Suprema, a global leader in biometrics and ID solutions, announces that the company has entered into a commercial software license and distribution agreement with Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, for the licensing of Suprema's BioSign, its under-display fingerprint recognition algorithm. Suprema has entered the smartphone segment with the Samsung Galaxy J5 in its fingerprint solution for smartphones last year. In February 2018, the company launched BioSign 3.0...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
Crossword Cybersecurity plc, the cyber security technology commercialisation company, releases insights from its global review of academic cyber security research. The new database looked at nearly 1,200 current and past research projects from academic institutions in the United Kingdom, United States, Europe, Australia, and Africa. It reaffirmed the value of the cyber security research market, with reported funding of EU projects at over €1 billion. The database identified several global...
Axis Communications is returning for the 21st edition of Intersec from 20 – 22 January 2019. Axis will showcase the many dimensions of products, solutions and services across Retail, Critical Infrastructure and Smart Cities. Future of security Philippe Kubbinga, Regional Director - Middle East & Africa, Axis Communications, “At Axis, we have stayed at the forefront by constantly challenging the status quo and investing in our people and our partners. As we move into another yea...
Security and Safety Things GmbH (SAST) will be presenting innovative use cases for security cameras at CES 2019 from January 8 to 11, 2019. These are the first to be developed on the basis of SAST’s open IoT ecosystem for the security industry. The use cases show the potential of the ecosystem for restaurants, airports and events. Within the food services sector, restaurateurs can run multiple apps and solutions on the same camera, which allows the system to count visitors and personalise...
GlobalPlatform, the standard for secure digital services and devices, announces its Board of Directors for fiscal year 2019. Six Board seats were open and after a close election, the following individuals were re-elected to serve a further two-year term: Consecutive years Nils Gerhardt – Group VP and Head of Product and Project Management, Production IT and Professional Services for the Region Americas, Giesecke + Devrient Mobile Security. Marc Kekicheff – Vice President of Chip...
FLIR Systems, Inc. announces three Neutrino midwave infrared (MWIR) camera cores: the small, lightweight FLIR Neutrino LC and two FLIR Neutrino Performance series cores, the SX12 and QX. The latest models expand the FLIR Neutrino cooled camera core family for commercial, industrial, and defence original equipment manufacturers (OEM) and system integrators. The Neutrino LC is FLIR’s first High Operating Temperature (HOT) MWIR camera core and the first model in the SWaP+C (Size, Weight, Power, and Cost) series. As the smallest, lightest weight, and lowest power consuming Neutrino model available, the LC can be integrated with smaller drones and allow drone operators to fly longer. Provide crisp imagery With HOT technology, Neutrino starts imaging two times faster than previous models, allowing optical gas imaging professionals to detect gases faster. Additionally, the Neutrino’s longer operational lifetime allows installation in security applications where maintenance access is restricted, difficult, or costly. The two new Neutrino Performance series products, the Neutrino SX12 and the Neutrino QX, offer the highest-resolution MWIR performance from FLIR The two new Neutrino Performance series products, the Neutrino SX12 and the Neutrino QX, offer the highest-resolution MWIR performance from FLIR. The Neutrino SX12 produces high-definition (HD) thermal imaging video, while Neutrino QX, with more than 3.1 megapixels, is FLIR’s highest resolution MWIR core. Both Neutrino Performance models provide crisp imagery at long distances while maintaining a wide field of view and are ideal for ground-based or airborne intelligence, surveillance, reconnaissance (ISR), and counter-drone solutions. Powerful software controls “The three new Neutrino cooled camera cores offer significant technological advances, from setting a new bar for size, weight, power, cost, and lifetime, to offering the highest resolution for a midwave thermal camera in its class,” said Jim Cannon, President and CEO of FLIR Systems. He further added, “With common industry-standard interfaces, simple and powerful software controls, and technical support, the new Neutrino products empower OEMs to reduce product development risk and shorten time to deployment. The expanded Neutrino line opens opportunities for FLIR to help customers solve challenges, increase efficiencies, and save lives.” The Neutrino SX12, QX, and LC are dual-use camera cores for commercial, industrial, and defence products and are classified under the U.S. Department of Commerce Export Administration Regulations as Export Control Classification Number 6A003.b.4.a.
