JumpCloud to fulfil their commitments and tackle the most pressing technology challenges, regardless of the uncertainties they face. JumpCloud delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across the organisation. With JumpCloud, IT admins grant users secure, frictionless access to the resources they need to do their job, and manage their entire fleet of Windows, macOS, Linux, iOS, and Android devices from a single console. JumpCloud is IT Simplified. If they want to find to how JumpCloud can help them get to the destination that matters most to the organisation, visit the website or get in touch with the global sales team. Methodology JumpCloud surveyed 612 IT decision-makers in the U.K. and U.S., including managers, directors, vice presidents, and executives. Each survey respondent represented an organisation with 2,500 or fewer employees across a variety of industries. The online survey was conducted by Propeller Insights, from June 4, 2024 to June 7, 2024. The findings from the JumpCloud Q3 2024 SME IT Trends Report can be found in “Detours Ahead: How IT Navigates an Evolving World.”
Automated operation is a key function for expanding rail capacity and strengthening the performance of railways. Working together with S-Bahn Berlin, Siemens Mobility has installed and will be testing an obstacle detection system – a key technology component for enabling fully automated driving – for the first time during regular daily operation. The project’s goal is to thoroughly evaluate the performance of the new obstacle detection system during daily operation in various weather and route conditions. The test data will be used to further refine the system and optimise the positioning of the detection sensors. Siemens’ new obstacle detection system In the future, the obstacle detection system can help drivers avoid accidents The system will record background data for the duration of the project, and neither the train drivers nor the passengers will notice its operation. In the future, the obstacle detection system can help drivers avoid accidents, which will stabilise daily S-Bahn operations and increase punctuality. The system promises to be a key technology for enabling digitalised, fully automated rail operations in the future. Albrecht Neumann, CEO Rolling Stock at Siemens Mobility, said: “Intelligent trains that relieve their drivers of routine tasks and support them in their work are the future of digitalised rail transport. These trains will be able to automatically set themselves up and shut down, ensure energy-optimised operation, react quickly and safely to obstacles on the track, and shunt fully automatically on the depot grounds.” Albrecht Neumann adds, “We look forward to working with our partners to qualify our innovative obstacle detection technology for practical application in Germany’s largest S-Bahn network.” Berlin S-Bahn Peter Buchner, CEO S-Bahn Berlin GmbH, said: “For 100 years, the Berlin S-Bahn has stood for innovation and progress. We are partnering with industry to test new technologies that support environmentally friendly rail transportation. Automatic obstacle detection will be an indispensable component for automated driving in the future. It is already capable of supporting our drivers and contributing to better operational quality.” Martin Fuchs, CEO Verkehrsverbund Berlin Brandenburg (VBB), said: “The states of Berlin and Brandenburg and the Berlin-Brandenburg public transport authority (VBB) support innovation and the groundwork needed to make S-Bahn operations more efficient and effective.” Automatic obstacle detection project Martin Fuchs adds, “This automatic obstacle detection project will generate valuable findings and enable us to further develop the S-Bahn system. Exactly 100 years after the S-Bahn was first electrified, we are preparing yet another technological leap that will make Berlin’s S-Bahn system fit for the future.” Testing of the technology will be carried out in a partnership between Siemens Mobility GmbH (installation supervision, sensors, hardware, software and digital map), S-Bahn Berlin GmbH (trains, installation, operation), and Digitale Schiene Deutschland/DB InfraGo (digital mapping, open data platform). Results of the tests will be evaluated together with the VBB. Sensors used include high-performance LiDARs On the technical side, the sensors used in the project will include high-performance LiDARs On the technical side, the sensors used in the project will include high-performance LiDARs for close- and long-range object detection and an infrared camera. The algorithms for evaluating the sensor data have been specially developed for the rail sector in the ‘Berlin Digital Rail Operations – BerDiBa’ research project by Siemens in Berlin-Adlershof and have already been optimised several times. The system continually compares the position of a train with the location of detected objects using a digital map. Decisions whether to warn the driver or brake the train are made on the basis of these ongoing calculations. A newly developed map from DB InfraGo, which depicts reality with centimetre-accurate precision in 3D, is being used for this purpose for the first time. Digital Rail Germany initiative As part of the Digital Rail Germany initiative, Siemens, a technology major in the field of rail automation, and Deutsche Bahn are pursuing a new approach to accelerate the introduction of this detection technology in the rail sector and promote innovation in Germany. In the project, selected data showing obstacles on the track will be made available centrally in anonymised form and can be used for research purposes, such as training AI models or for system validation. Emergency braking assistance system Following a one-year test phase through all seasons, the assistance system should be ready for use Following a one-year test phase through all seasons, the assistance system should be ready for use as an emergency braking assistance system that operates in the background to support the driver. On the basis of the data generated during this phase, it will be possible to use the system together with other automation components for automated driving at low speeds, such as during depot shunting or when deploying or shutting down a train. The field test aims to: Gain knowledge about boundary conditions for obstacle detection with the help of joint data evaluation, Record and evaluate the performance of the sensor technology under special operating conditions such as rain, fog, snow, and dirt, Minimise risks related to planning projects (technology, calculations, deadlines), and Optimise system settings to avoid false alarms, essential for driverless operation. Cooperation partners The cooperation partners - Siemens Mobility, Deutsche Bahn AG (S-Bahn Berlin GmbH, DB InfraGo, DB Systemtechnik) and the states of Berlin and Brandenburg with the Berlin/Brandenburg Transport Association will jointly analyse the findings and data from the project in the research project. Installation of a set of prototype sensors for detecting obstacles has already been completed in an S-Bahn Berlin train. As part of the field test, up to ten trains in the Berlin S-Bahn fleet will be equipped with the sensors. Once the field test has been completed, it is planned to remove the sensors.
