Allied Universal®, a security and facility services company in North America, announces a strategic partnership with LiveSafe to provide mobile, two-way safety communications between the company’s security professionals and customers in order to prevent safety and security incidents. Allied Universal® Technology Services, a division of Allied Universal, will be utilising the LiveSafe Mobile App effective immediately. Safety and security risk intelligence LiveSafe delivers action...
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emot...
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security P...
Pelco, Inc., a global pioneer in intelligent video solutions, announced the appointment of Kurt Takahashi as Chief Executive Officer, effective November 1, 2019. Previously, Takahashi held the position of President of AMAG Technology, a global end-to-end security management platform. At AMAG, his innovative leadership transformed the company from being an access control focused business into an open, innovative security management solution specialising in access control, video surveillance, vis...
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowe...
A new cybersecurity service brings professional 24-hour monitoring within reach of SMEs for the very first time. bluedog Security Monitoring, which has been launched by Freeparking.com founder Paul Lomax and cybersecurity expert Tim Thurlings, offers smaller firms the type of managed detection and response service previously only available to large corporates. Highly trained cybersecurity team The launch of bluedog comes as SMEs face increased pressure from customers, regulators and investors The London-based company has developed a low-cost device called Sentinel which plugs into a customer's network and uses machine learning to spot unusual activity. It then alerts bluedog's security operations centre, where a highly trained cybersecurity team can analyse and respond to potential threats. The bluedog service can detect both external and internal threats, such as phishing emails or the download of video or audio files packed with malicious malware, which often bypass traditional endpoint security and firewalls. It not only offers enhanced security and rapid response to incidents, but also helps companies comply with standards such as GDPR, Cyber Essentials or ISO/IEC 27001:2005 and keeps a full audit trail for reporting purposes. The launch of bluedog comes as SMEs face increased pressure from customers, regulators and investors as well as cyber criminals seeking ‘soft' targets. Firewalls and endpoint protection The UK government's Cyber Security Breaches Survey 2019 shows that while the number of businesses being attacked has been falling - down from 46 per cent in 2017 to 32 per cent this year - the number of attacks each victim suffers has risen from two to six over the same period. It suggests businesses with weaker defences are being targeted repeatedly. bluedog's CTO Tim Thurlings, a former ‘ethical hacker' who helped develop the EU's TIBER threat intelligence framework, says: "Firewalls and endpoint protection which SMEs have traditionally relied on are no longer adequate as experienced hackers can easily find ways round them. SMEs need to take their cybersecurity to the next level, yet at present few have a dedicated professional.” Bluedog's innovative model combines machine learning and human expertise to offer exceptional service" "bluedog gives them 24/7 access to a whole team of cyber experts for less than the cost of employing one part-time staff member. Bluedog's innovative model combines machine learning and human expertise to offer exceptional service and peace of mind." Analyst firm Gartner believes that by 2020, 15 per cent of organisations will be using services such as managed detection and response, compared to less than 1 per cent today. Combining machine learning and human expertise bluedog CEO Paul Lomax, whose Freeparking.com business was the UK's first self-service domain registrar, and who has also founded two hosting companies, says bluedog is targeting a gap in the market for SME monitoring services. "While technology is becoming more sophisticated, it still requires people to analyse the data and act on it," he explains. "Ideally all businesses should have 24/7 monitoring but with salaries for skilled professionals running into six figures, it is an expensive resource that up until now has been limited to blue-chip firms.” "With bluedog, we have developed a smarter model which enables us to revolutionise pricing and bring services within reach of SMEs for the first time. This is a $10bn untapped market and no-one else is offering a solution. bluedog's model gives us a competitive advantage and makes us well placed to become a global leader."
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0 enables security analysts to tailor the way they visualise incident and indicator flows, allowing security teams to better manage and automate incident response. Key updates to Demisto v5.0 include - Reimagined User Interface - Brand new UI that streamlines global navigation while also enhancing the delivery of information within each incident Enhanced Threat Intelligence - Access rich indicator intelligence from integrated sources and take action in a scalable manner Database Scaling - Install the Demisto app server and databases on separate machines. Multi-tier configurations let you scale your environment and manage resources efficiently SOAR on the fly - Introduction of chat support in the mobile application, letting you update relevant stakeholders on-the-go and ability to manage notifications from the web app, choosing to receive updates on email, Slack, Mattermost, or the mobile app Demisto v5.0 security platform Rishi Bhargava, VP Product Strategy, Demisto, a Palo Alto Networks company comments, “Demisto v5.0 is packed with new features suggested to us by our community of customers, partners, and independent users. We’ve also introduced changes that facilitate improved load management and scaling of resources, ensuring that organisations are secure irrespective of the pace at which they grow”. He adds, “Back in 2015, we recognised that security teams wilt under dual pressures every day: an ever-increasing volume of security alerts, and insufficient resources to address these alerts. Over the past four years, our customers have seen us as the only platform that has combined security orchestration, incident management, and real-time collaboration to make their lives easier”. Security Orchestration and incident management Rishi further stated, “Automating as much as possible hands time back to security teams to investigate, learn and improve, and sometimes just take a deep breath. Since joining forces with Palo Alto Networks, we have accelerated our go-to-market and made inroads into use cases outside of traditional security operations.”
