Industrial security systems
Arcules, the innovator of integrated video and access control cloud services, announces that it continues to add to its achievements by being selected as a winner in a variety of prestigious industry award programs. Its integrated cloud-based video service has been recognised for bringing significant value and intelligence to integrators, facility managers and end users across a number of applications. Arcules was selected as the 2019 Security Industry Association (SIA) New Product Showcase win...
Johnson Controls introduces the Tyco 360° Radar Detection, a low-cost, early threat detection family of radar sensors that can be easily integrated into existing video management systems for a more complete surveillance solution. Tyco Radar 360° Detection solution An ideal answer for advanced perimeter security needs, Tyco Radar 360° Detection offers long-range protection, which means quicker detection of breaches for areas seeking upgraded perimeter safety, such as power plants, t...
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel ha...
ShotSpotter, Inc., the provider of gunshot detection solutions that help law enforcement officials identify, locate and deter gun violence, announces a new technology innovation unit – ShotSpotter Labs – to expand the company’s current efforts supporting innovative uses of its technology to help protect wildlife and the environment. ShotSpotter Labs is launching with an initial focus on helping combat rhino poaching in South Africa. Later this year, the unit intends to explore...
Leading lock specialist Pickersgill-Kaye (Kaye), a brand under ASSA ABLOY’s High Security & Safety Group, is encouraging those responsible for critical infrastructure sites to consider servicing contracts to help minimise the risk of costly breaches of security. Perimeter protection With terrorism posing a serious threat to the UK’s interests, perimeter fencing, doors and their locks are the first line of defence against potential intruders at installations such as chemical and...
Qognify - the trusted advisor and provider of physical security and enterprise incident management solutions, is exhibiting at ISC West and demonstrating to more than 1,000 organisations around the world, how Qognify solutions are safeguarding people, infrastructure and business operations. At booth 13074, Qognify’s team of subject matter experts will advise security practitioners on how they can maximise the outcomes of their security strategies. Attendees at the ISC West International S...
At ISC West 2019, ASSA ABLOY will highlight its commitment to helping security professionals stay ahead of industry trends and innovation for their clients. ASSA ABLOY’s Booth (#8061) will feature cutting-edge solutions that help security professionals across industries navigate what’s next in access control. “At ASSA ABLOY, we’re focused on helping our customers prepare for the future so they can build a safer, smarter and more seamless business,” said Peter Boriskin, Chief Technology Officer at ASSA ABLOY Opening Solutions Americas. “We’re excited to share the products that allow us to help security professionals open what’s next in the industry.” Unattended package delivery At its booth, ASSA ABLOY will display new innovations in access including: Unmanned Critical Infrastructure: ASSA ABLOY will highlight ways to ensure the security of critical infrastructure that is often unmanned or unsecured. One such example is Intelligent Traffic System (ITS) cabinets that are vulnerable to risks ranging from vandalism to malicious physical and cyber-attacks simply because they aren’t adequately secured. Mobile Credentials: Mobile is already a crucial part of people’s everyday lives. With the shift to mobile, ASSA ABLOY is supporting the growing adoption of mobile credentials and making strides in capabilities by integrating with key strategic partners. Unattended Delivery: The security of unattended package delivery has given rise to a new set of challenges and opportunities. Booth visitors can learn more about ASSA ABLOY’s newest addition to the family, Luxer One, a locker technology company, and how smart lockers can be used as a package delivery solution. Intelligent key system “These advances are the result of our continued commitment to developing solutions that improve security, safety and convenience for our customers,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “The innovations on display at ISC West are just the start of what’s coming down the pike as we explore new opportunities in the market.” Various markets and technologies The booth will also showcase new expansions in ASSA ABLOY’s product lines for various markets from education to healthcare, as well as the latest technologies, including: The Securitron M380E Magnalock, which provides a strong hold, an optional integrated REX, sleek design and easy installation with a new strike mounting template. The Adams Rite G100 wireless digital glass lock with Aperio technology, which makes extending access control to all-glass doors easy and affordable while maintaining aesthetics. The latest Attack Resistant Door Solutions, 2019 Secure Campus Award and 2019 Govies Award winning technology designed to delay intruder entry. The Medeco XT Traffic Cabinet Lock, 2019 Govies Award winning technology designed to secure critical infrastructure with 27/4 security and access through an intelligent key system.