D-Fend Solutions, the pioneer in field-proven radio frequency (RF), cyber-based, non-kinetic, non-jamming, counter-drone takeover technology, announced the release of EnforceAir2 version 24.04.2, which includes all upgrades to the system released since the launch of the product last year. This new software version comprises major upgrades to its award-winning capabilities and builds upon its proven C-UAS power, performance, portability, and range. Version 24.04.2 of EnforceAir2 includes a range of refined improvements that have been rolled out so far this year, including new user interface (UI) features, expanded detection and mitigation coverage, and enhanced capabilities for deployment on naval vessels. UI Enhancements: EnforceAir2's user interface now offers: An AI-based mitigation engine that recommends appropriate drone mitigation options for each individual drone to simplify mission-critical decisions by the operator in real time. Direct UI integration linking drone tickets with map representation of drone location to enhance situational awareness when dealing with drone swarms. New graphic representation of the threat level and the possible intentions of the pilot. Improved quick, single-click access to detailed drone information to enable operators to dive into specific characteristics to assess a drone's threat level. Upgraded API: Application Programming Interface (API) upgrades include: Strengthened support for the exchange of information with external command and control (C2) systems in real time. Additional feeds into EnforceAir2 SDR to facilitate tagging of large numbers of authorised drones for the control airspaces that may contain thousands of drones operating as a baseline. Enhanced Naval Vessel Deployment Capabilities: Updates for EnforceAir2 naval deployments include: Support for multiple sensors deployed on a moving platform utilising D-Fend's MSC2 technology. Enhanced mobile C-UAS plans. Dynamic updating of warship operational area map. Disrupted GNSS Mode: The system now provides: Operational support in zones with disrupted GNSS environments through advanced logic that optimises the system in such scenarios. In addition to these software enhancements, D-Fend Solutions has significantly expanded EnforceAir2's detection and mitigation drone coverage with the inclusion of many additional drone models. Advanced counter UAS capabilities "Given the rapid advances in drone and UAS technology we see across the globe, it's important that EnforceAir2 equips our customers with the most advanced counter UAS capabilities possible while maintaining the simplicity of operation," said Yaniv Benbenisti, President and Chief Product Officer at D-Fend Solutions. "Breakthrough innovations, such as the AI-based mitigation engine and disrupted GNSS environment mode, bring significant advantages to safely protect against the threats posed by maliciously or irresponsibly piloted commercially available drones and custom-built drones."
IDIS Americas, a new IDIS business unit formed from the recent merger of IDIS America and Costar Technologies, announces the launch of its new I-Mobile System, ushering in a new era of advanced transit video surveillance. The new solution delivers high-performance 4K video resolution, ease of scalability and a highly intuitive user interface, providing high-performance mobile security to businesses that operate transit and fleet companies. Innovative I-Mobile System "Our innovative I-Mobile System is a user-friendly, advanced mobile video surveillance solution that pairs IDIS America’s proven product reliability with a low total cost of ownership, providing the perfect combination of high performance and cost-efficiency,” said Scott Switzer, Chief Executive Officer, IDIS Americas. “I-Mobile also brings seamless interoperability across systems with peace of mind knowing the system is backed by IDIS’ Ultimate 5-Year Warranty.” Benefits of the I-Mobile System The system encompasses I-Mobile cameras, 4K Recorders, accessories, and the IDIS Solution Suite modular and scalable Video Management System (VMS). There are six key benefits of the I-Mobile System: High-Resolution Video: 4K live video recording with 16 channel capacity. Plug and Play Installation: IDIS’s automated set of protocols, including Auto IP, multicast DNS, and DNS ensure fast and easy deployment. Reliability: The proprietary iBankDB multi-media file system ensures stable multi-channel video recording and outstanding search performance. Ease of Use: An intuitive GUI facilitates easy operation and maintenance. Scalability: Using the IDIS Solution Suite provides immeasurable possibilities by combining multiple services on a single platform, and integrates seamlessly with existing Transit communication systems Seamless Compatibility: The system provides robust interoperability across modern and legacy systems with seamless compatibility. They’re backwards compatible and here to make the migration easy. Optimisation: optimised for Transit power environments, ensuring system stability. IDIS has been a pioneer in mobile equipment in North America for over 20 years, and the I-Mobile Transit Video Security Solution leads the way in transforming mobile security for transit and fleet businesses, offering innovative, customer-centric solutions to enhance safety, efficiency, and reliability.