Once again this year, macmon secure GmbH will be present at Europe's largest IT security trade fair with five partners and presents the following four main topics: macmon NAC in the new version 5.15.0 - secures corporate networks even more efficiently and comprehensively macmon NAC smart - the simple NAC solution for small and medium-sized enterprises (SME) macmon Past Viewer - the intelligent network look back macmon Switch Viewer - more network details for more security Network access control software The migration to the new version is in full swing with our customers and runs smoothly" With the latest version of the network access control (NAC) software from macmon secure GmbH, another milestone was reached in September 2019. In addition to more than 200 new and improved features, the overall engine performance could be significantly increased again. Thus, the processing speed of large amounts of data, as they occur in the Domain Name System (DNS), the network device detection and footprinting, multiplied. Christian Bücker, Managing Director of macmon secure GmbH: "At this year's it-sa we inform our partners, customers and interested parties about our latest version of macmon NAC. Our development team in Berlin has done an excellent job, the migration to the new version is in full swing with our customers and runs smoothly. NAC should be as self-evident as antivirus and firewall products.” Increasing number of network devices “Since attacks, cybercrime or espionage activities are increasingly occurring in the internal network and are always becoming more sophisticated, we can contribute a relevant part to fundamental security. Besides, with our new product variant macmon NAC smart, we also have a possibility for SMEs to implement NAC quickly, easily and cost-effectively. At it-sa, we are also looking forward to many new resellers who can achieve short-term sales with macmon NAC smart without registration or additional certification." There is currently no attractive solution on the market in the area of network access control For small and medium-sized enterprises (SMEs) up to 250 nodes, there is currently no attractive solution on the market in the area of network access control. Above all, the acquisition costs for SMEs seem too high. But the importance of NAC will grow strongly in the coming years due to an increasing number of network devices in companies, IoT and associated skills shortages for SMEs. Comprehensive network transparency Network Overview will also be a core driver for NAC solutions and network access protection in this segment. In September 2019, macmon secure GmbH introduced macmon NAC smart, a solution that solves precisely these problems intelligently and easily, while at the same time being attractive for customers in use and for partners and distributors in sales. In addition to comprehensive network transparency, guest and BYOD management, as well as differentiated enforcement of policies, the solution can be put into operation quickly and in just a few hours. macmon NAC smart is available either for up to 150 or 250 nodes and a fixed term of 3 years. The customer can choose between high-quality hardware or a virtual appliance. Setup is conveniently done via remote support. Thus, macmon reseller, also outside the partner network, offers fast sales opportunities without certification and training. Suspicion or concrete incidents In case of suspicion or concrete incidents, corresponding connections can be checked later Besides, macmon Past Viewer offers the option of structurally collecting and processing the ‘old’ data - which is usually discarded with Network Access Control - to obtain a historical view in addition to the live view. For each endpoint can be represented, when and where the endpoint was operated in the network, which IP addresses and which names it had or in which VLAN it was. Furthermore, it can be tracked per switch interface or access point, which endpoints were operated there. With this information, forensic analysis is possible, but above all, proof requirements regarding ISO or PCI compliance or for the data protection officer are effectively supported. In case of suspicion or concrete incidents, corresponding connections can be checked later. Utilisation of all collected data Because these data are collected through the permanent survey, it is possible to look back over the entire duration of the use of macmon NAC and macmon Past Viewer. At the same time, the data allow analysis for planned changes or measures within the network. Another addition to the control of network access is the utilisation of all collected data down to the last detail. With macmon Switch Viewer, other information of the network devices is collected and offered for use With macmon Switch Viewer - extended functions around network components. Another addition to the control of network access is the utilisation of all collected data down to the last detail. With macmon Switch Viewer, various other information of the network devices is collected and offered for use. Examples include the serial numbers and other port configurations. Effective protection of the network A graphical representation of the interfaces in the original layout of the network devices provides quickly detectable details about the current state. If necessary, there is the possibility to unerringly determine the correct physical port and switch it, if required. In addition to details and visualisations, the macmon Switch Viewer also allows the use of the macmon RADIUS server for secure switch login to ensure that only authorised administrators can make changes to the switches. At the same time, a gap in the effective protection of the network is closed by the German macmon NAC.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it will unveil new headquarters in the City of London, in the autumn of 2019. The announcement follows a period of accelerated growth for Genetec in the United Kingdom, with a significant and sustained increase in EMEA revenues over the last five years. Some of the company’s flagship customers in the UK include the Royal Borough of Windsor and Maidenhead, Twickenham Stadium and the University of Hull. Paul Dodds, Country Manager, UK & Ireland, commented: “At a time when Brexit has seen many organisations reconsider their presence, Genetec is unequivocal about the role of the United Kingdom as a critically important part of the global economy. As such, we’re delighted to be opening a central London headquarters to better meet the needs of our channel partners, end users, and prospects.” Public safety applications We work with local partners to provide training, compelling educational experiences, and state-of-the-art support The new headquarters will incorporate an expanded state-of-the-art training facility, and a new ‘Genetec Experience Center’ housing innovative solutions from Genetec and its large ecosystem of technology partners. Furthermore, the office will house a dedicated research and development team focused on justice and public safety applications for law enforcement, emergency responders and local government. Michel Chalouhi, VP of Global Sales, added: “The new London headquarters will give us the perfect platform to continue to execute our UK strategy and sustain the excellent year-on-year growth that we’ve achieved globally over the past years. The security market is growing and changing rapidly. We are constantly facing new challenges, so we need to ensure we work with our local partners to provide up-to-date training, compelling educational experiences, and state-of-the-art support. Our base in London will help us do that, thanks to its fantastic location, facilities, and links.”