At ISC West 2019, ASSA ABLOY will demonstrate what’s next in the rapidly changing security industry with on-the-ground educational and engagement opportunities, including its in-booth (#8061) Technology Center, Systems Integrator Breakfast and training sessions. “As the modern security landscape continues to evolve, it’s critical for industry professionals to stay ahead of emerging trends and challenges,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “With deep expertise and a comprehensive portfolio of solutions, ASSA ABLOY has always been a resource for security professionals navigating this complex industry. We’re excited to return to ISC West this year and give attendees a look at what’s next.” Systems integrator breakfast ASSA ABLOY’s annual press conference will highlight how the company is evolving with new product innovations ASSA ABLOY’s annual press conference will highlight how the company is evolving with new product innovations, new areas of business and new offerings. The press conference will be held in the ASSA ABLOY booth on April 10 from 11–11:30 a.m. PT. The 15th annual ASSA ABLOY Opening Solutions Systems Integrator Breakfast will give attendees a behind-the-scenes look at the innovative approach the City of Atlanta took to create a safer, easier experience for residents and visitors ahead of one of the largest sporting events in the world. The breakfast will take place at The Venetian on April 11 from 8–9:30 a.m. PT. Seating is limited. Technology center In addition to the broad range of products and solutions on display, visitors to ASSA ABLOY’s booth can explore the Technology Center for a demo of the support resources available to them, including: ASSA ABLOY Customer Support App, which provides immediate and intuitive troubleshooting, e-learning and support. BILT app for easy-to-use 3D installation instructions for ASSA ABLOY products. ASSA ABLOY Academy website for training and education resources. ASSA ABLOY Openings Studio which offers users integrative BIM software tools for designing, building and managing openings that can be used throughout the lifecycle of a building. Educational sessions Attendees can add these sessions to their calendar by logging onto the ISC West 2019 website Attendees can also participate in ASSA ABLOY’s annual USO Bag Build by packing supplies for military personnel leaving for or returning from deployment and awaiting the arrival of their personal luggage. ASSA ABLOY will host and participate in two educational sessions: Introduction to Access Control Wiring is an entry-level lab course designed to explain the basic electronic knowledge needed to wire an access control system. The lab will take place on April 9 from 1:30–4:30 p.m. PT in Sands 210. In Between the Lock and Controller: Why Wireless Locks Are Changing the Game in Access Control is a panel session that will address solutions for design and environmental issues impacting physical access control systems. The panel will take place on April 11 from 11 a.m.–12 p.m. PT in Sands 304. Attendees can add these sessions to their calendar by logging onto the ISC West 2019 website. ASSA ABLOY’s sister companies will also be onsite, including HID Global (booth# 11063), Alarm Controls (booth# 4050), Ameristar (booth# 9073), Traka (booth# 6103), and August (booth# 32067).
As part of the NJESA's (New Jersey Electronic Security Association) 50th Anniversary celebration, plans are underway to organise a special gala dinner to honour ‘pioneers’ of the association. The NJESA is seeking individuals, alarm companies, manufacturers, distributors and central stations that have played an important role in the growth of our industry and the origins of the association. These Pioneers, many now living across the country, will have the opportunity to share about their involvement in the industry. Archived for future generations “We are now in the planning stages of organising a formal dinner to recognise and honour these individuals. If you have been part of the NJ association for at least 35 years, we want you!” explained Ken Gould, President-elect of the NJESA and Chairperson of the Pioneer Event, along with Joe Cioffi III. The NJESA has a rich history. Fifty years ago, three men from the alarm industry, Joseph Cioffi Jr, John Belleque and William C. Pollock, formed the New Jersey Alarm Association. Each of the three founding members reached out to friends and brought in other alarm companies they knew. Membership was $50 and the New Jersey Alarm Association grew from there, as members from the entire state joined. “This is a once in a lifetime event,” added Cioffi. “We plan on giving out awards, plaques and trophies, as well as documenting the reminiscences of our Pioneers in pictures, video, and the written word that will be forever cherished by those attending and archived for future generations.” The gala is currently planned for October 5 at Caesar´s Palace in Atlantic City.
ISC Security Events, PSA Security Network and the Security Industry Association (SIA) reveals the preliminary agenda for the 2019 Cyber:Secured Forum, a conference connecting the worlds of cybersecurity, physical security and systems integration. This second annual cybersecurity educational summit will be held at the Westin Dallas Park Central July 29-31 in Dallas, Texas. Cyber:Secured Forum 2019 will begin on the evening of Monday, July 29, with a welcome networking reception and continue with two days of in-depth content on cybersecurity trends and best practices related to the delivery of physical security systems and other integrated systems. Attendees will enjoy presentations featuring top cybersecurity leaders and sponsor exhibits showcasing solutions related to cybersecurity, integrated systems and physical security solutions. Key presentations Key presentations for Cyber:Secured Forum 2019 include: A View From the Chief Information Security Officer’s (CISO’s) Office - Including Panelist James O’Shea, Head of Reengineering and Global Security Engineering, RBC Capital Markets. Technologies Shaping the Converged Cyber-Physical World - Including Panelist Edward Lee, Security and Trust Advisor, Google Cloud. What Physical Security Can Learn From Cybersecurity…and Vice Versa - Presenter: George Finney, CISO, Southern Methodist University. Breakout sessions Additionally, Cyber:Secured Forum 2019 will include an expanded program featuring breakout sessions tailored to audience members’ unique interests and level of familiarity with cybersecurity as it relates to the physical security industry. Breakout sessions will include: Dissecting the Attack: How Hackers Target and Compromise Products and Systems Just Like Yours - Presenter: Valerie Thomas, Executive Information Security Consultant, Securicon. Selling Deterrance by Denial: Security Products, Hard Targets and Protecting Your Customers’ Crown Jewels - Presenter: Adam Firestone, Chief Engineering Officer, Secure Channels, Inc. Building a NIST-Compliant Cybersecurity Program - Presenter: Larry Wilson, CISO, University of Massachusetts President’s Office. Integrated security systems This event is designed for security systems integrators, IT, Internet of Things and cybersecurity leaders Leaders in the IT and physical security industries will gather at Cyber:Secured Forum to connect and share information on risks and liabilities, responding to cybersecurity threats and establishing security control standards across IT systems, particularly when integrating physical security solutions and devices on IT networks. This event is designed for security systems integrators, IT, Internet of Things and cybersecurity leaders, integration engineers, product developers, vendors and manufacturers, senior technology business executives, security specifiers and engineers, security consultants, top security leadership and anyone responsible for the cybersecurity of integrated security systems. Cyber:Secured Forum 2019 registrants will have access to a special room rate at the conference hotel – the Westin Dallas Park Central – conveniently located just north of the city’s downtown district. To learn more about Cyber:Secured Forum and register to attend, visit the website. The conference is offering an early bird registration discount through April 30. SIA members, PSA members and members of the ISC Executives Club receive additional discounts off registration rates.