Expert commentary
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbours. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorised access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customisable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
The security industry is going increasingly digital these days, with more small- and medium-sized businesses joining their global brethren by moving their data to the cloud, leveraging the benefits of artificial intelligence, and embracing more open solutions. Innovation is expected to continue at a rapid pace, thanks in part to the residual effects of the pandemic which has driven changes that might have otherwise taken five years or a decade or more to get into customers’ hands on a global scale. Let’s take a look at the trends that will dominate ISC West 2023. Improved analytics Analytics is about expedience, and in the surveillance world, it makes it possible to identify and search for the “who did it?” clip you need. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology Analytics also provides more actionable intelligence than a simple surveillance camera may provide, from identifying high-traffic areas during select times of the day and alerting staff to pay greater attention to these areas, to business intelligence that can enable a company to staff a store with more employees. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology and relying less on humans. Leveraging the cloud The cloud story is very related: it provides the ability to perform video-related tasks from anywhere on any device. In addition, the cloud makes it easier to share videos with other stakeholders and collaborate on investigations. By storing video on the cloud, end users reduce their total cost of ownership because they no longer have to invest in onsite storage solutions, while gaining greater storage capabilities and thereby future-proofing their solutions. Deployment patterns Because the cloud requires a less total cost of ownership and can be intuitive, it is driving interest in solutions Another interesting trend that we’ll be hearing more about this year is the overall deployment patterns of video surveillance systems. This is part of the cloud trend, but the broader trend is the amount of effort it takes to deploy, monitor and maintain the video surveillance system. Because the cloud requires less total cost of ownership and cloud access can be intuitive, it is driving interest for solutions that can be hosted in the cloud. Interoperability vs. proprietary Related to the debate of open vs. closed solutions is how much the surveillance market prefers a turnkey solution compared to a more custom best-of-breed and tailored solution. Smaller and mid-market companies will be more interested in the turnkey solutions provided by a single vendor, while enterprise-level companies traditionally gravitate toward investing in customised solutions that are more likely to address their unique security challenges. One other related trend to keep an eye on is the role of the integrator as part of the rise of cloud and Video Surveillance as a Service (VSaaS) offerings.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Operational technology (OT) uses hardware and software to monitor and control physical processes, devices, and infrastructure. Historically, OT systems were not connected to the Internet and were therefore not vulnerable to cyber-threats. Internet of Things (IoT) However, today’s OT systems are increasingly part of a company’s networks as technologies converge and the Internet of Things (IoT) gains prominence. No longer can OT systems be counted on to be “air-gapped,” that is, not connected to other systems. When OT systems are vulnerable, companies face a “cyber-physical risk.” A bad actor could create a catastrophic risk in the physical security world by compromising OT systems. To understand more about OT and the related cybersecurity concerns, we spoke with Lisa Hammill, VP of Commercial Markets for Shift5, a company that applies cybersecurity best practices to OT systems and networks, thus dramatically reducing their cyber risk. Q: What is operational technology (OT)? How are the cybersecurity concerns for OT different than those for information technology (IT) systems? Hammill: Operational technology (OT) refers to the computer systems that underpin critical infrastructure, enabling it to run continuously and reliably. For example, planes and trains rely on OT to execute basic flying or driving commands. OT cybersecurity solutions for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene Most OT is built on legacy technology manufactured before cybersecurity became a priority and relies on serial bus networks like MIL-STD 1553, CAN 2.0, or RS-232, instead of the standard TCP/IP communications protocols that IT security solutions can monitor and defend. Any effective OT cybersecurity solution for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene, including ensuring signed software and firmware updates, full data capture, and continuous monitoring and detection aboard planes, trains, and weapon systems. This all makes cybersecurity for onboard OT difficult, but not impossible. Q: What is a “cyber-physical risk” and why is the term important? Hammill: Cyber-physical systems integrate digital components into physical objects and infrastructure; we focus on critical infrastructure like transportation as well as weapon systems. Cyber-physical risks manifest when actors intrude on these delicate processes to manipulate real-world outcomes, whether that’s grounding plane flights, or disabling train brakes. The risks of attacks facing OT within cyber-physical systems are highly consequential, can cause disruptions to civil society, economic disruption, and potential harm to citizens, as well as shift the balance of power in military conflict and geo-political matters. Q: Please describe the breadth of the risks when it comes to OT cybersecurity. Hammill: Cyber-physical attacks can jeopardise business and mission-critical operations, and risks are highly consequential when it comes to transportation systems, creating safety risks for operators and passengers, economic impact, and millions in downtime losses, remediation, and ransom payments. Transportation is a particularly vulnerable sector of critical infrastructure. An attacker could leverage a tested playbook to disrupt operations with minimal effort As we’ve seen from recent attacks demonstrating the attackers’ focus is trained on this space. The motivation of an attacker will vary, but for example, let’s say a bad actor wanted to target an aircraft to disrupt service and ground a flight. There have been examples of basic cyber-attacks targeting noncritical aircraft systems; however, many of these systems remain vulnerable. An attacker could leverage a tested playbook to disrupt operations with minimal effort. An attacker could target a system considered least critical to passenger safety systems categorised as a Design Assurance Level E (DAL E) like an in-flight entertainment system. This type of system has been hacked before and could be used as a vector for a ransomware attack. If an attacker takes control of video screens on seatbacks mid-flight, they would certainly damage passenger trust. They would also likely try to move up the design assurance