Traka Automotive, which boasts the UK’s most advanced networked key management solution for car dealers, has seen a 34 per cent rise in demand for its systems over the last 12 months and has now made 1,002 key management systems live in sales, service and PDI centres around the UK and Ireland. Traka Automotive electronic key management is proving a vital tool to aid productivity and security for dealerships looking for efficiencies by tightening systems and processes to help staff to be more productive. Key management system Access to Traka key cabinets is only given to authorised individuals using PIN codes or biometric fingerprint readers Access to Traka key cabinets is only given to authorised individuals using PIN codes or biometric fingerprint readers. Traka Automotive’s system enables all new vehicle details to be transferred automatically from a dealer’s management system into the new key management system as soon as they arrive on site. It now takes less than a minute for all key vehicle information (make, model, VIN, status, registration and customer details) to be assigned into the Traka Automotive system which powers the Traka cabinets. New sets of keys are then attached to an iFob which holds all vehicle information linked to those keys. This is then placed into a secure Traka key cabinet. Traka Automotive’s mobile app As soon as the iFob attached to a set of keys is slotted into the cabinet, an electronic record of cabinet and slot location, together with the identity of the key’s last handler, is made available to authorised users of Traka’s software via their desktops and mobile devices. Traka Automotive’s mobile app enables staff to find out which cabinet is holding relevant keys Traka Automotive system users have been able to access the system via Android and Apple iPhone or iPad smart mobile devices for several years now and this has helped dealers realise productivity gains faster still. Traka Automotive’s mobile app enables staff to find out which cabinet is holding relevant keys and where the vehicle is parked in seconds via their mobile device right there and then, rather than calling a desk-bound colleague, to raise the query - saving the business even more valuable time. Keeping track of keys As well as reducing incidents of lost or misplaced keys, Traka Automotive software saves time which is otherwise wasted searching for keys and vehicles. This is helping improve staff productivity and dealer profitability to the point where Return on Investment is achievable in as little as four months. Paul Smith, Director at Traka Automotive explains: “The current sales growth figures are a testament to the success of our key management system in providing a rapid, demonstrable benefit to our customers. Traka’s sales have increased by a third this year as more UK and Ireland businesses recognise the value of our system in keeping track of keys day in and day out and saving their staff time and therefore money – protecting tight margins.”
Everbridge, Inc., a pioneer in critical event management and enterprise safety software applications to help keep people safe and businesses running, announced a partnership with RiskBand, a provider of wearable, live-monitored safety devices for organisations and their workers. The alliance is part of Everbridge’s strategy to reach the broadest set of workers, including those that may not always have ready access to a mobile phone, such as a hospitality employee, in-home healthcare provider, or lone worker in the field. With the additional modality and simple access of the RiskBand wearable device, Everbridge is expanding its addressable market for protecting employees regardless of their physical location, whether inside the office, working remotely, or travelling the globe. Critical events such as assaults and active shooter incidents are threatening lives and causing major business disruptions. Fatal work injuries have increased over the last decade, with 5,147 occupational fatalities recorded in the U.S. in 2017. Emergency response strategy The rise in smart technology is drastically improving operations for businesses across the globe" This challenge is only magnified by an increasingly mobile workforce, as well as the prevalence of lone worker scenarios across multiple industries served by both Everbridge and RiskBand, including healthcare, banking, retail, energy and utilities, hospitality, and higher education. Designed for enterprise-level personal safety and security, RiskBand’s wearable devices bolster an organisation’s emergency communication and response strategy. A single push of a button provides two-way voice, user profile data, images, and geolocation, in near real-time to your organisation’s security operations centre. As part of the partnership, Everbridge will integrate its award-winning Safety Connection™ platform with RiskBand’s wearables, allowing both Everbridge and RiskBand customers to receive emergency messaging and provide detailed reporting of their location. The data from an employee’s RiskBand device is shared back to the Everbridge platform, allowing an organisation to deploy the appropriate emergency response. The rise in smart technology and connected devices is drastically improving operations for businesses across the globe, and bringing about new opportunities to keep people safe,” said David Meredith, CEO of Everbridge. Immediate access to phones The collaborative partnership will enable us to enhance employee safety through state-of-the-art wearable devices" “Our partnership with RiskBand is advancing our existing connected safety ecosystem, offering employees without immediate access to a mobile phone with a direct line for emergency communication that they can utilise anywhere.” As part of the expansion of that ecosystem, Everbridge is looking to introduce additional wearables into the marketplace, and integrate further with IoT devices, sensors, and smart building technology, all to better protect employees from an increasing array of workplace threats. "It is especially gratifying that a respected industry leader like Everbridge recognises the powerful solution of the RiskBand ARIES device and platform. We believe that this collaborative partnership will enable us to empower businesses to enhance employee safety through state-of-the-art wearable devices that are fully integrated with the most comprehensive critical event management solutions,” explained Jim Van Law, CEO and Co-founder of RiskBand. RiskBand will be fully integrated into Everbridge’s platform. Individuals attending the Global Security Exchange (GSX) conference next week in Chicago can visit the Everbridge Booth #124 to learn more about the joint offering.