Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with...
German manufacturer Dallmeier announces a development partnership with AnyVision, a pioneer in AI-based facial, body, and object recognition. The aim of the cooperation is to integrate AnyVision’s facial recognition technology into the Dallmeier ‘HEMISPHERE’. The HEMISPHERE software platform offers customers from various industries a wide variety of modular solutions for security applications and business process optimisation. From the optimisation of marketing activities to f...
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can...
Transforming the way security teams monitor, manage and control multiple systems, Maxxess is launching its new, open-architecture InSite solution at IFSEC International, (London ExCel 18-20 June, stand IF2120). Maxxess InSite is a cyber-secure, cloud-based service that has been developed to give organisations impressive new levels of situational awareness and allow the most rapid, coordinated response to wide range of incidents, both emergency and non-emergency. InSite can pull data from a wid...
IDIS has launched its AI in the Box (DV-2116), boosting the power of surveillance systems with the most accurate deep learning analytics yet developed. Korea’s surveillance manufacturer says, that in independent tests IDIS Deep Learning Analytics (IDLA) has achieved industry-beating accuracy rates of 97%, a record performance which is further boosted by high speed processing. Affordable deep learning analytics Users benefit from robust and calibration-free object detection and cla...
Adarma, an independent security services company, previously ECS Security, has successfully launched following a private management buyout led by David Calder and Nathan Dornbrook with capital from Livingbridge, one of the UK’s leading mid-market private equity investors, and debt from Bank of Scotland. With over 250 staff and experience spanning over two decades, Adarma provides a broad range of IT security consulting, solution and services with deep expertise in threat management includ...
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announces it will display its flagship security platform, Security Centre 5.8, and its comprehensive suite of new features whilst exhibiting at IFSEC International 2019. This will be the first time the new functionality will have been displayed in Europe, taking place at ExCeL London from 18-20 June (Stand IF710). The unified platform has undergone a significant update recently, providing customisable live dashboards, enhanced privacy protection features, a brand-new mobile app, and new functionalities that help users monitor the health of their security system and ensure compliance with cybersecurity best practices. Version 5.8’s new features will also ensure that operators can optimise their physical security environment while benefiting from greater visibility into their operations. Monitor security system Security Center 5.8 enables operators to create user-friendly, highly customisable dashboards, presenting critical information, including real-time data from the scene of an ongoing incident. These dashboards show live video feeds from the exact locations where an alarm may have been triggered and provides users with insightful reports and charts depending on their interest area. This app allows users to record incidents, access nearby video and access control A key new feature of the Security Center interface is the ability to monitor a security system while on the go - through a mobile app which gives operators a valuable new asset in the security environment. This app allows users to record incidents, access nearby video and access control, as well as sharing video from their phones to Security Center. This provides the user with actionable information, that can be shared across the whole security team – allowing them to respond effectively to any situation that might occur. Increase local awareness Security Center 5.8 also provides a wide range of other valuable features: Video (live and recorded playback, PTZ controls, bookmarking, time - and event-based reports); Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.); ALPR (live reads/hits, plate reports, and access hotlists); Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualise their environment and respond quickly. Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information.
CNL Software, globally renowned Physical Security Information Management (PSIM) software firm, is pleased to announce that it will be showcasing the latest enhancements to its IPSecurityCenter PSIM solution as an ecosystem partner on the MOBOTIX stand IF1330 at IFSEC International 2019. MOBOTIX is a global manufacturer of high-quality intelligent IP video systems and sets standards for innovative camera technologies and decentralised security solutions with the highest level of cybersecurity. IPSecurityCenter PSIM solution CNL Software will demonstrate how its PSIM technology helps increase situational awareness, integration and management of vast estates of sensors, systems and devices as well as a wide range of enhancements to enable large-scale federated systems to support critical national infrastructure. With over 15 years of development, IPSecurityCenter leads the PSIM market with its features With over 15 years of development, IPSecurityCenter leads the PSIM market with its features, performance and sophistication and boasts a continuous development program that recently added advanced biometric authentication to the platform. Ever-increasing global IoT devices Every year billions of dollars are spent developing new technology to help reduce new threats as they emerge. And this means more data. By 2025 there will be 75 Billion Internet of Things (IoT) devices online, that is almost 10 devices for every person. CNL Software will discuss what this means for the industry and how security professionals can help to prepare for more information inside of the control room. “We are delighted to partner with MOBOTIX at IFSEC and look forward to meeting with their extensive ecosystem to discuss how we can build on our technical partnership," says Adlan Hussain, VP Marketing - CNL Software. "One of our strengths is our ability to work with leading technologies within the security, life safety and facilities management industries. We have developed an open platform and adopted an open approach to working with our partners which enables the creation of cutting-edge solutions that leverage data to solve complex security challenges.” Mission-critical security systems Providing a single view of all of an organisation's mission-critical security systems, IPSecurityCenter helps increase emergency preparedness, deliver intelligence to the point of need and provides process guidance to enhance security responses. Beyond the timesaving and efficiency benefits of automation, IPSecurityCenter enables processes that are essential to any modern security department; including scheduled reporting, dashboard overviews, incident logs, continuous process improvement initiatives, training drills, system healthcare checks and much more.