level chain to gain further access. For example, when a plane pulls into a gate, communication between the aircraft and airline operations happens automatically. An attacker could exploit this connection to move from one system to another. If an attacker gets into those communications channels, they could alter data or hold it hostage, while the airline halted operations to resolve the issue. Q: What industries/markets are most vulnerable to OT cybersecurity threats and why? Hammill: Operational technology lacks the historical focus on cybersecurity that IT has, and basic best practices are nascent for OT industry-wide. Cyber-attacks targeting Colonial Pipeline and Florida's water systems (in 2021) have spurred those industries into action to prioritise cyber hygiene. The aviation and rail industries are watching and taking proactive steps to prevent such cyber-attacks. As weapons systems and vehicles on roads, rail lines, and in the air add on new technology, they are at risk of cyber-attacks Shift5 defends planes, trains, and weapon systems because these vehicles leverage a vast swath of distinct serial bus networks and protocols unseen in other critical infrastructure technologies. We have experts creating a tool that can monitor and detect traffic aboard these bespoke networks. And as weapons systems and vehicles on roads, rail lines, and in the air add on new technology, like autonomation, they are increasingly at risk of cyber-attacks. Q: What are the various sources of OT cybersecurity risks (e.g., other governments, individual hackers, criminal organisations, etc.)? Which are the most urgent and/or pervasive? Hammill: Because of their ability to cause deeply consequential impacts on the business, economy, and human safety, OT cybersecurity risks must be considered scrupulously. Attackers targeting OT could have a range of motivations, from financial gain or market advantage through the theft of intellectual property, to insider threats and geopolitical advantage in a contested environment. It’s no secret that most malicious adversaries choose the path of least resistance when developing their attack strategy. When OT is aboard planes, trains, and tanks, we’re only in the early innings of creating obstacles for those actors to overcome. One threat we’re watching closely is the evolution of ransomware targeting OT. Digital extortion could cause operational disruption and impact consumer trust. Q: What is the Shift5 approach to cybersecurity? Hammill: Shift5 extends 40 years of expertise in adversarial tactics, techniques, and procedures from IT endpoint security into the OT world. For the first time in history, operators can apply cybersecurity best practices to OT systems and networks, dramatically reducing their cyber risk. Shift5 allows rail, aerospace, and defense to generate data-informed insights and make accurate decisions Shift5 brings complete observability and threat detection to OT systems as cyber-physical attacks become an increasingly attractive strategy for digital attackers. By providing visibility into the data that powers their most expensive, longest-lived, and most consequential fleet assets, Shift5 allows rail, aerospace, and defense companies to generate data-informed insights and make timely, accurate decisions once considered impossible. Q: Has OT cybersecurity trailed IT cybersecurity in terms of awareness? If so, why is it true, and how can organisations become more aware (and more prepared) of OT cybersecurity risks? Hammill: OT cybersecurity is nascent compared to IT security, but the industry is catching up. While most organisations understand the importance of visibility and observability in IT systems to enable their defense, very few have this same level of oversight for their most expensive, consequential, and longest-lived OT-powered assets. Simple best practices geared towards defending OT can make an adversary’s job more difficult. Start with taking inventory of all OT assets, then move to gain situational awareness so you can develop your baseline for “normal” operations (and can identify any abnormal events), and finally take steps to shore up gaps in cybersecurity. Q: Tell me more about Shift5. Hammill: Shift5 was founded by Josh Lospinoso and Michael Weigand, two of 40 people hand-selected to stand up to U.S. Cyber Command, the nation’s most elite unit of cyber-defenders. There, Mike and Josh became familiar with challenges in defending weapons systems, and the idea for Shift5 was born. Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms Military weapon systems are built on the same OT infrastructure found within planes and trains, and today Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms. Our customers include the DoD, US Army, Air Force, and Navy, and several of the largest U.S. passenger rail and household-name aviation companies. Many of these industries are beginning to seek out partnerships with Shift5; for example, AEI HorizonX, the venture capital investment platform formed between AE Industrial and The Boeing Company, today works with Shift5. Q: What is the biggest misconception when it comes to OT cybersecurity? Hammill: A common misconception is that OT aboard planes, trains, or weapon systems isn’t at risk. Many security experts have implemented air gapping as a cybersecurity strategy to keep cybersecurity threats away from sensitive systems. However, due to the convergence of IT and OT, there are more inroads to OT than ever, and air gapping isn’t as effective. Transportation assets like planes and trains are flying and rolling data centers that produce valuable and useful data, and they need to be protected just as we protect client data or IP. It’s a hard problem to solve, but the stakes are high and attackers are increasingly aiming their attention at this surface area. Modern cybersecurity principles must be extended to the onboard OT networks of aerospace, rail, and defense Amid the war in Ukraine, we saw attackers target the Belarusian Rail System to thwart Russian adversaries, and Russia digitally attacked Viasat to disable this critical piece of infrastructure ahead of a kinetic strike. Digital attacks facing aerospace, rail, and defense targets are on the rise, and modern cybersecurity principles must be extended to their onboard OT networks. Q: How can organisations start to address these challenges? Hammill: Cybersecurity done well is a lot of preventative work, and when we hear no news, that’s often good news. The U.S. government has increased the levels of dialogue around cybersecurity risks facing US critical infrastructure operators and has led by example in sharing information to help critical infrastructure organisations bolster their defenses. I recommend that transportation organisations engage proactively with local FBI field offices or CISA Regional Offices to establish relationships in advance of any cyber-incidents and visit the websites of CISA and the FBI where they will find technical information and other useful resources. They should also take advantage of other resources like TSA, AAR, ICA, and relevant ISACs that have working groups focused on these challenges. I encourage every transportation operator to understand the risks for these large transportation assets through vulnerability assessments, pen testing, and exercises just as they do with their IT environments.