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyse the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualise it on Security Center maps, leveraging the dynamic visualisation capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorised dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localisation system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyse more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilising the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and calibre of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment programme Shot Tracer has launched a reseller recruitment programme with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalisation is changing. Today, networking enables video images to be shared throughout a school system, travelling over existing networks, empowering a more centralised security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
Workforce management systems gather and analyse information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its unique operational requirements. From tracking guard tours to managing incidents and officers remotely, the platform improves officer accountability, optimises operations, and delivers actionable insights via a live dashboard to reduce vulnerabilities and enhance efficiencies. The platform is customisable and scales to each client’s business. Platform to control and identify risks “Corporate security teams deal with issues related to operational risk, facility security levels and design basis threats, and must contend with manmade, naturally occurring, and technological events,” says Guirchaume Abitbol, CEO and founder of Trackforce. “We provide them a platform that enables them to control and identify risks, deliver their service, and maintain security best practices.” Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications Trackforce serves large security guard companies and global organisations in diverse vertical market sectors and is expanding in facilities management. More than 200,000 professionals at over 20,000 customer sites in 45 countries use the platform. Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications, and generates data-rich analysis and key performance indicators (KPIs) that enhance monitoring and reporting. Reduces corporate risk Better management of corporate risk is a benefit of security workforce management. The Trackforce platform reduces corporate risk in four areas by: Managing multiple sites, located anywhere, with various threat levels, cultural differences, operating procedures, and regulations. Supporting a security budget and investment in new solutions by providing data necessary for budget approval. Keeping management informed about outsourced security services partners with relevant data, analytics, and transparency. Providing real-time data on risks and incidents so operations can be quickly optimised to ensure top-level security services. Identifying potential threats and risks The platform rapidly and accurately collates data (implied data or trends) based on user-selected parameters. Data- and intelligence-rich reports become available to managers from any location via a dashboard. All necessary information is displayed on a single screen in an uncluttered format.The ability to analyse current and historical data in real time empowers security managers to track patterns Reports can be downloaded and shared with stakeholders. The ability to analyse current and historical data in real time empowers security managers to track patterns, identify potential threats and risks, and implement preventative actions and strategies. Using data intelligence as benchmark Security teams will use data intelligence as a performance benchmark for resources required to accomplish site goals. They will also use this information to pilot and rationalise resource needs for impending contracts based on historical, descriptive (what happened), diagnostic (why did it happen), predictive (what will happen) and/or prescriptive data (how can we can make it happen). “For example, when a large company incurs incremental computer equipment theft, a supervisor can use the platform to review historical reports and identify patterns and anomalies,” says Abitbol. “The supervisor could then identify and proactively implement targeted strategies to mitigate the theft, such as modifying security routes, increasing patrols, or adjusting asset management protocols.” Enhanced control of security resources The Trackforce platform has been designed to serve clients at multiple regional and national locations and is available in many languages. The Command Center allows a security supervisor based at a central location to easily manage officers on multiple sites. The Command Center provides greater oversight and enhanced control of security resources The Command Center provides greater oversight and enhanced control of security resources. Management can compare locations and evaluate security with a customisable reporting dashboard for each site. The uniform platform uses the same reporting templates and processes for each secured and managed location, thus ensuring consistency and accurate benchmarking. Trackforce’s workforce management solution has low cost and presents a low barrier to entry, with systems that can be implemented in a short time.