Datalog MV operates with the latest version of Datalog which provides local and remote site monitoring and control of building, fire, security and energy systems and significantly enhances the ability of operators to manage video surveillance systems which may be part of an integrated security solution. Integration with Wisenet Network Video Recorders (NVRs) means that operators will now be able to view live or recorded images captured by Wisenet cameras on the Datalog graphical user interface. Greater situational awareness When there is an alarm event, images from Wisenet cameras installed in the vicinity of the incident are automatically displayed by Datalog, allowing operators to visually verify what is occurring and have greater situational awareness. Wisenet cameras and domes with PTZ functionality can be directly controlled via Datalog The presentation of live images can also be triggered by any number of user defined real-time ‘cause & effect’ events, whilst Wisenet cameras and domes with PTZ functionality can be directly controlled via Datalog to enable operators to observe close up activity of any activity. “We are excited to welcome Hanwha Techwin into our portfolio of integration partners and we are looking forward to working with them,” said Jason Blundell, Head of Sales & Marketing for Cortech Developments. Integrated software platform “The partnership between Hanwha Techwin and Cortech demonstrates our on-going commitment to offer users flexibility and the widest choice when selecting an integrated software platform.” Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe added: “Wisenet cameras are increasingly being specified for mission critical and high security infrastructure applications. Datalog has proved to be an ideal solution for these types of projects and we are therefore very pleased to have the opportunity to work with Cortech to ensure our mutual customers achieve maximum benefit from their safety and security systems.”
Tech Data announces the launch of the RECON Security Suite in Europe. RECON offers a targeted and simplified range of multi-vendor subscription and consultation-based security solutions that help to protect against the most common cybersecurity threats. Built by Tech Data security experts from the company’s portfolio of vendor solutions, RECON enables resellers to rapidly accelerate their security offerings without investing in developing their own in-house skills, resources and tools. The suite also allows mature security partners to augment their existing offerings with a robust set of services and solutions. Managed security services RECON is structured into the following targeted categories: RECON MSP: Managed security services focused on the day-to-day management of security solutions, including managed next-generation firewall; managed identity; managed endpoint; 24x7 support and monitoring services; reporting services RECON ProServ: Security-focused consulting services RECON Risk: Consultation services which assess and offer solutions for an organisation’s key security risks RECON SOC: Security Operations Centre services including incident response and real-time alerting RECON Restore: A portfolio of backup and recovery solutions that can restore a system from catastrophic ransomware or malware attacks Growing cybersecurity market With RECON, Tech Data is bringing structure and clarity to a fragmented and fast-growing cybersecurity market" The RECON Security Suite will evolve to reflect the ever-changing threat landscape and emerging technology categories such as IoT. David Ellis, vice president, Security and Mobility Solutions, Europe, at Tech Data said, “With RECON, Tech Data is bringing structure and clarity to a fragmented and fast-growing cybersecurity market." "The suite enables us to more effectively connect partners with a leading range of solutions, services and Tech Data security experts, making it easier than ever for our partners across the region to increase and complement their own security specialisations and, of course, grow their businesses.” Also available in the Americas region, Tech Data’s RECON offering is based around the U.S. National Institute of Standards in Technology (NIST) cybersecurity framework, a recognised standard that enables organisations to better protect themselves against cyber security threats.
F24 AG further strengthens its Pan-European market position in the field of emergency notification, crisis management and critical communications with the acquisition of the Norwegian company One Voice AS, the provider of incident and crisis management solutions in the Nordic countries. As a result, F24 increases its existing customer base to 2,500 by adding over 700 customers from One Voice in the Nordic countries and the United Kingdom. Joining forces further strengthens F24's position in the United Kingdom as a leading provider in the market.We are delighted to shape the future together and to further develop solutions that meet the growing requirements" Within the last six month it is F24's third acquisition. Besides organic growth, collaborating with One Voice successfully accelerates F24's growth plan as part of the 1st phase of their buy-and-build-strategy. Raymond James acted as exclusive M&A advisor to F24 and the management shareholders, Nordhaven Corporate Finance supported One Voice AS in the process. Emergency notification platform Dr. Jörg Rahmer, spokesperson of the F24 executive board and responsible for strategy, product and operations, states: "We are delighted to welcome One Voice AS to the F24 family. One Voice's main product CIM not only extends our product portfolio but is also a next and significant step on our journey of establishing the leading pan-European crisis management and emergency notification platform." The One Voice AS founders Frode Lien Otnes and Kjetil Mollan will fully continue their work and play an important role in shaping the common future. They also re-invest a significant part of their proceeds into F24. "As a new member of the F24 family, we are delighted to actively shape the future together and to further develop solutions that fully meet the growing requirements of all our customers," Frode Lien Otnes, One Voice Founder and CEO says. Providing customers with good services Providing our customers with excellent service is our highest aspiration and it unites us with One Voice"Kjetil Mollan, Founder and international business director of One Voice adds: "What unites us is, amongst others, our approach to work very closely with our customers. Our aim is and always will be to offer our customers highest quality services – together with the F24 Group we will not only continue but expand it even further." With 12 locations across Europe, the Middle East, and South America F24 is now supporting more than 2,500 companies and organisations in more than 100 countries. Christian Götz, founder and Executive Board member at F24 AG and responsible for Sales, Marketing & PR, HR and Customer Service, states: “We are pleased to welcome 700 more customers to F24 Group. Providing our customers with excellent service is our highest aspiration and it unites us with One Voice. Together we can achieve even more for our customers – joining forces is crucial in today's globalised world."