Foot traffic remained at respectable levels during Day Two of IFSEC International 2016 at ExCeL London. Attendees are bombarded with sensory overload as manufacturers look for new ways to stand out from the crowd. The result sometimes seems more like a lot of noise. Everyone is looking for ways to stand out from the noise of competing product features and claims at the show. One exhibitor, Tyco Security Products, is taking a different approach at this year's show, abandoning traditional emphasis on individual products and opting instead to focus on customer solutions targeted to end users. Tyco Security Products’ end-user targeted solutions Peter Ainsworth, Tyco Security Products' Director of Marketing for Europe, Middle East and Africa (EMEA), says everything at the Tyco stand -- from the layout to collateral material -- is built around the need to answer "so-what" questions from customers. "They want to know how we can save them money and make their lives better," says Ainsworth. A single brochure provides the "ultimate takeaway" for Tyco's visitors at this year's show; the "augmented reality" brochure has images that can be scanned with a smartphone to provide additional information, data sheets, etc. Tyco Security Products is also giving away a "magic cube" that can be configured as a cube showing Tyco's product lines, and then reconfigured into a multi-sided "star" shape that depicts various vertical market applications. There are "trigger points" on the cube that can be scanned using a smartphone app to provide additional information for potential customers, including videos. The design of both the brochure and the cube emphasise the message that Tyco Security Products understands customers' businesses. "This is where we see our product fitting within your establishment," says Ainsworth. "We take them through the journey at our stand." The brochure depicts the same journey and "helps the end customer understand what we can do for them," he adds. "It's not about intrusion, access or video, but about the total solution." "At a trade show like IFSEC, we are one of hundreds of stands," says Ainsworth. "We want something that people will remember us for. It's different and innovative, and reflects who we are as an organisation." TDSi Gardis access control "At a trade show like IFSEC, weare one of hundreds of stands.We want something that peoplewill remember us for. It's differentand innovative. It's not aboutintrusion, access or video, butabout the total solution" In addition to getting customers' attention, some manufacturers have other agendas. Gathering feedback for product development is another way exhibitors can get the most out of IFSEC. For example, TDSi is previewing its new Gardis access control platform at IFSEC, including all-new, intuitive software that is easier to navigate, and a new hardware controller, both conformant to ONVIF Profiles A and C. Two years in development, the system will be easier to integrate with third party systems, using a REST-based application programming protocol (API). The new TDSi products are six months or so away from launch, and TDSi is using the IFSEC show to get feedback about changes customers might like to see as the software is fine-tuned; then it will undergo extensive field trials in the next several months. Getting feedback from potential customers is an invaluable tool for TDSi's development engineers, and IFSEC is an ideal venue to provide the feedback. "We can do an awful lot in three days that would take us weeks driving around in a car or flying around," says John Davies, TDSi's Managing Director. "It's a cost-effective way to achieve the same thing. Also, every year at the show we dig up a couple of projects that pay for the stand. This year we met with a customer that has 900 sites. We're in the early stages of talking with them about the new platform." IFSEC 2016 provides a first look at the new TDSi technology, which Davies says the company will introduce to the U.S. market by 2017, likely as a hardware component of an OEM partner's access control system. The open, ONVIF-conformant strategy makes it possible. TDSi has not been active in the U.S. market for 10 years or more; developing the open-architecture product is a favourable alternative to entering the large market with an older, "me too" product, says Davies. HID Global Seos and Mobile Access solution Also at the show, HID Global introduced new high-definition direct-to-card printers, and showed its HID Mobile Access solution, powered by Seos. The company also emphasised integration of its Seos mobile credentialing system with time and attendance, fleet management and hand-held devices. There is a related managed services offering. A lot of buzz has surrounded Seos since it came on the market in September 2014, and currently there are several hundred mobile access systems installed worldwide, including hundreds of thousands of mobile identities in use in Western Europe and the United States. There have been several notable installations in the United States, especially among colleges and universities. HID Global is currently in the process of building out a "global wallet" in cooperation with chip manufacturer NXP, which is preloading its computer chips with Seos, usable for many applications beyond physical access control. At IFSEC, HID Global announced it has been selected by Vodafone Italy to modernise the company's physical access control system by providing a group of employees a mobile access solution across multiple sites and applications at the Vodafone Village in Milan.
Case studies
Frontline Communications, a division of Pierce Manufacturing, Inc., an Oshkosh Corporation business, announced the delivery of a C-40X-2 mobile command vehicle to the Loudoun County Sheriff’s Office in Virginia. The vehicle was featured at the National Sheriffs’ Association (NSA) Conference in Oklahoma, showcasing its state-of-the-art options and upgrades, making it an essential asset for the Sheriff's Office. New mobile command vehicle Sold through Frontline Communications dealer Atlantic Emergency Solutions, the new mobile command vehicle is built on a Peterbilt 548 chassis and measures 38’ 8” in length and 12’ 6” in height. It includes two slide-outs and a 20kW generator, providing ample power for its extensive features. The vehicle is equipped with two entrances, a spacious rear interview room/workstation area, and a forward conference room with seating for eight, ensuring a versatile and functional environment for various operations. Step Up Strategy Major Craig Schleiden of the Loudon County Sheriff’s Office stated, “This vehicle represents a significant advancement in our ‘Step Up Strategy’ to enhance safety, service, technology, efficiency, and professionalism." "The integration of this mobile command unit to our Frontline Communications/Pierce fleet will enable us to better serve our community and improve our collaborative efforts with federal, state, and local law enforcement agencies.” Key features of the new mobile command vehicle Side and rear entrances. 360-degree backup camera system. Four 15k BTU rooftop air conditioners. 100A shore power upgrade. 20’ electric awning. Will-Burt 42’ mast with matching shroud. Exterior monitor compartment with 43" anti-glare monitor. The vehicle's technology includes: Axis perimeter camera system with 16-channel recorder. AvL 1.2m Ku-band VSAT and Winegard Trav'ler DirecTV. Wireless PA system and Firecom radio intercom system. Extron 16x16 video switcher with Frontline Communications touchpad controller. Eight 24" monitors, four 22" monitors, and one 65" Ultra HD monitor. Dual thermal/HD Color Pan Tilt Zoom mast camera. Two PCs, eight docking stations, and a printer. Trendnet 52-port network switch and 5G network with Cradlepoint cellular router. Innovative features “This project highlights our commitment to providing law enforcement with one of the most advanced mobile command units available,” said Steve Williamson, vice president of sales with Frontline Communications. “Having the vehicle in our booth at the NSA Conference allowed us to directly engage with a broad span of representatives from many organisations and discuss its innovative features. We’re proud to support the Loudoun County Sheriff’s Office as they enhance their capabilities to ensure the safety and well-being of their community.”