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honoured to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Sitting on the banks of the river Niger in West Africa is Niamey, Niger’s capital city. The capital city faces some unique challenges to the safety of its local residents and visitors. To help tackle these issues, the government of Niger is working with Hikvision’s West Africa team to install a state-of-the-art, cutting-edge video surveillance solution across the region. Niamey has a history of trade and commerce. Its large and bustling open air market – the Grand Marché – sells everything from clothes, to jewelry, to food, and attracts an estimated 20,000 tourists a year. But while the city has long been known as one of the more relaxed capitals of West Africa, in recent years Niamey has received high profile attention due to criminal incidents in and around the capital city. African Union Summit The city would also receive high profile guests from around the world, including key personnel from the UN and WTO When it was announced that Niamey would host the 33rd Session of the African Union (AU) Summit for the very first time, the Government of Niger decided to seize the opportunity to establish a complete urban video surveillance network. It was vital that this high profile event could run for the full five days without any disruption or untoward incidents, as Niamey would attract visitors and heads of states from across the continent. The city would also receive high profile guests from around the world, including key personnel from the United Nations and World Trade Organisation. Complete video surveillance solution Vincent Wang, Technical Support Engineer for Hikvision West Africa, says, “The AU Summit is a key event in Africa’s diary, and always requires a high security presence. It gave us the ideal springboard for launching a complete surveillance solution that would provide security to those in attendance, while giving the city a robust set of tools to help prevent and manage security incidents long into the future.” When seeking out the ideal surveillance solution for this project, the Government of Niger learned about several similar projects that Hikvision had already completed in African cities and was impressed how well the solution is running. “They wanted to emulate a project, so that’s what we set about doing.” says Vincent. Hikvision high resolution cameras Vincent and the team worked with technology partners, ITS Solutions to design a complete urban surveillance network in Niamey, which would protect residents and visitors across the whole city during the summit and beyond. Central to the solution was the installation of more than 100 Hikvision high resolution cameras for 24-hour monitoring of the city. Along the 12 main roads, and at key intersections throughout the city, the government’s security team installed the Hikvision DarkFighter 2 MP Speed Dome Cameras (DS-2DF8225IX-AEL). These cameras are designed to deliver high quality images in low light or dark environments. They are also equipped with license plate recognition technology so as to effectively identify vehicle violations, such as over speeding or other traffic rules violations, even at midnight with no light. Hikvision PanoVu Series 180° Panoramic + PTZ Cameras Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras Meanwhile, Hikvision PanoVu Series 180° Panoramic + PTZ Cameras (DS-2DP0818ZIX-D/236) were installed at the entrances and exits of the main government offices and hotels, for reliable surveillance and overall protection of all visitors with panoramic view at the time of the summit event. Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras. And the high speed PTZ also offers the function of fast detail positioning over the panoramic area. In the control center, security teams were given Hikvision iVMS-8600 video management software (VMS) in conjunction with large LCD monitor screens, to display a live stream from all the city’s surveillance cameras. Hikvision’s urban video security solution also includes mobile surveillance, allowing law enforcement or government officials to use a mobile device to see a live stream from any Hikvision camera installed in the city, even while on the move. Enhancing network infrastructure The installation was thoroughly planned. “The existing local infrastructure provided some challenges,” says Vincent. “But we investigated it fully during our test phase, so we could design a surveillance network to suit”. “For instance, we found a few potential issues with the local power supply, but to remedy this we installed a UPS network to guarantee power to the cameras for at least 2 hours should the grid fail. We also assessed the local network infrastructure, and the ambient lighting at night. This work was fully completed during our proof of concept several months before the summit.” Hikvision surveillance solution for smart city The African Union Summit was well received and passed without event. The Hikvision surveillance solution undoubtedly played a key role. “The people of Niger feel a certain confidence when talking about the summit,” says S.E Brigi Rafini, the Premier Ministre, at the government of Niger. “It couldn’t have happened without the support of Hikvision technology. The comprehensive security solution was central to the event’s success.” Counseil de Bureau de Securité at the Government of Niger kept positive attitude towards the future potential of this solution. “Thanks to Hikvision technology, Niamey now has a comprehensive city safety solution that will help us to both prevent crime, and respond in real time when incidents do occur. It’s a landmark project for our country and the region as a whole, and we are very interested to see how this innovative technology can help our city and our people to be safer.”