Pulse Secure, the provider of software-defined Secure Access solutions, announces that it has published its ‘2019 State of Enterprise Secure Access’ report. The findings quantify threats, gaps and investment as organisations face increasing hybrid IT access challenges. The survey of large enterprises in the US, UK and DACH uncovers business risk and impact resulting in a pivot towards extending Zero Trust capabilities to enable productivity and stem exposures to multi-cloud resources, applications and sensitive data. Audit access security The survey data showed all enterprises have ongoing data center dependencies While enterprises are taking advantage of cloud computing, the survey data showed all enterprises have ongoing data center dependencies. One fifth of respondents anticipate lowering their data center investment, while more than 40% indicated a material increase in private and public cloud investment. According to the report, the shift in how organisations deliver Hybrid IT services to enable digital transformation must also take into consideration empowering a mobile workforce, supporting consumer and IoT devices in the workplace and meeting data privacy compliance obligations – all make for a challenging environment to ensure, monitor and audit access security. Empower corporate leadership “What was consistent across enterprise sizes, sectors, or location was that secure access for hybrid IT is a current and growing concern with cyberthreats, requirements and issues emerging from many sources. The reporting findings and insights should empower corporate leadership and IT security professionals to re-think how their organisations are protecting resources and sensitive data as they migrate to the cloud,” said Martin Veitch, editorial director at IDG Connect. IDG Connect and Pulse Secure will share research findings in a webcast entitled ‘State of Enterprise Secure Access – Issues, Initiatives and Tech,’ on June 13 at 7 a.m. PT / 10 a.m. ET / 2 p.m. GMT. Authorisation access controls 61% of respondents indicated modest confidence in their security processes The survey found the most impactful incidents were contributed by a lack of user and device access visibility and lax endpoint, authentication and authorisation access controls. Over the last 18 months, half of all companies dealt with malware, unauthorised/vulnerable endpoint use and mobile or web apps exposures. Nearly half experienced unauthorised access to data and resources due to insecure endpoints and privileged users, as well as unauthorised application access due to poor authentication or encryption controls. While a third expressed significant confidence, 61% of respondents indicated modest confidence in their security processes, human resources, intelligence and tools to mitigate access security threats. Device configuration compliance The survey revealed the top access threat mitigation deficiencies: Defining app, data and resource access and protection requirements Defining, implementing and enforcing user and device access policy Provisioning, monitoring and enforcing BYOD and IoT device access When survey participants were asked what they perceive as their largest operational gaps for access security, the majority identified hybrid IT application availability; user, device and mobile discovery and exposures; weak device configuration compliance; and inconsistent or incomplete enforcement. Correspondingly, the participants stated that their organisations are stepping up their access security initiatives: 48% improving endpoint security, remediation prior to access 46% enhancing IoT discovery, isolation and access control 44% fortifying network and cloud access visibility and resource segmentation Software defined perimeter Larger companies have about 30% more tools than smaller enterprises The cited incidents, threat mitigation deficiencies and operational gaps are among reasons for the interest in a Zero Trust approach for access security. A Zero Trust model authenticates, authorises and verifies users, devices, applications and resources no matter where they reside. It encompasses proving identity, device and security state before and during a transaction; applying a least privilege access closest to the entities, applications and data; and extending intelligence to allow policies to adapt to changing requirements and conditions. Adding to management complexity, the report also found that organisations employ three or more secure access tools per each of 13 solutions presented in the survey. Larger companies have about 30% more tools than smaller enterprises. Correspondingly, nearly half of respondents were open to exploring the benefits of consolidating their security tools into suites. With the migration to cloud, one tool of interest cited by respondents as being implemented or planned over the next 18 months is Software Defined Perimeter (SDP). Secure access tool 91% of enterprises plan to increase secure access expenditure over the next 18 months; 30% anticipate an increase spend between 15% to 25% 44% of enterprises use data center in conjunction with public cloud, 30% in conjunction with private cloud, and 26% utilise all three delivery environments 46% of large enterprises prefer data center and private cloud; primarily preferred by financial services and U.K.-based companies 49% or more cited significant access incidents due to malware, unauthorised and vulnerable endpoint use and mobile and web app exposures - healthcare organisations experienced greater mobile and web app exposures 81% expressed gaps in hybrid IT application availability - financial services experienced the most business impact related to application availability 78% indicated need for greater visibility of users, endpoints and mobile devices; more evident in large enterprises and those in the DACH region 42% will focus on refining privileged user or service account-based access – a top priority in financial services and manufacturing 48% stated a willingness to explore secure access tool consolidation into suites 56% stated a project or pilot of Software Defined Perimeter technology over the next 18 months Over 38% of respondents outsource secure access capabilities to Managed Security Service Providers (MSSPs) with additional MSSP usage to grow 10% by 2021 Secure access priorities We are pleased to sponsor the 2019 State of Enterprise Secure Access Report" The independent research for the report, which offers key insights into the current access security landscape and the maturity of defences, was conducted by IDG Connect. Survey respondents included more than 300 information security decision makers in enterprises with more than 1,000 employees across U.S., U.K. and DACH regions, and covered key verticals including financial services, healthcare, manufacturing and services. “We are pleased to sponsor the 2019 State of Enterprise Secure Access Report. The independent research provides a useful litmus test for the level of exposure, controls and investment regarding hybrid IT access,” said Scott Gordon, chief marketing officer at Pulse Secure. “The key takeaway from this report is hybrid IT delivery has expanded security risks and necessitates more stringent access requirements. As such, organisations should re-assess their secure access priorities, capabilities and technology as part of their Zero Trust strategy.”