Elizabeth France CBE, Security Industry Authority Chair, announces the appointment of Ian Todd as SIA Chief Executive. Ian succeeds Dave Humphries who has been interim CEO since the departure of former SIA CEO Alan Clamp at the end of October. Ian will join the SIA on 25 February 2019. Ian will be joining the SIA from the Independent Office for Police Conduct (IOPC) where he is currently Deputy Director General. This builds on a number of board level roles in professional regulation, including the health and legal sectors. Focus on public protection He has also spent time in central government, including the Cabinet Office. Ian has extensive experience of dealing with the public in a frontline role as his first career was with the NHS ambulance services. Throughout his near 15 years he was a qualified paramedic and held a number of roles to Director level, including as part of the Gold command team during 7/7. Ian will build on our work with government, the private security industry, and our other stakeholders to maintain a focus on public protection" Elizabeth France said: "I am delighted to welcome Ian as the SIA's future Chief Executive. Ian joins us with an excellent track record in leadership and organisation development, we look forward to working with him. Ian will build on our work with government, the private security industry, and our other stakeholders to maintain a focus on public protection and ensure the SIA continues to improve the service we provide to licence holders and security businesses.” Strategic direction “I am confident Ian will enjoy the challenge of delivering effective regulation in a changing environment. He will carry forward our strategic plan and build on our successes to ensure continuity and progress across all areas of the SIA's work." Ms France added: "I thank Dave Humphries for his steady leadership since Alan Clamp's departure in October. He has ensured that the SIA has continued to move forward strategically and operationally." Dave will continue at the helm until Ian arrives at the end of February. Ian Todd said: "I am excited to be taking up the post of Chief Executive at the SIA and look forward to drawing on my experience to drive the SIA's strategic direction and strengthen its regulatory role. The SIA plays an important role in protecting the public and improving standards in the security industry. I look forward to working with the board and staff at the SIA, as well as external stakeholders and partners. I am committed to building on the good work of the organisation and to ensure that the SIA continues to be seen as an effective and efficient regulator".
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the ARS/X/Y-7234-AC series. Improved wireless coverage Antaira Technologies’ ARS-7234-AC-T is designed for industrial and enterprise indoor wireless access applications and also allows the user to position the wireless antenna in a better signal-broadcasting location for improved wireless coverage and signal strength or simply in a more convenient location. While both ARX-7234-AC-PD-T and ARY-7234-AC-PD are designed for outdoor wireless access applications and are IEEE 802.3af/at compliant. The difference between ARX and ARY is that one is made of IP67 rated metal housing and the other is made of IP67 rated plastic housing. All three wireless units are embedded with Qualcomm IPQ4029 Quad-Core chipset and supports high-speed data transmission of up to 867Mbps. All three industrial wireless units are capable of operating in different modes, which makes them suitable for a wide variety of wireless applications including long-distance deployments.