Bluebird House is a specialist UK inpatient facility, providing treatment and care for young people with complex mental health problems which mean they pose a risk to themselves or others. Run by Southern Health NHS Foundation Trust, the centre also houses adolescents detained under the Mental Health Act, so the highest standards of care, protection and security are required. As part of a wider review of security and safety across the trust, Bluebird House was earmarked for a comprehensive video surveillance upgrade and IDIS technology was chosen as the best-fit for this major project. Providing comprehensive coverage All IDIS equipment uses true plug-and-play set up, which minimises disruption and disturbance to patients Galeco engineers installed 110 IDIS 12MP Super Fisheye cameras in communal and therapeutic areas inside the facility and over 40 bullets and 13 PTZ cameras cover the exterior. All the cameras are connected to six 32-channel NVRs and managed via IDIS Center video management software (VMS). All IDIS equipment uses true plug-and-play set up, which minimises disruption and disturbance to patients, while protection against gaps in footage is provided by IDIS Smart Failover ensuring 24/7 continued recording even during network instability or drop-out. Implemented across three secure wards and two high care units, the 12MP IR Super Fisheyes provide comprehensive coverage much more affordably than two or more fixed lens cameras. Advanced IDIS video capture technology delivers complete high-definition scene coverage in all lighting conditions and allows staff to de-warp in live view as well as playback. Automatic object detection The 5MP bullet cameras, deployed around the building exteriors provide coverage of gardens, courtyards and car parks. IR LED that allows night-time image capture at distances up to 30m and includes intelligent functions such as active tampering alarms and trip zones and will notify the security team to any breach. Each camera is set to perform virtual guard tours at specific times throughout the day and night IDIS 31x Zoom IR PTZ cameras are installed along the perimeter to provide clear night-time image capture at distances up to 200m. Each camera is set to perform virtual guard tours at specific times throughout the day and night. Featuring automatic object detection, the cameras recognise and automatically track objects, people or cars capturing useful footage and alert operators of any suspicious activity. To meet patient privacy requirements, access to live and recorded footage, is limited to staff according to their ward and role. Access to advanced features and functionality Staff can only view and review footage from their area of responsibility at designated monitoring stations using specialist IDIS monitors designed for high-performance surveillance operations. To meet future requirements, the new IDIS solution can be linked to the trust’s local area networks (LANs) without increasing cyber- security concerns, thanks to IDIS’s use of proprietary software which is inherently resilient. The totally cost-free IDIS Center video management software (VMS) gives security managers and senior staff a complete overview of the entire site from a 24/7 manned and centralised control room. Using the intuitive IDIS Center interface, operators have complete command and control of each camera and access to advanced features and functionality to ensure the secure and smooth day-to-day running of the site. Authorised monitoring and access of footage IDIS technology made this easy, and it was also the quickest and least disruptive to install Video surveillance is a key resource for clinicians, Sr. managers and security staff at Bluebird House as they need to work closely together to deal with incidents and reduce risks of harm. Improved video coverage was needed as it would allow ongoing review of care standards and full investigation of any alleged incidents. Patient privacy is also of paramount importance, so specialist integrator Galeco Communications was selected to implement a solution that would allow authorised monitoring and access of footage for specific rooms and wards. IDIS technology made this easy, and it was also the quickest and least disruptive to install, the most secure against cyber-attacks - in compliance with NHS requirements – and yet would deliver the lowest total cost of ownership (TCO). Ensuring better safety and security Replacing the centre’s ageing camera system, the IDIS solution would give complete coverage of corridors, wards and other high-risk areas in all lighting conditions. The IDIS solution has improved security, safety and care at Bluebird House by providing a complete video record of events. Exterior cameras ensure better safety and security in outdoor communal areas Footage from the 12MP Super Fisheye cameras give a full 360 view without any blind spots with a choice of 6 view modes and crucially provides staff with the ability to de-warp footage retrospectively. Now, if incidents need to be investigated it’s a simple task to retrieve video and provide any high-definition evidence required. Exterior cameras ensure better safety and security in outdoor communal areas, while security operators can quickly detect and respond to any suspicious activity on the perimeter. Access and review recordings "A key benefit for us is that this new system is so easy to use, and particularly for our clinical staff who can now access and review recordings to help them improve patient care. This video technology gives us extra confidence that our patients and staff are safe and protected” said Tracey Edwards, Head of Security at Southern Health NHS Trust. With minimal disruption, and working in this sensitive location, Galeco engineers were able to replace an outdated system with an affordable, high-performance, cybersecure solution that is easy to maintain and operate without any ongoing license fees.
The city of Bologna has chosen Wisenet video surveillance cameras to help it create a smart traffic management system. Bologna is the seventh most populous city in Italy. It is at the centre of a metropolitan area of approximately one million people with a diverse range of travelling requirements within a very large area. The City has always invested in traffic control and monitoring systems with the aim to make travel easier and faster for its citizens. An example of this is a centralised traffic light management system which has been in operation since 2013 and has helped reduce travel times within the urban area. Video surveillance solution The purpose was to provide a tool to allow authorities to take strategic planning measures The City wanted to invest in a video surveillance solution which would allow the monitoring of 12 vehicle access gates to the city in order to provide authorities with reliable real-time information about urban mobility. The purpose was to provide a tool to allow authorities to take strategic planning measures and optimally redistribute the traffic load on the road network. After extensive research, which included the evaluation of a wide range of possible solutions, a decision was made to procure a total of 89 Wisenet cameras manufactured by Hanwha Techwin. The implemented solution consists of cameras dedicated to vehicle counting and classification, and ANPR cameras which have been installed on strategic gates. The cameras monitor both directions of travel to allow local authorities to study the most important and strategic vehicle access flows to the city. Detecting illegally parked vehicles This is made possible thanks to the latest generation of Wisenet cameras. By integrating high image quality and advanced video algorithms, Wisenet ‘intelligent’ cameras are able to enhance the value of video surveillance by supporting mobility and security in Smart Cities. 