Motorola Solutions announced that Lancashire Police will deploy the M500 in-car video solution across its entire fleet of vehicles. The new video solution observes the vehicle’s environment from multiple viewpoints to provide officers with real-time awareness of their surroundings, whilst capturing video evidence that can provide accurate incident documentation to aid investigations. Motorola Solutions M500 "Police officers face unpredictable challenges and fast-moving events every day,” said Chris Hardy, chief superintendent for Lancashire Police. “The ability to respond quickly is paramount. The Motorola Solutions M500 can live-stream video back to the control room, enabling our team to build a clear picture of unfolding events by giving us eyes on the scene. It is a highly configurable, easy-to-use system that can automate processes such as triggering video recording when the blue lights are activated, helping officers to focus on the job at hand.” Technological and organisational capabilities Lancashire Police has made some recent investments in new technological and organisational capabilities Lancashire Police has made a number of recent investments in new technological and organisational capabilities. Since its establishment in June 2023, Lancashire Police’s Roads Crime Team and Roads Policing Unit, with support from wider police departments in the county, has been integral to efforts to locate and recover vehicles and assist with road traffic collisions. The deployment of the M500 in-car video solution will provide front-line officers with an additional tool to help fulfil its priority of making the roads safer for the community. Motorola Solutions VideoManager The M500’s interface is designed to be intuitive for officers to operate in demanding situations. Video captured is automatically uploaded to the Motorola Solutions VideoManager for secure, auditable storage that is intelligently organised. Recorded footage is tracked and audited to protect the chain of custody so that the police, public and judicial systems can be confident in the integrity of video evidence. VideoManager’s consolidated incident overview also helps to ensure that incident information, including footage recorded by the M500, as well as Lancashire Police’s body cameras, can be easily viewed from one location. Video security solutions “Video security solutions are a vital tool for police officers as they work to help keep their communities safe,” said Fergus Mayne, U.K. and Ireland country manager, Motorola Solutions. “As part of the Motorola Solutions safety and security ecosystem, the M500 connects with Lancashire Police’s existing mission-critical technologies, providing productivity and agility to the forces operational response to help protect people, property and places." Motorola Solutions’ Pronto application Motorola Solutions has been trusted by Lancashire Police throughout its digital transformation, supporting the force’s evidence capture, data storage and workflow efficiency. The M500 will complement the force’s existing technology infrastructure which includes Motorola Solutions’ Pronto Digital Policing application, TETRA radios and VB400 body cameras.
Up-to-date and accurate maps of the waterways are a prerequisite for safe and efficient shipping in Germany. Authorities such as the Federal Maritime and Hydrographic Agency, but also private harbour operators, are obliged to provide these in an up-to-date form at all times. The main reason for this is to avoid accidents caused by an incorrect or outdated card. This includes the classification of federal waterways, their kilometres, existing locks, lifting and barrages, other surrounding waters, places and borders. Currently, mapping is carried out by conventional ships with trained personnel, which is time-consuming and expensive. This can result in long intervals between measurements at a particular location. 3D map of the surroundings Bank areas and surface forms are monitored by an optical plan with two integrated cameras (Semi-)automated monitoring of waterways by autonomous platforms with obstacle avoidance and traffic detection could optimise this process and provide maps in less time. To this end, the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB has developed an autonomous surface vehicle capable of autonomously surveying bodies of water as part of a three-year in-house research project. For this purpose, the river bed is recorded using sonar. Furthermore, the bank areas and surface structures are monitored by an optical system with two integrated industrial cameras from IDS Imaging Development Systems GmbH. The information obtained in this way is then merged and transferred to a 3D map of the surroundings. Application The precise surveying of water bodies is a demanding task. TAPS, the Fraunhofer IOSB's semi-automatic direction-finding system for rivers and lakes is able to perform this task both under and above water. The vehicle, which measures approximately 2 x 1.5 x 1 metres, travels along the relevant waterway and automatically avoids obstacles, whether stationary or moving. At a speed of two knots - which corresponds to around 3.7 kilometres per hour - such a mission can last up to 20 hours. For visual mapping of the shore areas, TAPS has two cameras attached to a mast, each pointing to starboard or port and whose fields of view do not overlap. Due to their high resolution, they allow a visual inspection of relevant infrastructure, such as quay walls, as well as 3D modelling of the shore area based on the recorded image data. Orientation of the TAPS platform GNSS and IMU data serve as the basis for picking the position and exposure of the TAPS platform "We use an automated system for intelligent image capture. As soon as one or both cameras are focussed on a predefined area of interest, image recording is started. The vehicle's own movement is also used to store only image data that is recorded from different angles and therefore offers added value in terms of content," explains Boitumelo Ruf, expert in photogrammetry in the Autonomous Robot Systems research group at Fraunhofer