Eagle Eye Networks, the provider of cloud video surveillance worldwide, announces the Eagle Eye Mobile Camera MC01 which is available immediately via its reseller partners. The MC01 is a small 4G/LTE camera for use in locations that have difficulty with standard internet access. Eagle Eye Networks is also making mobile data plans available so that channel partners can provide a complete solution to their customers. The Eagle Eye MC01 is designed specifically for remote applications, temporary installations, or changing environments where standard Internet connectivity is not easily available. The MC01 is ideal for temporary installations. The MC01 provides direct camera to cloud connectivity, plug and play installation, advanced person detection analytics and state-of-the-art cyber security. Cloud managed solution The MC01 is a 2 Megapixel camera that records directly to the cloud, provides alerts and notifications, and can be viewed from full featured mobile apps The MC01 is a 2 Megapixel camera that records directly to the cloud, provides alerts and notifications, and can be viewed from full featured mobile apps. “The Eagle Eye Mobile Camera MC01 is another step on the path of bringing all the security camera video that customers have and need, into a single secure cloud managed solution” said Dean Drako, CEO of Eagle Eye Networks. The Eagle Eye Mobile Camera MC01 will be fully integrated into the Eagle Eye Cloud VMS platform later this year, until then the new camera operates on a stand alone cloud recording system. The Eagle Eye Mobile Camera MC01 has the following specifications: Indoor and Outdoor capabilities, 2.43 MegaPixel Resolution, 3G/4G and Wifi connectivity, 2.8 mm Lens, Wide Angle View (138º), Night Vision IR Led with 10m range, Waterproof, Two Way Audio. Home care applications The Eagle Eye Mobile Camera MC01 has been utilised in many applications including: Remote industrial sites Remote storage facilities Crop monitoring Temporary construction Garages Building stairwells Festivals Oil and gas pumping stations Remote water cleaning facilities Ship locks Health and home care applications Comprehensive data plans The Eagle Eye Mobile Camera can be used indoors and outdoors on 4G, or on Wifi and 4G combined The Eagle Eye Mobile Camera can be used indoors and outdoors on 4G, or on Wifi and 4G combined. When combined, the 4G is used as a back-up to the Wifi connectivity. The Eagle Eye MC01 can function with a customer’s mobile data plan or with a data plan available from Eagle Eye Networks. The Eagle Eye MC01 is a simple to install plug and play camera derived from the successful consumer focused NuboCam. NuboCam, launched in 2015 was the world’s first 4G / LTE camera and remains available to consumer customers on the NuboCam website. The new commercial Eagle Eye Mobile Camera MC01, however, has additional capabilities, robustness, integrations, more flexible recording plans, and more comprehensive data plans. It has been upgraded and designed to meet the needs of commercial customers.
Code Blue Corporation’s No. 1 goal in the future remains the same as it was on our first day: Your safety. Founded in 1989, Code Blue is pleased to be celebrating its 30th anniversary as the manufacturer of emergency communication solutions. Code Blue was founded when the University of Illinois at Chicago selected our new signature design from several candidates for a project that involved the installation of security standards on campus. From there, the trademarked cylindrical pedestal that is now commonly known as the ‘Blue Light Emergency Phone’ was born, and it remains a security standard at thousands of education, corporate, hospital, airport and municipal locations around the world. Shifting technological landscape “Our goal remains the same for the future: provide increased levels of flexibility, scalability and interoperability without sacrificing the reliability and durability that is synonymous with the Code Blue brand,” CEO David Cook said. “We want to use our 30 years of experience to help locations continue to enjoy the value of safety and security.” Over the years, Code Blue has greatly expanded its product line to adapt to the shifting technological landscape. That includes embracing the popularity of IP technology, which can be seen in Centry, our newest Help Point that integrates an IP colour camera into the faceplate. It’s the latest in a long line of moves designed to strengthen Code Blue’s position in the security industry and advance with the ever-changing needs of its customers. In 1997, for example, Code Blue developed its first hands-free analogue emergency speakerphone, and in 2010 launched its IP speakerphone line. The ToolVox Media Gateway made its debut in 2009, while Blue Alert MNS (Mass Notification System) was released in 2013.