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data, an edge based application developed in cooperation with Sprinx Technologies which facilitates the collection of statistical data about vehicle flow. By tracking the vehicles moving in a camera field of view, the application is able to provide information on vehicle counts, classification and average speed. 24 of the other cameras installed are Wisenet XNO-6120R/FNPs. These feature Roadway Licence Plate Recognition application which is able to help the local authority’s control room operators detect illegally parked vehicles and other traffic infringements. Built-in IR illumination Effective with all European number plate formats, the application has more than a 95% recognition accuracy whatever the environmental conditions, even when vehicles are moving at speeds of up to 150 km/h. The Wisenet XNO-6120R is a 2 megapixel bullet camera which is able to capture high definition images with the help of a 12x optical zoom, digital image stabilisation with built-in Gyro sensor, a Defog feature and built-in IR illumination. Part of the Wisenet X camera series, the XNO-6120R features the World’s best Wide Dynamic Range (WDR), which performs at up to 150dB to produce clear images from scenes that contain a challenging mix of bright and dark areas and normally result in overexposed or underexposed images. Real time automatic incident detection The Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins The processing power of the Wisenet 5 chipset incorporated into the Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins for different applications, such as number plate recognition, vehicle counting/classification and real time automatic incident detection. Completing the camera line-up are 41 Wisenet SNP-L6233RH 2 megapixel 23x IR PTZ dome cameras which have been carefully located at major road junctions throughout the city, in order to allow control room operators to zoom in to see close up detail of any incidents. Traffic management solution “We are delighted with how easy it has been to successfully integrate the Wisenet cameras with our existing video management platform and our other supervision monitoring systems,” said Alberto Nuzzo, Head of Office 'Digital Infrastructure and Telecommunications', at Comune di Bologna, when commenting on the success of the traffic management solution. “The data captured by the Traffic Data and ANPR applications running onboard the cameras, is allowing us to far better manage the existing levels of traffic, whilst also helping us capture and store valuable data which we will be able to analyse to assist us to plan for the future. Our control room operators have been particularly impressed with the exceptional clarity of the images captured by the cameras and the data analytics capabilities of the system, which are enabling them to accurately visually verify what may be occurring and quickly take appropriate action.”
Siemens Mobility and globally renowned mission critical communications (MCX or MCC) enabler, Softil have jointly announced an agreement that will see a range of next generation communications solutions come to market for use in Long Term Evolution-Railway (LTE-R) railways as well as Mission-Critical Push-To-Talk (MCPTT) metro applications like underground/tram buses, etc. Siemens Mobility adopts Softil's BEEHD client framework to bring best-of-breed mission critical communications solutions to LTE-R rail networks; solutions will also support the UIC's FRMCS strategy to build a Global Rail Traffic Management System for the entire rail industry MCX solutions The MCX solutions will support the Future Railway Mobile Communications Systems of the UIC The MCX solutions will support the Future Railway Mobile Communications Systems (FRMCS) of the International Union of Railways (UIC) to build a Global Rail Traffic Management System (GRTMS) for the entire rail industry, bringing significant economic and operational benefits and efficiencies to operators in the process. "The rail industry is at the forefront of the mission-critical communication revolution and GSM-R based systems have already been replaced by LTE-R solutions in Asia Pacific (APAC) and the trend is expected to widen across other markets in 2019/20," says Pierre Hagendorf, Softil's CEO. "With Softil's BEEHD client framework at the heart of Siemens Mobility's next generation LTE-R offerings, the rail industry will have a range of supremely reliable solutions packed with rich communication features." The new radio system for the Railway industry has to guarantee the interoperability with GSM-R while delivering on these three main areas: Critical communications - Secure voice communication between driver and signaller, provision for emergency and group calls, real-time video imagery for any occurring incidents and the intelligent bearer for European Train Control System (ETCS) and Automatic Train Operation (ATO) operation; Performance communications - Track condition monitoring, Connected Driver Advisory System (C-DAS), on-train telemetry, maintenance of non-critical infrastructure, non-critical real-time video, wireless communication for on-train-staff; Business communications - passenger information system, passenger entertainment and passenger communication connections. Siemens Mobility will enable existing GSM-R users to develop a migration plan that will enable all of the above. BEEHD client technology LTE-R is the foundation for the railway variant of the 3GPP MCC over LTE/5G (MCPTT) standard "The rail industry is facing unprecedented challenges in handling increasing numbers of passengers and freight traffic loads," says Russell Clarke, General Manager, Mobile Communications at Siemens Mobility. "After careful analysis of market options, Siemens Mobility chose Softil's BEEHD client technology as the outstanding Software Development Kit (SDK) for our developers to build best-of-breed LTE-R communications solutions for the rail industry in the shortest timeframe." LTE-R is the foundation for the railway variant of the 3GPP MCC over LTE/5G (MCPTT) standard. What sets the LTE-R technology apart from the currently used GSM-R is that it brings the full power of broadband networks including voice, video, text, images, location and more and not just simple voice. LTE-R technology The Softil BEEHD framework is LTE-R compatible and will enable Siemens Mobility's solutions to deliver stable voice as well as data communications on trains running at speeds in excess of 400km/h. LTE-R technology makes possible live tracking of a train and transmitting railroad information to engine drivers, and also enables multimedia-based group calling and SMS services on top of voice call services. Additionally, real-time group/individual communication is made possible between train engineers and control centers. BEEHD IP communications solution is a cross-platform framework designed for system integrators BEEHD IP communications Softil's BEEHD IP communications solution is a cross-platform framework (SDK) designed for chipset vendors, device manufacturers, system integrators, application developers and service providers looking to accelerate the development of IP-based voice and video over LTE (VoLTE, ViLTE and MCPTT/MCX) solutions. The quality of the award-winning SDK is unmatched within the communications industry and BEEHD was proven to satisfy all required key performance indicators (KPIs) set by the 3GPP MCX standard, as well as often even stricter KPIs required by global carriers and service providers.