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organisations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot detection solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-shot detection advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimise the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organised manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to their security program. According to dictionary.com, risk is “exposure to the chance of injury or loss; a hazard or dangerous chance”. Risk is broader than a security concern and involves the entire business. Through utilising a 3R model - considering resources, risks and resolutions - a security leader can evaluate the output from the model to build the foundation of a strong plan. This allows the leader to make security decisions based on a quantified risk measure. A business determines what resources it wants to protect, what risks it needs to protect the resources from and what resolutions it can put in place to mitigate the risk. Decisions are based on measurable evidence. Free online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach The 3 Rs The first step in the 3R model is to figure out what resources need protection. This could be physical - such as buildings, critical infrastructure or valuable equipment, knowledge-based - such as intellectual property, or organisational - such as people or governance structure. Understanding the business will help the security leader develop a list of critical elements. Look for tangible resources such as buildings and machinery, and intangible resources like reputation, knowledge and processes. Second, determine what the resources need to be protected from. Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at risk. These can include contextual risks (workplace safety or natural disasters), criminal risks (theft or cybercrime) or business risks (compliance or legal issues). Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at riskFree online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach. The tools ask several questions and determine risk based on an organisation’s location and the answers provided. Security leaders can also work with security companies and consultants that offer risk assessments to determine their company’s needs, and then offer solutions based on that assessment. The third objective is to determine how businesses can best protect the identified resource. The last of the 3 Rs - resolutions - are those security activities that enable the business to mitigate the impact of security risks. Resolutions can potentially prevent a security incident from occurring, contain the impact to resources if an event does occur and also assist the organisation in recovering from an impact more quickly or easily. The first step in the 3R model is to figure out what resources need protection, this could physical such as buildings or critical infrastructure The path forward Understanding what risks a business faces in totality provides an opportunity for the security leader to collaborate with other department heads. This gives security leaders an opportunity to engage with functions outside their norm as well as a chance to demonstrate their subject matter expertise. A risk-based approach also helps security leaders fully understand an organisation’s needs and concerns, which they can communicate to the C-suite to help them make better business decisions. Metrics can also help business leaders understand the cost/benefit of resolutions C-suite and executives help define an acceptable level of security risk tolerance to resources and make quality, educated decisions about mitigating security risks. Through collaborating with security leaders using a risk-based approach and the 3R model, metrics and reports show the impact of security expenses, and there is a transparent view of security risk. The final decision about how to mitigate and resolve risks is up to the business owner of the resource and the risk stakeholders. To obtain funding, show the risk and value of resources exposed to potential impact. Then present the recommended resolution that reduces the potential level of impact and the associated cost benefit savings. By providing this information, security leaders can ensure that the business owners can make an educated decision. Measuring success A risk-based approach aligns the security mission with the organisation’s mission. Security leaders should have these conversations with their business leaders on a regular basis. Understanding the thresholds of risk tolerance and showing when incidents or activities are trending outside of acceptable boundaries will help business leaders make educated decisions. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program Determining a baseline of acceptance gives a foundation for security leaders to point out when the organisation is not meeting its own requirements. Metrics can also help business leaders understand the cost/benefit of resolutions and demonstrate when costs may be trending outside of acceptable boundaries. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program. It is important to note that this process is not stagnant, and needs to be constantly revisited. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting Defining risks and vulnerabilities Continuous conversations using the 3R model also help business leaders understand what security risks could interfere with meeting business objectives. It also aligns the total cost of ownership for the security program with the business value of the resources at risk.The approach puts the security risk decisions in the hands of the ones impacted by those risks And it defines the security role as risk management, not just task management. The approach puts the security risk decisions in the hands of the ones impacted by those risks…the “owners” of the resources. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting, what they are protecting it from, and how they can help prevent, contain or recover against a specific risk. Followers of this approach are in a better position to ask for funding because they can clearly define and quantify risks and vulnerabilities. Applying these principles will equip security leaders with the knowledge needed to have better dialogue with colleagues in other departments, encouraging more proactive discussions about security.
Despite any negativity you may hear, Hikvision is optimistic about their role in the U.S. market. “We demonstrate that we can be trusted, and that we should be trusted,” says Jeffrey He, Vice President, Hikvision, and President, Hikvision USA and Hikvision Canada. “We have sound products and technology. Our mission in the security industry is to protect, not to harm. Otherwise why would we be in this industry?” Hikvision is committed to investing in the North American market, where there was ‘positive year-over-year growth’ in 2018 and ‘strong’ sales in Q1 this year, according to Eric Chen, General Manager of Hikvision USA and Hikvision Canada. HikCentral central management software The company’s U.S. focus is shifting from products to solution sales, with emphasis on ‘mid-market’ small- and medium-sized businesses (SMBs). The largest verticals are retail and education, and there are emerging opportunities in the cannabis market. Launch of the HikCentral central management software (CMS) is a component of the company’s solution-sales approach. Launch of the HikCentral central management software is a component of the company’s solution-sales approachMr. He acknowledges the growth of ‘anti-China sentiment’ in the United States and other parts of the world, which he says will impact Hikvision’s operations globally. Specifically, in the U.S., ‘political’ elements impacting Hikvision’s business include ongoing tariffs and a trade war, Congressional calls for export controls and sanctions, and a provision of the National Defense Authorization Act (NDAA) that bans use of Chinese video surveillance products in government applications. Specifying cybersecurity initiatives at ISC West In spite of it all, Hikvision’s message at the recent ISC West show was overwhelmingly positive, and the company also detailed cybersecurity initiatives they say put the Chinese company ahead of many competitors in the industry. Eric Chen came in as General Manager last year; he previously spent a decade working for Hikvision in China. Chen reports solid 18.8% year-over-year growth for Hikvision globally, totalling $7.4 billion last year. He notes the company saw 40% compounded growth between 2010 and 2018. Globally, there are 34,000 employees, 16,000 of whom are research and development (R&D) engineers. Hikvision’s expanding global footprint includes 46 international branches. There are three manufacturing facilities in China, in addition to one in India. HikRewards program for HDP customers At ISC West, Hikvision’s theme was ‘Focus on Your Success’, including introduction of the HikRewards program that provides rebates to HDP (Hikvision Dealer Partner) customers, their core dealer base. A new online Hikvision Knowledge Library for HDPs provides training and reference materials dealers can share with employees. A new tech centre, introduced in December, provides data sheets, product information, and support resources. There is also a North American R&D team headquartered in Montreal. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls A customer satisfaction survey launched in March provided good feedback from customers. “They know who to call if they have a problem,” says Chen. “We want to focus on making customers successful.” The success theme also extends to Hikvision employees, who are featured in videos describing their jobs and enthusiasm for Hikvision. There are some 400 employees in the North American operation. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls. Half of the booth was focussed on solutions, especially retail and education, and also gaming and commercial real estate. Security products displayed at ISC West A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS systemProduct highlights at the ISC West booth included the 32-megapixel PanoVu multi-sensor dome camera, whose 180-degree panoramic image was displayed on a 65-inch monitor. A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS system. Some products new to the North American market, including intercoms, turnstiles, emergency call stations, and under-vehicle inspection, were displayed. Hikvision’s deep learning products are moving into their second generation, including the ability to obscure private information on videos to comply with GDPR/privacy requirements (previewed at ISC West and released later in the year). Algorithm components of Hikvision’s DeepInMind artificial intelligence are being adapted into a platform called AcuSense for value-priced products, which can recognise a human or vehicle and help filter out false alarms. Also being adapted to products with lower price points are the ColorVu system that incorporates visible light LEDs to provide colour images at night, and DarkFighter low-light capabilities. Penetration testing of cameras and NVRs As a global manufacturer, Hikvision faces a high level of scrutiny about cybersecurity, which Mr. Chen says is “a good thing for us,” enabling them to highlight the steps they are taking to improve cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity In September 2017, Hikvision began working with third parties (including Rapid7) for penetration testing (ethical hacking) of its cameras and recorders. That same month, Hikvision set up a Cybersecurity Hotline open to anyone with questions about cybersecurity, including white-hat hackers and researchers. Even before that, Hikvision had an open-door policy on cybersecurity and a program for patching and disclosing responsibility. In February of 2018, Hikvision released a 40-page Cybersecurity White Paper describing cybersecurity testing and processes built into the software development lifecycle. That same month, Hikvision launched an Opened Source Code Transparency Center and offered an open invitation to anyone wanting to inspect Hikvision’s source code and let them know of any vulnerabilities. FIPS 140-2 certification by NIST Hikvision has also become a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA), which ensures their patching and incident reporting programs have been reviewed by a CNA partnering company. Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVRsIn August, Hikvision received Federal Information Processing Standard (FIPS) 140-2 certification, a U.S. government encryption standard created by the National Institute of Standards and Technology (NIST). Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVR products. Davis said the FIPS 140-2 certification process began before the NDAA ban on use of Hikvision products in the U.S. government, and in any case is a standard that ensures a high level of encryption. “We wanted to make sure we had the same level of technology,” he says. “It was not to win over the government.” Making industry more cybersecure “We are really trying to have third parties test and certify our equipment,” adds Davis. “We are trying to be open and transparent. Education and awareness are key.” “We need the trust of customers in the security community,” says Mr. He. “No matter what, we have to follow the highest standards to offset the concerns and accusations.” In April 2018, Davis became a member of the Security Industry Association (SIA) Cybersecurity Advisory Board to help make the entire industry more cybersecure through education, awareness and standards. Hikvision has also joined the Forum of Incident Response and Security Teams (FIRST at first.org), a global cybersecurity incident response consortium that cooperatively handles computer security incidents and promotes incident prevention programs. Davis has presented Cybersecurity Road Shows in 22 cities in the United States and Canada, and also in Australia and New Zealand. The 90-minute presentations focus on education awareness around cybersecurity and seek to get attendees engaged and aware about cybersecurity in business and also in their homes.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. This is part three of our 'AI in Physical Security' series. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organisations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Enterprise software companies This shift will create a huge disruption in our industry and cause further consolidation Many of these organisations are true AI and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Data capture form to appear here! Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focusing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Analysing mobile endpoints There is also a potential for machine learning to enable cybersecurity companies to predict the nature of future attacks based on past behaviour, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a ‘signature-based’ system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyse past incidents in a broader manner and aggregate information from a multitude of sources. A main function of AI is to analyse past incidents in a broader manner and aggregate information from a multitude of sources Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analysing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. Android mobile endpoints A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Machine learning can help cybersecurity efforts, but it can’t replace many important functions Ultimately, machine learning can help cybersecurity efforts, but it can’t replace many important functions. There will always be sophisticated attacks that no machine learning algorithm will be able to find. Pairing human intellect with machine technology is the best approach. In another application, AI-driven robots can be deployed for security in places where it may not be feasible to have a human patrol, such as the outskirts of a vital electric substation located hundreds of miles from the nearest town. Evolution of artificial intelligence A robot can easily traverse the harsh terrain and notify authorities when something is amiss. Another use is during disaster recovery efforts. Robots don’t get tired, and they don’t have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behaviour or alert first responders to those who may need aid. In situations where health and safety concerns preclude the ability of having a human to watch the site, such as at toxic waste dumps, robots can be deployed. Although drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence is also revolutionising the capabilities of machines to work autonomously. If you missed part two, see it here. Or, to start from part one, click here.