Hikvision, the supplier of innovative security products and solutions, announces its first ever Technology Partner Day to be held in Istanbul, Turkey, on November 28. The event will showcase integrated security solutions developed by Hikvision in collaboration with its certified technology partners, as well as provide a forum for prospective partners to explore development opportunities for new solutions by taking advantage of Hikvision’s vast resources. The Hikvision Technology Partner Day is designed to appeal to companies competing in a variety of vertical markets and industries. Customers can also explore the latest security technology developments and industry trends at the event. Innovative turn-key solutions Customers can expect to view demos of the cutting-edge products and solutions delivered by Hikvision and our partners" Adler Wu, Global Technology Partner Alliance Manager at Hikvision, says, “We’re excited to bring the first ever Technology Partner Day to Istanbul. The Technology Partner Day demonstrates how Hikvision continues to seek new possibilities for working with partners to provide end customers with innovative turn-key solutions.” “At the event, customers can expect to view demos of the cutting-edge products and solutions delivered by Hikvision and our partners and explore how to grow their own businesses with local support and service from Hikvision.” Hikvision is showcasing technology and solutions co-developed with 14 certified technology partners. Examples include: An AI storage solution from global partner Seagate – Seagate’s SkyHawk AI hard disk drive (HDD) combines Hikvision technology to deliver AI-enabled video surveillance solutions. Recognition systems – As global No.1 IP based video management software (VMS) for last 10 years in a raw, Milestone Systems the real open platform works with Hikvision to deliver AI-enabled facial recognition and automatic number plate recognition (ANPR) solutions as well as supporting 1.000+ Hikvision devices. The system builder program will also demonstrate the latest integrated solution with Hikvision surveillance servers pre-loaded with Milestone VMS software. Technology from AxxonSoft – This technology sees metadata integrate with Hikvision deep-learning network cameras and also integrates Axxon software with Hikvision’s access control system and surveillance servers. AxxonSoft is a developer of smart integrated security and video surveillance systems. Fire alarm system integration in smart buildings - the fire alarm system partner Mavili cooperated with Hikvision and developed fire alarm system plug-in integration with HikCentral VMS platform. This integration enables operators to monitor and control fire alarm systems via HikCentral. Mavili is a manufacturer of fire and gas alarm systems with advanced integration solutions in smart buildings. An integrated perimeter security solution – Hikvision video surveillance integrates with a physical barrier system from Arma Kontrol, a manufacturer of anti-terror security systems. Integrated access control - An integrated solution between the Hikvision HikCentral VMS platform and technology from Makim, a local access control systems partner. Integrated security solutions In addition, customers can expect to discover more about integrated security solutions from Hikvision partners Özak, Optex, IPS, Agent Vi, Elsight, WAMA SOFT, Phoenix Contact, and Ivideon. The Technology Partner Day has the potential to give many more companies a brand new platform to help them co-market their solutions. “We’re always striving to bring added value to our customers worldwide and partnering with other companies is a great way to do just that,” says Adler Wu. “We’re looking forward to showcasing the significant value of our existing technology partnerships, and to opening the door to further new and exciting collaborations.”
Moxa Inc., a provider of industrial communications and networking, and Trend Micro Incorporated, a provider cybersecurity solutions, announce they have executed a letter of intent relating to the formation of a joint-venture corporation-TXOne Networks, which will focus on the security needs present in the Industrial Internet of Things (IIoT) environments, including smart manufacturing, smart city, smart energy and more. Historically, Information Technology (IT) and Operations Technology (OT) have operated within industrial organisations as isolated and independent networks with different teams, objectives and requirements. Securing the entire ecosystem TXOne Networks combines these strengths and responds to the growing security needs of industry Organisations are teeming with machinery and devices that were not originally designed for connectivity to the corporate network, which means they often lack the ability to be easily updated or patched for security measures. There is a critical need to secure these devices, identify clear ongoing ownership, and to provide a holistic view across the broadening attack surface within enterprises. Trend Micro, majority owner in TXOne Networks, identified the potential challenges faced by IIoT stakeholders early on and has been working on several fronts to secure the entire ecosystem, from data centre to device. Moxa Inc. brings more than 30 years of experience in industrial networking and protocol expertise. TXOne Networks combines these strengths and responds to the growing security needs of industry, such as smart factories that require a unified solution for delivering deeper visibility into both devices and protocols. Partnering with Moxa These complicated environments are made up of multiple layers requiring protection that sits in and between IT and OT. The responsibility for the security of these combined layers is traditionally unclear. "I'm excited about this venture and how Trend Micro continues to take diverse yet focused growth steps that allow our teams to remain concentrated on