Upon hearing Pablo Picasso’s famous praise of art’s ability to clear ‘the dust of everyday life’, one’s thoughts could easily turn to one of Arizona’s newest landmarks, the Mesa Arts Center. Set proudly amidst the dust of the Sonoran Desert, the Mesa Arts Center is a striking complex of buildings, art installations, and public throughways, offering a rich blend of visual impressions in glass, water, stone, and metal, with splashes of vibrant colour and metallic reflection. At more than 21,000 sq. feet, the award-winning $95 million campus is the largest and most comprehensive performing, visual and educational arts complex in Arizona, serving as a gathering point for the citizens of Mesa and region alike, seeking to enjoy the indoor and outdoor spaces, public events, classes, and art exhibitions. Ensuring safe, family friendly environment Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering pointThe presence of an adjacent light rail station and hosting of multiple festivals throughout the year further increase traffic to, from, and through the open planned site at various hours of the day, and on weekends and even holidays. The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces, while providing places for group gatherings, performances, and quiet reflection, comfort and relaxation. Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering point for all walks of life. In addition to welcoming visitors to the Center, the open configuration of the complex invites commuters coming off the nearby light rail line to stroll through on their way to and from the station, and draw loiterers, would-be vandals, and itinerant populations (attracted to the semi-secluded spaces created by outdoor art installations and the complex’s fountains and water elements). Surveillance system for crime prevention Particularly outside of traditional hours of operation, such factors can increase the risk of nuisance crimes, vandalism, and petty theft, and potentially more serious crimes against visitors and staff, without a vigilant and comprehensive security and surveillance operation. Additionally, complex spaces, varied materials, and water elements increase risk for incident and accident without proper prevention and/or prompt response. A technical solution with proven power, performance, and reliability was paramount to ensure protection of property While customary approaches to similar venues have typically relied heavily on a combination of CCTV and human security guards, the size and complexity of the Mesa Arts Center campus makes a traditional manned guarding solution, even when supported by a typical surveillance technology, both cost prohibitive and potentially inadequate. Protection of property and campus safety The Mesa Arts Center is an architectural showpiece and regional destination, requiring comprehensive surveillance at all hours, every day of the year, under highly variable conditions. A comprehensive technical solution with proven power, performance, and reliability was paramount to ensure protection of property and the safety of everyone on campus. The City of Mesa, who operates the Center, in partnership with Scottsdale’s Surveillance Acquisition Response Center (SARC) and IDIS technology, provided a mix of surveillance cameras and network video recorders (NVRs) able to meet the varied requirements of a campus housing multiple art galleries, studios, performance spaces, walkways and cut-throughs, and outdoor gathering spaces; and support SARC’s innovative approach to virtual guarding, which incorporates military, police, and intelligence best practices and personnel to enhance traditional remote monitoring models and outcomes. Using Direct IP NVRs and cameras SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution SuiteThe City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring selected for the Mesa Arts Center a natural fit. Featuring multiple IDIS DirectIP [model number] network video recorders (NVRs), and IDIS Direct IP [model number] cameras, with [feature set], at the heart of a comprehensive security posture, SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution Suite, and their unique military, law enforcement, and intelligence-derived protocols and best practices to support on-site personnel and cover the campus comprehensively at night and during other off-hours. Additionally, the IDIS solution also seamlessly integrates with, recording and managing footage from other camera installations, demonstrating the IDIS dedication to eliminating the common frustrations and complexities of security systems. SARC’s virtual guard protection The implementation of SARC’s virtual guard protection and protocols to support on-site personnel, and the highly visible, but seamlessly integrated, presence of IDIS surveillance cameras, as part of a total IDIS solution, have contributed to the Mesa Arts Center’s reputation as one of the region’s most welcoming and inviting community spaces among the area’s art lovers, families, and neighbourhood’s workers (who regularly use the space without fear or discomfort as a gathering place for lunch or pathway to and from the local light rail station). The integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus 24/7, the integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus and those within it, using innovative surveillance application bringing together IDIS’s highest quality remote viewing and VMS offerings and SARC’s remote ‘voice down’ virtual guarding protocol, which informs those under surveillance, in real time, that they are being watched and should leave the property immediately or face consequences. Keeping people and property safe The successful implementation of this solution has placed the City of Mesa and Mesa Arts Center management at the forefront of innovation in keeping the people, places, and property under their protection safe and secure, and marked them as leaders in responsible stewardship of taxpayer, grant, and donor dollars, through the implementation of a system that provides more comprehensive coverage, measurably better outcomes, and enhanced visitor experiences 24/7, year-round for a fraction of the cost of previous manned guarding solutions.
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?