South Africa’s Athlone Campus is home to the Western Cape College of Nursing, a sprawling complex of lecture halls, administration blocks and four hostels that house around 2000 nursing students. Gallagher Command Centre was chosen as the most effective system to manage access to the hostels and keep the students safe. The nursing college had no method of limiting access to its hostels. People came and went as they liked, there was no record of who was on site and it was difficult to enforce visitor hours. Theft was a problem and reported cases of sexual assault had become a major concern. Access needed to be more secure. Access control system for authorised entry Biometric fingerprint readers were mounted on turnstiles at each of the hostel entrances and exits to manage general accessSafety and security are essential to providing a healthy living and learning environment for students. Athlone Campus partnered with local security solutions provider, FS Systems, to install access control and video surveillance in its hostels. Gallagher Command Centre was chosen to manage the access control system, monitoring access points and allowing only authorised students, staff and visitors to enter the hostel buildings. Biometric fingerprint readers were mounted on full-height turnstiles at each of the hostel entrances and exits to manage general access. Fingerprint readers prevent unauthorised entry from people using lost or loaned cards, and the anti-passback measures built into Command Centre means students can’t ‘pass in’ a visitor or bypass the system, as it recognises and records that someone has tried to enter twice. Integrated visitor management system Gallagher’s integrated visitor management system now monitors visitors and allows the college to control visiting hours. Visitors to the college hostels must register at reception and have their fingerprint captured by the visitor management system. They are then granted access to only the hostel they are visiting. In the evening, the system generates an alarm and reports on visitors still on site – allowing security to ask people to leave and prevent further visitors from entering. The general feeling from students and staff is that they are more secure" Jason Adams, Cost and Estimating Manager for FS Systems says, “The general feeling from students and staff is that they are more secure knowing that everyone entering the facility has gone through some sort of screening or registration process at the security office. The presence of physical security barriers (full-height turnstiles) is reassuring, in that not just any person can gain entry without the necessary authorisation.” Installation of video surveillance solution Alongside access control, the college installed a comprehensive video surveillance solution to reduce incidents of violence, vandalism and crime. The entire video management system is seamlessly integrated with Command Centre, creating one easily managed security solution to track student, staff and visitor movements and ensure that when an incident does occur, security staff are quickly informed and able to respond effectively. “It’s essential for the system to be user-friendly and easy to operate and manage,” says Jason. “The detailed maps that appear onscreen with Gallagher Command Centre clearly indicate the location of alarms and give security staff the ability to respond more quickly to emergencies.” Using Gallagher Command Centre, the nursing college now has a powerful and versatile security system that meets the unique needs of its site. Reduction in criminal activity The college has achieved significant cost savings through the prevention of vandalismThe system provides a reliable way to clearly capture data to monitor students, staff and visitors, lower criminal activity and improve onsite safety. In particular, security personnel can easily find the right information for quick incident resolution, which has led to improved processes, procedures and convictions when necessary. The college has also achieved significant cost savings through the prevention of vandalism and a significant reduction in reported cases of theft. The combination of the new access control system and an increase in physical security barriers means they have also been able to decrease the number of security guards patrolling the facility, reducing overhead costs. Customising and generating reports for college management is also a straightforward task, saving time and money. Most importantly, Gallagher’s security solution has given Western Cape College of Nursing control of who is on site and when – allowing its students to be safe, secure and focussed on learning.
PotashCorp is the world’s largest fertilizer company by volume. They have facilities and business interests in seven countries and are dedicated to the challenges of feeding the world’s growing population. PotashCorp produces three primary crop nutrients – potash, phosphate, and nitrogen. Recognised as the world’s leading potash producer, they are responsible for 20 percent of the global capacity. Their facility in Lima, Ohio is one of four locations whose primary function is to create a range of products including ammonia, urea, nitric acid, and nitrogen solutions. Safety is PotashCorp’s number one priority, and this is evident in the number of awards they’ve received. Management are committed to providing a healthy work environment where employees have a strong personal safety ethic, rooted in awareness and focussed on incident prevention. Implementing a cost-effective solution We found that no other product could compare to Gallagher – its feature set, open API, competencies, and price"Security concerns and the need to implement a more cost-effective solution led PotashCorp to discover Gallagher. “We were looking for a system that would allow for seamless integration. After thorough research, we found that no other product could compare to Gallagher – its feature set, open Application Programming Interfaced (API), competencies, and price. The choice was easy,” says Jeff Johnston, Network Administrator for PotashCorp. “The cost of the product along with its capabilities is incomparable in the market.” It made sense for PotashCorp to replace their entire security system rather than updating an outdated and deteriorating system. Safe and secure working environment Driven to providing a best-in-class, safe, and secure working environment, PotashCorp partnered with the Digital C.O.P.S. Division of Perry proTECH, a business technology solutions company, and Gallagher, to develop a customised security solution. The system needed to be fully integrated, scalable and expandable, digitally based, and user-friendly. Benefits of PotashCorp’s new security solution include: Video integration, for safety precautions and oversight Wireless lock integration, utilising Salto locks out in the field on network cabinets User-friendly report generation, creating cost and time savings PotashCorp will soon implement Gallagher Mobile Connect, a secure and convenient access solution