IOSB. GNSS (Global Navigation Satellite Systems, such as GPS) and IMU (Inertial Measurement Unit for position determination) data serve as the basis for determining the position and orientation of the TAPS platform. "When the images are captured, they are enriched with the current GNSS position data. The latter are required later for the assignment of precise coordinates," Ruf continues. COLMAP photogrammetric toolbox After data acquisition, the recorded images are transmitted together with the GNSS data to a ground control station, where a photogrammetric reconstruction is carried out. Boitumelo Ruf describes the procedure in more detail: "Among other things, we use the COLMAP photogrammetric toolbox. It uses outstanding image features to first compare the input images, calculate their relative positions and create a true-to-life 3D model of the environment." "We then use the tool to match the images pixel by pixel, i.e. we search for corresponding pixels and merge them exactly. The result is a dense 3D point cloud that is georeferenced using the GNSS positions, i.e. provided with the corresponding current coordinates." The 3D model can then be used for other tasks, such as visual inspections or bank monitoring. Robust industrial cameras defy wind and weather On the camera side, the Fraunhofer Institute relies on two uEye FA industrial cameras from IDS. The robust and resilient models with PoE are ideal for demanding environments. Camera housings, lens tubes and the screwable connectors meet the requirements of IP code IP65/67 and are thus optimally protected against dirt, dust and splash water. The robust and resilient models with PoE are ideal for demanding environments The model used has the large-format 1.1" CMOS sensor IMX304 from Sony and delivers very clear, noise-free images with a resolution of 4096 x 3000 pixels. Thanks to its remarkable dynamic range and very high sensitivity, the global shutter sensor of the second pixel generation of the Pregius series is particularly suitable for metrology applications, among others. It was precisely these characteristics that were decisive for the Fraunhofer IOSB's choice of camera. In addition to robustness and weather protection, important requirements for the cameras included a compact form factor and high image resolution to enable detailed visual inspections. The sensor should also offer a high dynamic range in order to capture images with a high level of detail in both sunny and shady areas. Integration via the standard GigE Vision interface enables the development and use of one driver for several systems with different cameras. Outlook The shortage of skilled labour is also a major issue in the surveying of waterways. Automated mapping of the waterways could not only reduce costs but also the time and, above all, the labour required. The aim of the TAPS project was to develop a prototype for this task and to demonstrate its potential in relevant scenarios. As a research organisation, Fraunhofer typically develops technologies up to a level at which the functionality and suitability of the system have been proven. The next step is now cooperation with industrial partners. Dr. Janko Petereit, head of the Autonomous Robot Systems research group at Fraunhofer IOSB, explains: "We are actively looking for partners to take this final step towards commercialisation together. In view of the positive results of our initial tests and the increasing demand for accurate, up-to-date waterway maps, we expect strong demand for our technology in the coming years. The knowledge gained can be used in a variety of ways. Autonomous watercraft can be used to transport people and goods by sea or inland waterways. The excavation of waterways and the autonomous surveying of fairways are also conceivable. “ The project demonstrates the high potential of the interaction between robot systems and digital image processing. The cards could be reshuffled in the future, particularly with regard to visual environment detection and scene interpretation.
Revader Security was selected by safety & security specialists North to provide over 75 re-deployable CCTV cameras to the London Borough of Hammersmith and Fulham as part of their contract to upgrade the council’s public space CCTV network. Revader’s re-deployable CCTV cameras are all-in-one professional surveillance solutions that combine an HD camera, recording, onboard storage and wireless transmission in a single compact unit. Fleet of re-deployable cameras They can operate from a wide range of power sources, including mains, battery and solar The cameras can be installed in virtually any location and can be easily moved to target crime hotspots and other areas of interest, enabling police and local authorities to deter offenders, respond to developing incidents and secure prosecutions. They can operate from a wide range of power sources, including mains, battery and solar. The fleet of re-deployable cameras is used by the council’s CCTV operators to tackle street crime, anti-social behaviour and fly-tipping, protect property, prevent trespass, improve public safety and monitor traffic flow. Delivered over a three-year period, this purchase was part of the London Borough of Hammersmith and Fulham’s £5.4 million investment into its CCTV network. The borough has a surveillance network of over 1,900 cameras in total, representing the highest-density network of CCTV cameras in the UK. Longstanding partnership with North Stuart Caldecourt, Managing Director at Revader Security, said: “We are delighted that the investment being made by Hammersmith & Fulham Council into its surveillance network is delivering results, with more police arrests enabled by high-quality CCTV footage and more prosecutions supported by video evidence. We are proud to continue our longstanding partnership with North to deliver cutting-edge solutions that make our communities safer and more secure.” Revader Security continues to work alongside the partners to support Hammersmith & Fulham Council and a wide range of other local authorities, police forces and industrial users across the UK.