core strengths while giving room to better serve customers and advance into new markets," said Eva Chen, Chief Executive Officer for Trend Micro. "Partnering with Moxa will combine more than 60 years of expertise to accelerate our ability to view and secure the extended enterprise including these important but often overlooked OT environments." Reinforced business model Trend Micro brings IT channel partner strength while Moxa brings OT channel partner strength TXOne Networks will build security gateways, endpoint agents and network segmentation to secure, control, and provide visibility of operational technology and equipment. Unlike some solutions focused solely on protecting assets nearest to the IT layer via detection, TXOne Networks has expertise closest to the OT layer and will provide proactive, timely and easily implemented solutions to secure the Industrial Control Systems (ICS) world. In addition to investing intellectual capital, funds and dedicated headcount, each parent company lends complementary channel expertise. For its part, Trend Micro brings IT channel partner strength while Moxa brings OT channel partner strength. Together these reinforce the business model and geographic territory targets. Reducing operational risk TXOne Networks will be led by Dr. Terence Liu, Trend Micro Vice President and former CEO of Broadweb. With experience building both products and teams, Dr. Liu will bring nearly 20 years of security product expertise to this new team. "With this joint venture, Moxa and Trend Micro will position TXOne Networks as a global leader in the industry to create effective IIoT security solutions that help ensure that IIoT applications and critical infrastructures are secure," said Andy Cheng, Strategic Business Unit President for Moxa Inc. "Industrial automation customers around the globe will be able to reap the benefits of having a holistic OT/IT security solution to protect assets and reduce operational risk." Raising security levels TXOne solutions also will enable OT customers to optimise network infrastructure for more IIoT opportunities TXOne solutions also will enable OT customers to optimise network infrastructure for more IIoT opportunities. They will benefit from Moxa's expertise in building reliable networks to bring more legacy and disparate networks into on industry-grade Ethernet backbone and raising the security level of the entire network's communication to help drive nonstop productivity and cost reduction. Professional services will also be provided including security risk assessment, security breach response, and access to threat intelligence from Trend Micro Research and its Zero Day Initiative (ZDI). "In a world where attacks are getting more persistent and sophisticated, while organisations are struggling with skills shortage and alert fatigue, these two groups are joining forces to successfully secure enterprises around the globe," said Dr. Terence Liu, General Manager, TXOne Networks. "I am eager to pursue the opportunities and challenges this team will tackle in the months and years to come."
Shaking hands, exchanging business cards, and making meaningful business connections with exhibitors were 8,420 trade visitors from both government and commercial sectors who roamed across 7,000 sqm of exhibition space at the Bangkok International Convention and Exhibition Center. “Smart city was an overarching theme at this 6th edition of the fair,” said Ms Regina Tsai, Deputy General Manager of Messe Frankfurt New Era Business Media Limited. “This, together with three concurrent events for fire & safety, smart home, and info security, ensured that all of the market’s most important needs were covered.” Understanding market Exhibitors at this year’s fair came from 16 different countries and regions and included some of the providers of security technology “The feedback from visitors and exhibitors alike on the quality and comprehensiveness of the show has been highly encouraging, and the general consensus is that there is still huge potential for growth in the Thai security industry, particularly in light of the construction taking place across the country.” Bidding to tap into the huge potential of the Thai market, exhibitors at this year’s fair came from 16 different countries and regions and included some of the providers of security technology. Dahua, Full Enterprise, Great Lite, Hikvision, HIP global, JVCKenwood, Konica Minolta and ZKTeco were all in attendance with a selection of the latest video surveillance, access control systems and smart city solutions. Ian Shi, Dahua’s overseas business manager for Thailand, spoke about how the company’s participation at Secutech Thailand allows them to deepen their understanding of the market: Smart city products “Secutech Thailand is the most professional security show in the country. All of the big brands are here and this year we can see customers from many different vertical markets, including the government. For this reason it is a very fruitful exhibition for us to gather market information and understand customer demands. Our surveillance systems can carry out facial and number plate recognition through the use of artificial intelligence. Given that the government is continuing to plan for Thailand 4.0, we see many opportunities in the future for our smart city products.” The smart city theme was also featured at two international pavilions from Taiwan and Singapore. NewDVR, a Singaporean company that specialises in cloud based solutions for smart city were participating at the show for the first time this year in order to launch their smart community solution to property developers. Big property developers The market in Thailand at the moment is definitely embracing the smart city concept, and we are positive about the future outlook" The company’s Regional Product Manager, Mr Jonathan Chan said that the market for their solutions is primed for