that allows people to use their smart phone in place of an access card. Greater efficiency in plant turnaround Gallagher Command Centre provides the flexibility to easily add cardholders to the existing databasePotashCorp is required to undertake a plant turnaround every four to five years. A turnaround, or shutdown, is a scheduled period of non-production, during which day-to-day plant operations cease. All focus shifts to maintenance, cleaning, inspection, and repair, with employees and contractors working around the clock preparing the plant to resume its regular operations. Turnarounds are one of the most crucial events in the routine operation of a chemical industrial plant and are extremely costly, due to production time lost, increased labour costs and equipment expenses. Speed and efficiency is vital as the turnaround process has the ability to strongly affect a company’s bottom line. PotashCorp can have an additional one thousand contractors and staff onsite during a turnaround. Gallagher Command Centre provides the flexibility to easily add cardholders to the existing database, while enabling management and video operators to monitor cardholder movement throughout the plant. Executing a timely turnaround that stays within budget makes a huge contribution to the plant’s efficiency and drives the company’s future success. Immediate headcount in event of emergency Mike Resar, PotashCorp’s Safety, Health and Environmental Manager at the Lima site noted, “The safety of our employees and contractors is of the highest concern for us. We are now able to generate muster reports that provide an immediate headcount in the event of an onsite emergency. We can also produce time reports easily and without the need for external programming help.” By upgrading legacy system and performing the interface with Gallagher, PotashCorp realised a $20,000 savingOne of the world’s largest chemical companies and a leading manufacturer of petrochemicals resides on the PotashCorp site and shares several turnstiles. Both companies selected Gallagher, and a system-to-system integration was developed, allowing control of the turnstiles and several doors to be shared between the two companies. Tangible cost savings By upgrading their legacy system and performing the interface with Gallagher, PotashCorp realised an immediate $20,000 saving. As the system expands, the savings have continued. After thoroughly vetting their options, PotashCorp has found that the cost per door will be one-quarter less than that of their previous system. They are still witnessing a substantial return on their investment. With the recent addition of four controllers and twelve readers, selecting Gallagher has saved PotashCorp nearly $70,000. “The open integration, cost savings, and ease of reporting is truly remarkable. The difference and quality of the system is undeniable in comparison to what we had prior to Gallagher Command Centre,” says Jeff.
The new vibration-proof Wisenet TRM-410S and TRM-810S NVRs manufactured by Hanwha Techwin are designed to be at the heart of video solutions for transport applications. Wisenet NVRs With a footprint of just 250mm x 210mm and offering two-way audio communication, the two new robust NVRs are EN50155, EN-50121 and EN-61373 certified. This makes them particularly suitable for deployment on buses and trains where they can be used to record video of passenger activity, as well as video of the road or track ahead, in order to provide evidence of any incidents. The new NVRs, which support H.265, H.264 and MJPEG compression, offer 4TB onboard video data storage, with the TRM-810S also offering the option of RAID. PoE/PoE+ support Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch, making them ideal for mobile applications as there is no need to install separate power supplies for cameras and monitors. Designed to offer the stable recording of event and location data as well as video, the two new devices complement the sixteen channel TRM-1610S and TRM-1610M NVRs and the three compact Wisenet X mobile H.265 dome cameras which were launched in 2018. Cost-effective video solution “Our two existing sixteen channel NVRs are proving to be popular among train operators who wish to record images captured by a large number of cameras installed in train carriages,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “The introduction of the four and eight channel NVRs means that we now have cost-effective solutions for bus, coach and truck type applications.”
Two of the most important priorities in a manufacturing environment are safety and productivity. Failure to follow safe work practices around machinery on a factory floor can result in serious injury, while poor productivity can erode profits and ultimately threaten the viability of the business. At WCCO Belting, a Wahpeton, North Dakota-based manufacturer of custom rubber products for agriculture and light-industrial conveyor equipment, a March Networks® video surveillance solution plays a key role in enhancing both safety and productivity. Monitor work processes “Recently, for example, we had a minor safety incident on one of our machines that was captured by the system,” said Michael Marsh, Senior Technology Administrator. “The video not only allowed us to determine the cause of the incident, it also helped us create a proprietary piece of equipment to ensure that the accident would never happen again.” Safety was the main reason WCCO Belting acquired a March Networks system in 2015 Safety was the main reason WCCO Belting acquired a March Networks system in 2015, but the company soon discovered it could use the technology for other equally important priorities. “We found that we could use the video solution for time studies, to be more effective and efficient,” said Marsh. WCCO engineers use the video to monitor work processes and then tweak them to speed production, while ensuring optimum quality. Security system integrator The company selected Marco Technologies as its security system integrator in 2015, and acquired March Networks 8000 Series Hybrid NVRs shortly thereafter. Two years later, when WCCO Belting decided to also equip a second production facility in Arlington, Texas, it upgraded to a March Networks Command™ Recording Software (CRS) solution in North Dakota and moved the 8000 Series Hybrid NVRs to its Texas facility. At the same time, the company deployed March Networks Command Enterprise Software to tie all the video from its geographically-dispersed facilities together, said Marsh. The software enables WCCO Belting “to oversee everything and manage the entire system from a single point of entry.” In addition, approximately 50 March Networks IP cameras — including indoor domes with wide dynamic range and outdoor IR bullet cameras — provide crystal-clear video of activity on the company’s factory floors, loading docks and parking lots. Remote configuration Marsh cites ease of use and outstanding support as the main reasons for selecting the video solution. “The technology is easy to implement, easy to use