When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of them have a formal process in place. Large security projects require clear KPIs and targets (including monthly commitments), ongoing review, regular clear communication and a dedicated team for consistency and continuity from start to finish. Major security system Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs If you don’t choose wisely, what you may end up with is company delivering a string of different people from different departments working on your installation at any given time, without a joined up approach. The person responsible for system design, for example, may never see your project when it’s actually being installed, which can lead to a potentially problematic and ultimately unsatisfactory outcome. Whilst every major security system design project will bring about its own set of challenges, the approach taken by the security vendor should remain consistent. Here’s what it should look like at the different stages of the project and what you should expect from your supplier. Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs. Product knowledge Going down this route limits your options and you could end up with a security system that meets the vendor’s product portfolio rather than your needs. That doesn’t mean to say that a security company that is not affiliated to specific manufacturers won’t have close relationships with a range of them. A close relationship can be beneficial in terms of in-depth product knowledge and preferential pricing. What’s most important is that the security company independently test and asses product rather than relying on manufacturers’ claims. They should continually appraise the marketplace to see what’s new and assess the value and relevance of product. They should also have the finger on the pulse of the security sector to identify where the market is going. Team work is essential with large projects not only to get the job done, but also to manage any risk Comprehensive strategy At STANLEY Security we very much focus on identifying technology solutions that minimise financial outlay for a client, such as video analytics. At present we are testing facial recognition systems which have grown in popularity and delivery. A written, comprehensive strategy needs to be in place for the project, including forecasting that considers the longer timescales involved in large, complex projects and includes a ‘what if’ approach to ensure appropriate resource is available. So, for example, if a project looks like it is going to overrun due to unforeseen circumstances, you want to be sure you retain the same team on the project full time and that they are not transferred onto the next contract or dividing their time between the two. Manage any risk Team work is essential with large projects not only to get the job done, but also to manage any risk. Your vendor must have an experienced Major Project Team with a clear structure, so everyone knows their role and you know who you are dealing with at any given time. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate If subcontractors are being used by the security company, which is quite usual for very large installations and for particular specialisms (e.g. control room modelling), then a process needs to be in place to manage them and you need to be made aware of this. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate. High security requirements This is where the dedicated Major Project Team is vital as they will know the project inside out and have worked on it from start to finish, helping to avoid any end of project issues. Large, complex security systems, especially those with high security requirements, are not easy to deliver. They require skilful, experienced hands, substantial resources in both financial and staffing terms, and a clear, consistent procedure that everyone is fully aware of. Don’t assume that just because you are dealing with a large security vendor they will have all of these in place; think like a security professional and ask to see the evidence!
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminaries and experts for SIA Honors Night, an annual event featuring a cocktail reception, a gala dinner benefiting Mission 500, engaging entertainment and an awards ceremony recognising industry leaders. Sold-out event SIA Honors Night 2018 was a sold-out event held at the Current at Chelsea Piers. The awards presented at SIA Honors Night 2018 were: SIA Progress Award (presented by SIA’s Women in Security Forum) – Eddie Reynolds, president and CEO, iluminar Inc. Women in Biometrics Awards (co-founded by SIA and SecureIDNews and co-presented with sponsors FindBiometrics, IDEMIA and SIA’s Women in Security Forum) – Kelly Gallagher, senior account manager at NEC Corporation of America; Lisa MacDonald, director of the Identity Management Division in the Office of Biometric identity Management at the U.S. Department of Homeland Security; Colleen Manaher, executive director of U.S. Customs and Border Protection; Lora Sims, senior biometric examiner at Ideal Innovations, Inc.; and Anne Wang, director of biometric technology research and development at Gemalto Cogent SIA Insightful Practitioner Award – Guy M. Grace, Jr., chair of the Partner Alliance for Safer Schools Steering Committee and director of security and emergency planning for Littleton Public Schools in the Denver suburb of Littleton, Colorado Jay Hauhn Excellence in Partnerships Award – Larry Folsom, co-founder and president, I-View Now George R. Lippert Memorial Award – Pat Comunale, retired security industry veteran, former member of the SIA Board of Directors and former CEO and president for Tri-Ed Distribution, an Anixter company Standout keynotes SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States Honors Night guests enjoyed keynote remarks from Bonnie St. John, a Paralympic ski medalist, Fortune 500 business consultant, Rhodes scholar, former White House official and best-selling author. St. John discussed her journey to become the first African-American ever to win medals in Winter Olympic competition despite having her right leg amputated at age five and shared her top lessons from mentors and her advice for cultivating resilience. SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States; each year, SIA Honors Night raises funds for Mission 500. SIA presented 26 engaging education sessions through the SIA Education @ ISC East program, including two standout keynotes and four hands-on workshops. Hundreds of conference attendees participated in these sessions, with impressive speakers like Valerie Thomas, ethical hacker and executive consultant at Securicon; Pierre Bourgeix, president at ESI Convergent; Scott Swann, president and CEO of IDEMIA National Security Solutions; and Jumbi Edulbehram, regional president – Americas, Oncam. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event Confronting emerging threats Highlighted education sessions at this year’s conference included: Friend or Foe? Technology Disruption and the Physical Security Industry, a keynote address by Philip Halpin, senior vice president and head of global security at Brown Brothers Harriman, one of the country’s oldest and largest privately held financial firms 21st Century Best Practices: Reporting From the Front Lines on How Law Enforcement and the Security Industry Are Confronting Emerging Threats, a keynote address by James A. Gagliano, a retired FBI supervisory special agent, CNN law enforcement analyst and adjunct assistant professor at St. John’s University Cybersecurity professionals ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo Additional cutting-edge topics covered in the education sessions included the move to smart cities, convergence in the security industry and the use of artificial intelligence in video analytics. ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event, which featured a presentation from world-famous hacker Kevin Mitnick, insights from Dave Hogue of the National Security Agency’s Cybersecurity Threat Operations Center, a discussion on the cyber skills shortage gap and ways to attract, develop and retain talented cybersecurity professionals and more. Handle sensitive data Additional events at ISC East 2018 included: A breakfast presented by ISC Security Events and SIA’s Women in Security Forum featuring a panel discussion celebrating women in security and supporting the participation and advancement of women in the industry Paid hands-on workshops providing cutting-edge information and valuable insights on the most current business trends, technologies and new developments in security Free exhibitor product training sessions sharing live, in-depth demonstrations A meeting with SIA’s Data Privacy Advisory Board, which provides information and best practices to help SIA members handle sensitive data in a safe and secure manner to protect the personally identifiable information of their employees, partners and customers from potential breaches
A deep native integration of Bosch cameras with software from ISS proactively catalyses the best in security and surveillance, while providing advanced intelligent video tools. ISS SecurOS provides intelligent enterprise video management solutions with emphasis on providing scalability and flexibility to meet the customer’s needs. Deeply integrating built-in video analytics from Bosch cameras improves operator efficiency and situational awareness to manage complex environments. ISS SecurOS maximises camera performance for license plate recognition, face recognition, and container/train carriages recognition. The cameras meet the performance needs for advanced analytics, ensuring the success of projects and saving time, resources, and cost. The partnership has delivered multi-thousand-camera safe city deployments, industrial analytics solutions, and systems for large-scale transport providers. The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each vehicle License plate capture The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each and every vehicle. Operations managers are accountable for efficient logistical flows and effective use of roads and parking lots. Knowing the ins and outs of the transport infrastructure and what’s going on at all times provides the knowledge required to ensure operations are running safely, efficiently and in compliance with the rules and laws. An important part of this comes from monitoring which vehicles are entering an area and ensuring they are allowed to be there. Capturing license plates of every vehicle moving in an area provides knowledge of traffic flows and usage patterns. Such a solution should also allow a customer to easily configure and manage monitoring preferences and permit easy data exchanges with other operational management systems and services to manage an infrastructure and logistics as a whole. Reliable license plate data Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments As transportation infrastructures are often operating around the clock, reliable vehicle identification data is required 24/7. This means that the cameras capturing this data should work in all lighting and weather conditions, for both slow- and fast-moving vehicles. Cameras must be built to produce usable images 24/7 in all weather conditions. For quality license plate recognition in both day and night, the cameras make use of supplementary infrared light. A special License Plate Recognition (LPR) mode, developed in collaboration with LPR software, delivers readable license plates even with glaring headlights and with fast moving vehicles. Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments. License Plate Capture solution The SecurOSTM AUTO system of ISS, when used with Bosch cameras, provides easy to deploy solutions for all of these requirements. It recognises license plates from many countries, manages and matches white, hot and blacklists and notifies the operator either in the GUI or through a messaging interface to other management systems. Additionally, the system can be used and managed as a standalone or embedded in other management systems on the premises.