HID, the worldwide pioneer in trusted identity solutions, announces that Royal Jersey Laundry has introduced a new tracking feature of HID’s linen management platform at each of its 5-star hotel customer sites to guarantee that drivers drop off and collect precise linen stock and that costly errors are avoided. Linen tracking This new feature replaces a paper-based system used by drivers for the management of cages filled with clean/soiled linen delivered/collected at customer sites. It provides detailed end-to-end tracking of linen cages across multiple customer locations throughout the whole cycle of washing, packing, delivery, and collection, a complex process given that 550,000 pieces are laundered each week for numerous clients. Royal Jersey Laundry Royal Jersey Laundry works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah Founded in 1915, Royal Jersey Laundry is one of the few cleaners servicing the luxury hotel sector. Based in a 25,000 square-foot purpose-built facility in Dagenham, rebuilt in 2021 for £15 million after a fire, it works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah, The Peninsula London, and The Ritz. Need for constant communication Supporting the five-star segment is demanding given the constant communication required between the hotel and laundry, exacting standards, and the quantity and range of items to be laundered. This includes duvets, sheets, towels, and bath robes along with smaller items such as foot mats, drink coasters, shaving towels, and dry cleaning for guests themselves. Royal Jersey Laundry operates 24/7, employs 150 staff members, and washes 40 tons of linen per day. Maintaining laundering schedule Five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a schedule In contrast with budget and mid-level hotels, five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a rigorous laundering schedule and ensure guests always receive fresh, cleaned linens. “An average 300-bed hotel will have around 30,000 items of linen which will cost around £250,000,” says James Lincoln, Royal Jersey Laundry’s managing director. “The volume of linen is so high and it’s always moving such that accurate inventory control was a major challenge verging on the impossible.” HID cloud-based RFID linen management system Before the HID cloud-based RFID linen management system, everything was done manually. Laundry staff would check items off ironing/folding machines, a wholly error-prone process, and log the quantities on pieces of paper. The operational overhead for the laundry was exacerbated as the various linen items from the different hotels had to be kept separate, too. “Linen is everywhere: on beds, in cupboards, in transit, and at the laundry, yet no one had full insight into stock levels and, when things went missing which often happened, typically we’d get blamed,” says Lincoln. Real-time linen inventory management LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process To address these problems, Royal Jersey Laundry installed a real-time linen inventory management system from HID combining LinTRAK® RFID tags, a full set of RFID equipment including table-top and conveyor-belt scanners, one RFID portal and one cabin scanning unit, and cloud-based Acuity software. The discrete LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process. Some hotels also use LinTRAK tags to manage staff uniforms and restaurant linens such as napkins and tablecloths. HID LinTRAK textile tags Around 40% of Royal Jersey Laundry hotel customers have transitioned to the HID linen management solution and connect via Acuity’s web portal. Once cleaned, the linen is packed into cages, and scanned in seconds through HID’s RFID cabin station. Items are automatically counted, with delivery notes generated including billing information. HID’s Acuity software integrates with the laundry’s Sage accounting software to generate invoices. Benefits of textile tags The implementation of HID LinTRAK textile tags, RFID stations, and the Acuity software platform has radically changed how Royal Jersey Laundry operates, delivering a range of benefits: Fast Return on Investment: Since the installation of the HID equipment in 2019, the system has already paid for itself given the efficiency and productivity gains. Better use of people resources: Laundry and housekeeping staff no longer waste time on dull and resource-intensive activities like manually counting linen. They have been redeployed to more productive work, generating 10-20% savings in labor costs. Better visibility of stock levels: As hotels know exactly the location and quantity of linen, they are better able to cater to peak demand, reducing linen expenditures by up to 30%. Improved responsiveness and customer satisfaction: Access to in-depth data generated by the Acuity platform means the laundry can quickly answer customer queries. “We give hotels complete transparency about where their linen is in the cleaning and delivery cycle. There are just no grey areas anymore,” says Lincoln. Increased security of expensive linen assets: While theft of linen at five-star hotels is rare, it does happen. RFID tagging enables better monitoring of expensive bedding and towel investments. Enhanced reliability and productivity: Operations are more efficient as RFID-enabled items can never be lost or misplaced. Furthermore, digital scanning results in faster processing of items. “We’re effectively two businesses: the laundry itself and a logistics operation. We run a mixed fleet of lorries and electric vans which nip in and out of London three times a day picking up and delivering garments for hotel customers using us for guest work,” adds Lincoln.
Morse Watchmans, the industry pioneer in key control and asset management systems, reports a rising number of international cities and municipalities installing the company’s flagship key control system, KeyWatcher® Touch, to secure the buildings, equipment, and vehicles utilised by various municipal departments. “From public works to waste departments, courthouses, and beyond, the adoption of our KeyWatcher Touch solution continues to resonate positively across so many diverse cities,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. “We take pride in knowing that our systems are being used to facilitate secure and efficient operations for some of the public’s most critical services.” New KeyWatcher Touch system By implementing effective municipal key control measures, cities can mitigate the risks associated with unauthorised key access while maintaining the operational integrity of public works. Cities and metropolises can set a foundation of trust and confidence within their societies This proactive approach not only safeguards against potential security breaches but also fosters accountability and responsible use of resources among city employees. In this way, cities and municipalities can establish a foundation of trust and confidence within their communities. In one instance, the Walworth County Public Works Department in Wisconsin implemented a new KeyWatcher Touch system after the original key box system failed to adequately support the county’s hundreds of keys for government buildings and county fleet vehicles. KeyWatcher Touch solution After seeing the success of the KeyWatcher Touch solution at the Department of Public Works, other departments within Walworth County have also begun installing their own KeyWatcher Systems. “These boxes are starting to catch on, and departments are really thinking about how they will use them for vehicles and building keys,” said John Miller, Senior Project Manager, Walworth County Public Works. The operational efficiencies of the KeyWatcher Touch solution are also appreciated Across the globe, the operational efficiencies of the KeyWatcher Touch solution are also appreciated. Blacktown City, a suburban community located approximately 22 miles west of Sydney, Australia, implemented a KeyWatcher Touch system at their Main Works Depot to help maintain usage accountability and eliminate the problem of missing or overdue vehicles, machinery, and building keys. KeyWatcher Touch automated control “We manage keys for at least 500 vehicles and machines here at the Depot and each of them has at least two to three sets of keys,” said Joe Haddad, Facility Manager, Blacktown City Main Works Depot. “Without the KeyWatcher Touch automated control and tracking, the job of accurately keeping track of these many keys would be almost impossible.”
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The transportation industry is unique because it plays a role in both the minutiae of everyday life and the overall economy's well-being. Providing uninterrupted and efficient transportation services depends heavily on the safety and security of transportation entities. Due to the vast amount of people frequenting transit stations and the importance of the items on ships and ferries, the transportation sector faces multiple challenges that evolve as the industry advances. We asked this week’s Expert Panel Roundtable: What are the security challenges of the transportation industry?
Products
The 2024 state of physical access trend report
DownloadThe security challenges of data centers
DownloadSecurity practices for hotels
DownloadHow to solve the disparate systems challenge
DownloadFacial recognition
Download