and easy to navigate. Support has also been great. When we ran into some early issues, they responded quickly to help resolve the problem.” We didn’t have to uproot a lot of the architecture already in place" “More recently, when we decided to expand the system to include our second location, it was Marco that recommended the CRS solution and the redeployment of our NVRs to Texas. It was really plug and play. That was the winning piece for us. We didn’t have to uproot a lot of the architecture already in place.” A system that was easy to rollout was important because WCCO Belting’s IT department does the physical camera install themselves, while partnering with Marco Technologies for remote configuration. Command mobile app “It’s one of the reasons we like March Networks, because we’re a hands-on IT department,” explained Marsh. “We like to make sure we’re always on top of things and that we understand the equipment we’re working with. If we can’t install it ourselves and need someone to come in and do it for us, it just creates future costs.” Aside from the IT department, which has administrative access to the system, authorised supervisors and managers at WCCO Belting are able to audit video for safety and security purposes. Temporary access is also provided to engineering staff for time studies. Marsh and several supervisors also have access to video through the Command Mobile app on their smartphones. Available as a free download from the Apple Store and Google Play, Command Mobile runs on iPhones, iPads and Android devices. Track offending vehicle Remote, after-hours access to video proved valuable during the previously mentioned safety incident, for example, “by allowing managers to pull up video from home and use it to make decisions quickly,” said Marsh. The video solution has also proven useful to local law enforcement, as some of the bullet cameras covering the employee parking lot at the North Dakota facility also have a clear view of North 9th St., a busy artery in the town of 8,000. The video resolution was so good that we were able to quickly track the offending vehicle" “One day, I was called to the front desk and met by two police officers and three sheriffs,” recalled Marsh. “They wanted to come to my office but didn’t say why. I was never so nervous in my life. Once in my office, they explained that they wanted to see if we had any recorded video to help them solve a hit and run a block and a half down the road. We did, and the video resolution was so good that we were able to quickly track the offending vehicle.” Rubber belting solutions “We’ve had two law enforcement visits since then, so now when they show up, I know I’m not in trouble,” joked Marsh. A family-owned business, WCCO Belting was founded in 1954 by Ed Shorma, a Korean War veteran who mortgaged the family car and borrowed $1,500 to buy a shoe repair shop. Propelled by Shorma’s strong work ethic and talent for ingenuity, the business grew and evolved as a manufacturer of rubber belting solutions, leading to Shorma’s recognition as Small Business Person of the Year by U.S. President Ronald Reagan in 1982. WCCO Belting is currently led by president and CEO, Tom Shorma, Ed’s son, and has 270 employees — 200 in North Dakota and 70 in Texas. The company’s rubber product solutions are sought after worldwide, and exported to customers in more than 20 countries. The company won North Dakota’s Exporter of the Year award in 2003, and in 2010 and 2016 it was the recipient of the Presidential ‘E’ Award and ‘E-Star’ award for its export promotion efforts.
Neath Port Talbot residents have been given a road safety boost in the form of a new Mobile Enforcement Vehicle (MEV). It has been supplied by Videalert, one of the UK’s leading suppliers of intelligent traffic enforcement, video surveillance and management solutions, which was awarded the contract after due procurement process. Mobile enforcement vehicle “Indiscriminate and dangerous parking around Neath Port Talbot will no longer be tolerated,” said Councillor Rob Jones, Leader of Neath Port Talbot County Borough Council. “The newly purchased mobile enforcement vehicle seeks to challenge those drivers who choose to park on school keep clear markings, within clearly defined bus stops and on pedestrian crossings with no thought for the safety of others. It is hoped that this MEV vehicle will help to further ensure greater safety and protection for pedestrians and other road users as we progress through 2019.” It is hoped that this MEV vehicle will help to further ensure greater safety and protection for pedestrians" As part of an ongoing campaign, the council’s road safety team carried out a county-wide School Gate Parking campaign in partnership with South Wales Police and the Mid and West Wales Fire and Rescue Service. This included banners to be displayed outside all schools to raise awareness as well as delivering education to all pupils - encouraging them to be a positive influence on their guardians taking them to and from school. However, it was determined that enforcement for persistent drivers was the most effective way to tackle this growing road safety menace. ANPR and Digital Video Platform The Mobile Enforcement Vehicle (MEV) comes equipped with two roof-mounted high-tech ANPR cameras and two colour cameras to capture contextual video evidence of vehicles whose drivers have chosen to contravene traffic orders across the County’s territories. The on-board systems are controlled by one of the Council’s Civil Enforcement Officers using a dashboard-mounted touchscreen. All contravention evidence data is transferred to Videalert’s Digital Video Platform in the parking office at the end of each shift. The Videalert system automates the construction of video evidence packs which are reviewed by trained council operatives prior to sending confirmed offences to the back-office processing system for the issuance of penalty charge notices to the registered keepers of vehicles. Road and residential safety The winning entry of ‘iPatrol’ was submitted by a pupil at Gnoll Primary School In order to promote the safety messages to younger residents, the Council’s Road Safety Team also engaged with all Primary School pupils in a competition to name the vehicle. The winning entry of ‘iPatrol’ was submitted by a pupil at Gnoll Primary School who was presented with a Chromebook, sponsored by Videalert, by Neath Port Talbot Council Mayor Cllr Dennis Keogh at the Mayor’s Parlour in Port Talbot on Thursday, January 24th. According to Tim Daniels, Sales and Marketing Director at Videalert: “This new generation of multi-purpose mobile enforcement vehicles (MEVs) gives Councils greater flexibility in the way that they can deal with a wide range of moving traffic and parking contraventions.”
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling campus security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-time list In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
Round table discussion
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?