As digital transformation accelerates and touches more aspects of business operations, ASIS International is working to provide educational opportunities that security practitioners need to stay on top of those rapid developments. It’s a mission that will drive the ASIS Europe 2019 meeting, ‘From Risk to Resilience,’ this month (March 27-29) in Rotterdam. “What makes the event special is how it covers the full spectrum of security risks that organisations face, and in particular, looks at the human factors and management challenges involved,” says Eduard Emde, CPP, ASIS Europe 2019 Conference Chair, Head of the Health, Safety and Security Section, ESA (European Space Agency), the Netherlands. Examining technology-driven risk When we look at technology-driven risk, only a part of that can be addressed by new technology" “When we look at technology-driven risk, only a part of that can be addressed by new technology. Much of the work is helping people adapt and find new ways of working and managing – that is where I think this event excels.” The opening keynote on ‘Amsterdam: From Smart City to Smart Society’ will be delivered by Theo Veltman, Innovation Rainmaker at the Municipality of Amsterdam. The keynote will set the tone for the three-day event by showing practically how cities are evolving and why – from the perspective of society, business and government. “This a great way to challenge us to understand what is driving change outside the ‘security bubble’ so that we can be better prepared for what is coming,” says Emde. The growing exhibition at ASIS Europe in Rotterdam will feature 45 exhibitors, including Johnson Controls, Nedap, Securitas and Stratfor Mobile device security In addition, the show will cover some of the most relevant and challenging topics in emerging technology such as artificial intelligence (AI), drones, mobile device security and industrial control systems. Given the seniority of the audience, a lot of time will be devoted to management and leadership topics such as soft skills and building teams with diversity and inclusion in mind. In addition, Nick Lovrien, CPP, Chief Global Security Officer at Facebook, will speak about securing an innovation culture. Scenario-based training sessions will provide a hands-on experience to work through challenges such as a chem-bio attack, a fake news crisis, travel risk planning, practical ways to effectively engage business executives and red teaming on cyber-physical risk. The growing exhibition at ASIS Europe in Rotterdam will feature 45 exhibitors, including Johnson Controls, Nedap, Securitas and Stratfor. Advanced learning experience We have a large number of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors" Online registration will be open until March 26. There is a Free Show Pass that provides access to the exhibition and to the education in the Innovation Track and Career Centre, plus two networking drinks and refreshments throughout the day in the exhibition hall. For a more advanced learning experience, the Professional Pass and Leadership Pass offer more sessions, training and networking functions. There are plenty of options aimed at all budgets, learning needs and schedules, says Emde. Last year there were 775 registrants in total. “This year is looking good. We already surpassed last year’s total number of conference delegates, and registrations are coming in steadily,” says Emde. “For me, the numbers only tell a small part of the story,” he adds. “We have a large number of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors. That quality, diversity and expertise onsite is what really makes the networking experience so valuable.”
In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. This is part three of our 'AI in Physical Security' series. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organisations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Enterprise software companies This shift will create a huge disruption in our industry and cause further consolidation Many of these organisations are true AI and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Data capture form to appear here! Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focusing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Analysing mobile endpoints There is also a potential for machine learning to enable cybersecurity companies to predict the nature of future attacks based on past behaviour, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a ‘signature-based’ system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyse past incidents in a broader manner and aggregate information from a multitude of sources. A main function of AI is to analyse past incidents in a broader manner and aggregate information from a multitude of sources Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analysing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. Android mobile endpoints A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Machine learning can help cybersecurity efforts, but it can’t replace many important functions Ultimately, machine learning can help cybersecurity efforts, but it can’t replace many important functions. There will always be sophisticated attacks that no machine learning algorithm will be able to find. Pairing human intellect with machine technology is the best approach. In another application, AI-driven robots can be deployed for security in places where it may not be feasible to have a human patrol, such as the outskirts of a vital electric substation located hundreds of miles from the nearest town. Evolution of artificial intelligence A robot can easily traverse the harsh terrain and notify authorities when something is amiss. Another use is during disaster recovery efforts. Robots don’t get tired, and they don’t have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behaviour or alert first responders to those who may need aid. In situations where health and safety concerns preclude the ability of having a human to watch the site, such as at toxic waste dumps, robots can be deployed. Although drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence is also revolutionising the capabilities of machines to work autonomously. If you missed part two, see it here. Or, to start from part one, click here.
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorised smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the centre console. Seamless vehicle sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorised, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorised users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognised, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity approach TAP utilises a multilayered industry-recognised security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognised cybersecurity approach.” Vehicle-function permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialisation in some of the towns in Maharashtra while preserving their rich heritage. Wide area monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralised solution at a centralised location from where all other sites can be monitored at a time. Matrix IP bullet and dome cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
With a heritage stretching back over 500 years, Gebrüder Weiss is one of Europe’s oldest transport and logistics companies. Based in Vorarlberg, Austria and with more than 7,000 employees in 150 locations around the world, it is also one of the largest. Sony video security in logistics centers Customers of all sizes trust Gebrüder Weiss to ship their consignments quickly, safely and undamaged to their destination Customers of all sizes trust Gebrüder Weiss to ship their consignments quickly, safely and undamaged to their destination. To guarantee this and make the entire logistics chain traceable, the service provider relies on comprehensive video surveillance in its logistics centers, which is regularly updated to reflect the latest state of the art. Gebrüder Weiss has now expanded its existing monitoring solution at the company’s largest distribution centre in Maria Lanzendorf near Vienna that previously featured almost 500 Sony cameras and Milestone's video management software (VMS). This has been supplemented with the addition of 33 Sony SNC-VM772R 4K video security cameras. Sony 4K cameras The upgrade ensures greater security, comprehensive package tracking and the ability to track any damage. The new Sony 4K cameras are used mainly to monitor reloading from larger trailers into smaller trucks. Their field of view covers the actual transfer area as well as the interior of the trailers and conveyor belts. The SNC-VM772R features a large CMOS sensor with 4K resolution that combines excellent image quality and large depth of field, even in difficult lighting conditions. The camera’s robust design with integrated image stabilization ensures smooth, clear video images despite vibration, dust and exhaust fumes from passing trucks. Video monitoring The new 4K cameras can track several objects simultaneously with either VGA or Full HD resolution The cameras’ installation ensures that the entire transshipment area is monitored at all times, with no blind spots caused by vehicles or pallets. In addition, the new 4K cameras can track several objects simultaneously with either VGA or Full HD resolution. The SNC-VM772R's 20-megapixel image sensor also enables capture of high-resolution Evidence Shots – still images with greater than 4K resolution that allow even the smallest details to be viewed clearly. For Gebrüder Weiss, the Sony solution is thus an outstanding alternative to multiple PTZ (pan/tilt/zoom) cameras or multi-sensor systems. Installation and integration into the existing environment were carried out by local Sony partner ÖWD Österreichischer Wachdienst Security & Services. With 2,800 employees, ÖWD is one of the largest security companies in Austria and maintains 24/7 technical teams in all Austrian states. "Since it opened in 2006 we have been using Sony cameras at our terminal in Maria Lanzendorf, which is our largest in the world" says Werner Drnec, Operations Manager at Gebrüder Weiss, Maria Lanzendorf. "Both the image quality and reliability – with failure rates close to zero – have always exceeded our expectations, and even in the current project they proved themselves in a direct comparison. Our confidence in the Sony brand plus easy, seamless integration into our existing environment added to this."
As a wholly-owned subsidiary of Tebian Electric Apparatus Stock Co., Ltd. (TBEA), Shenyang Transformer Group Co., Ltd. (Shenyang TBEA) is one of the largest transformer manufacturers in China, and a major exporter in the industry with manufacturing and R&D capabilities. Shenyang TBEA is the first transformer company publicly listed in China and has an annual productivity that has reached 30 million kilovolt-ampere (KVA). It is the only company that provides 840,000 KVA/500KV main transformers and converter transformers for the left bank of the Three Gorges Project. Shenyang TBEA has a world-class industrial park occupying 720,000 square meters for production of UHV AC and DC electricity transformers. Featuring dispersed entry points over a large area, the company needed a new access control system to safeguard the plant’s integrated factory, R&D building, administrative offices, elevators, mixed working areas and key equipment rooms. Access control system with TCP/IP connection Shenyang TBEA required specific technical features for the new physical access system including TCP/IP connection and high-speed processors In particular, stringent access control for the general manager’s office, financial department, conference rooms, elevators, and core mechanical room was mandatory and the new system needed to also perform time and attendance and data generation for night patrol. In addition to security and stability, the access control system needed to enable seamless integration with the plant’s existing security equipment from third-party vendors, and be interoperable with the cards already deployed in the field to save cost. To address these challenges, Shenyang TBEA required specific technical features for the new physical access system including TCP/IP connection and high-speed processors, as well as data generation and communication capabilities. In addition, each access point needed to execute all commands offline in case of network failure. Centralised web-based access control solution After a thorough analysis of Shenyang TBEA’s requirements, HID Global provided a comprehensive solution that included 17 VertX V1000 network controllers, 107 VertX V100 door/reader interfaces, 173 iCLASS R10 contactless smart card readers and ten iCLASS R30 contactless smart card readers. The new system leverages Shenyang TBEA’s existing TCP/IP network for a centralised, web-based access control solution that provides central monitoring, report generation, the ability to establish staff access level settings and visitor management. The security officer on duty can then verify the employee’s identity to prevent unauthorised entry, enhancing the efficiency and internal security iCLASS R10 and iCLASS R30 readers are installed at each access point and connected to VertX V1000 network controllers through the VertX 100 reader interface to transfer entry records to the host. Each entry point can still execute all commands when communication is lost with the central station. By integrating with the system software, the administrator can restrict staff access based on job function. For example, only authorised staff members are allowed to use the elevator to access specific floors. Enhancing security by preventing unauthorised entry HID Global’s solutions also meet Shenyang TBEA’s access control system requirements and perform the following functionality: Staff management: The solution is integrated with system software and main entrance and factory monitors. When a cardholder presents his/her card to the reader, the cardholder information and photo is displayed on the monitors. The security officer on duty can then verify the employee’s identity to prevent unauthorised entry, enhancing the efficiency and internal security. Enhanced Security: HID Global’s iCLASS readers and credentials deliver increased security with the readers’ data encryption and mutual authentication capabilities. Additionally, HID Global’s VertX networked access solutions enable access level settings and area control to prevent unauthorised entry to specific areas. All employees must present their cards when entering or leaving the main gate of the site, and the entry records are transmitted to the central server to further improve security management. Integration with surveillance and fire control systems When any abnormal alarm signals are received, the new access control system can activate a pop-up camera to perform video monitoring and screen capture Interoperability: VertX access control solutions are interoperable with a wide range of hardware and management software, enabling additional deployments such as time and attendance, remote area control, visitor management and more. The readers support the factory’s existing MIFARE credentials, offsetting the cost of swapping out all of the cards at once. Integration with other sub-systems: The solution can seamlessly integrate with multiple sub-systems such as surveillance and fire control systems. When any abnormal alarm signals are received, the new access control system can activate a pop-up camera to perform video monitoring and screen capture. For fire control, the system can determine the incident type and location and unlock emergency doors for evacuation in the case of a fire. Lifetime warranty on products and solutions “After our extensive assessment, we selected HID Global and its physical access control solutions for its leading technology and comprehensive product functionality. We had an experience where some HID Global controllers were accidentally submerged under water and the products still functioned properly without any defects, validating HID Global’s robust product design and quality,” said Mr. Yu Liuyi, project manager with Shenyang TBEA. “As a global leader in secure identity solutions, HID Global offers a lifetime warranty to their customers. HID Global and its channel partners has promptly responded to our requests and provided quality support to achieve satisfying results, eliminating our concern regarding post-sales service and support,” Liuyi added.
CriticalArc has announced that it has been appointed by FCC Group (FCC) – a global provider of environmental services, water management and infrastructure works, headquartered in Spain – to help develop and implement SafeZone as a multinational safeguarding solution for all its employees and any accompanying family members while they are working overseas on company projects. CriticalArc’s pioneering SafeZone personal protection and emergency response system is already being used by FCC as part of their initial deployment phase in three very different security challenges: for the FAST consortium to design and build the Riyadh Metro in Saudi Arabia, for all FCC projects in Egypt, and on a gas pipeline construction project in North Mexico. Based on these experiences FCC then plans to integrate SafeZone more widely and to start rolling out the approach from mid-2018 to cover all its international operations in over 35 countries. It gives FCC a reliable method for instant mass communication, for example, to broadcast regional alerts, weather warnings or travel updates" High level of emergency support “FCC believes that SafeZone is the ideal tool to help us provide an even higher level of emergency support and assistance to all employees and their families across all our international operations. The tool will give everyone peace of mind when they are travelling between different work locations or exploring the country in their free time, plus it gives FCC a reliable method for instant mass communication, for example, to broadcast regional alerts, weather warnings or travel updates. “CriticalArc’s ongoing commitment and flexibility in helping customise and deploy SafeZone to meet our specific requirements has been outstanding. FCC is an increasingly global and diversified business with complex security needs but CriticalArc is working closely to integrate SafeZone into our existing systems and to develop new approaches and features as required,” said José Morales, corporate security director at FCC Group. SafeZone gives users the ability to call for immediate emergency assistance by simply pressing a button on their mobile phone Automatic alert in emergency situations One of the key challenges for expatriates and their families is having to deal with the cultural differences, language barriers or growing political tensions that in some regions can lead to even minor incidents quickly escalating out of control. For example: if someone is involved in a road traffic accident or stopped for questioning by the police. SafeZone gives users the ability to call for immediate emergency assistance by simply pressing a button on their mobile phone. They do not need to even say anything, and their phone automatically sends an alert with their exact location details to a centralised control room. Providing security to FCC’s expatriates “SafeZone is already extensively used by universities and other further education establishments where the prime objective is to help protect students and staff both on and off campus. However, with FCC this is the first time SafeZone has been specified by a global security team for implementation across multiple geographies and such a diverse range of operational models. FCC’s expatriates and their families are much more widely dispersed, and in some regions the company’s security assets are not directly under its own control,” said Darren Chalmers-Stevens, CriticalArc EMEA managing director. The initial intention is for FCC to mandate SafeZone for all its own expatriates, but the company is also considering the potential benefits of recommending the tool for use by all personnel working for partner companies involved in FCC-led consortia, joint ventures and the company’s other international activities.
With the value of scrap metal only heading in one direction recently, dealers are having to turn to ever more advanced security solutions to combat theft and break ins. Security specialist Trigion is now providing high-tech solutions at a major Kent scrap yard in the UK, including the use of thermal cameras and a ‘virtual perimeter’ system. On a site such as a scrap metal yard, there can be a lot of material on view, and it is not always easy to determine exactly what is happening on a standard CCTV camera. Simplifying intrusion detection Thermal cameras make it clear where a heat source is and when it moves. They can also display an electronic trail showing where motion has taken place; making detection much easier. In addition, by setting a virtual perimeter on screen, specific areas can be monitored more closely, and an alarm triggered if someone enters it. This perimeter can be altered remotely to meet changing situations, such as the arrival of a greater quantity of metal.With scrap metal prices consistently rising over the past year or two, dealers are increasingly being targeted by unscrupulous elements" Neil Ricketts, Security & Technical Services Director at Trigion, said: “With scrap metal prices consistently rising over the past year or two, dealers are increasingly being targeted by unscrupulous elements intending to cash in. We work with our customers to design the best solution for their individual needs. We’re not tied to any supplier or manufacturer, so can ensure the customer gets what they really need." "In the case of the scrapyard, the thermal imaging gives a much clearer picture of the situation, and staff at our remote monitoring station can ensure the site is secure at all times.”