growth and that Secutech Thailand is an excellent way for them to reach potential partners: “The market in Thailand at the moment is definitely embracing the smart city concept, and we are positive about the future outlook. Secutech Thailand gives us a great platform from which to connect with big property developers and partners such as Sunsiri, Design 103 and many more.” With so many different high-tech solutions on display across the fairground, the show was an excellent one stop sourcing platform for trade visitors from across the ASEAN region. Mr Aibert Josha Sainz, a system integrator and IT manager travelled to the show from Laos in order to find the best access control and surveillance systems for his projects. Comprehensive exhibition “I’m involved in security software integration and I’m here at the show to find CCTV and access control systems that can integrate with our software. This is my first time at Secutech Thailand, it’s a very comprehensive exhibition. Whether you are in the smart city, smart home or smart building sector, whatever you are looking for you can find it here.” The excitement surrounding the smart city, smart home and smart building sectors was equally palpable with regards to Thailand’s fire and safety market. Mr Joji Jose, Marketing Manager of Al Khoory Pumps, a first time exhibitor at the concurrent Fire & Safety Thailand event, recognised the fair as an ideal gateway for international suppliers to enter the market: Gain new contacts Thailand is a country where a lot of construction is taking place and for this reason we see huge potential in the market for our products" “Thailand is a country where a lot of construction is taking place and for this reason we see huge potential in the market for our products. We manufacture fire pumps in Dubai and by participating at Secutech Thailand we are able to promote our brand, gain new contacts, find the right distributors and gather valuable market data.” Another exhibitor to speak in positive tones about the fire and safety market was Mr Ian Brough, General Manager of Raidrop International: “This is the first time we’ve exhibited at Secutech Thailand. We’re a UK manufacturer of fire protection products. The Thai government has enacted some quite strict fire and safety regulations which helps us because our products are all internationally certified.” Educational seminars “Exhibiting at Secutech Thailand allows us to develop our presence in the market and find distributors. The visitor flow this morning has been very good and we have been able to gain plenty of new contacts.” While business contacts were being made in the aisles of the exhibition hall, a series of nine educational seminars and events were also taking place. With the IoT and digitisation as central themes, the events illuminated the development opportunities for Thailand’s smart cities. Just one of many highlights was the well-received Thailand mayor’s summit, which involved a panel discussion on the key requirements for smart city development and sustainability. Valuable insights about info security, NB – IoT, smart policing, smart building technology and hotel security could also be gained through the fringe programme. Safety certification regulations Mr Apichart Prasitnarit, a speaker at the ‘Realtech: IoT for Smart Buildings’ seminar and President of the Real Estate and Partnership Trade Association, spoke about how Secutech Thailand’s fringe events help to spark new business growth: These seminars are so important for spreading ideas and informing stakeholders about new technology in areas such as the IoT and cloud computing" “These seminars are so important for spreading ideas and informing stakeholders about new technology in areas such as the IoT and cloud computing. Through the seminars, attendees can pick up new ideas which they can then apply to their own businesses. This in turn can stimulate growth within the security industry.” In addition to spotlighting new opportunities, several concurrent events also dealt with the fire and safety challenges that have emerged due to urbanisation. The government has enacted stricter fire and safety certification regulations but there remain large issues with non-compliance. Importance of certification Mr Lothar Sysk, Chief Representative of VdS, a security and fire safety certification provider, spoke about how attending Secutech Thailand’s fire and safety forums have helped him to spread the word on the importance of certification: “The seminar is vital for engaging directly with local stakeholders. Even though we have an Asian representative office in Shanghai, VdS is still not very well known in Thailand, so by speaking at the seminar today, we are not only able to promote our brand, but we can also spread the word about the importance of certification, which is a hot topic now in Thailand. I definitely intend to return again to future Secutech Thailand shows.”
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies acquires Arecont Vision after bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion acquires access control company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilise power over ethernet, making them easy to install and cost effective as they utilise existing customer infrastructures. The company is based in Boulder, Colo. 5. HID buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam announces acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal acquires U.S. Security Associates Allied Universal, a security and facility services company, finalised its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT acquires Red Hawk Fire & Security (and others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies continues to acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security along the way. I started really focusing on physical from a cyber standpoint about 10 years ago. I got into ethical hacking about 8 years ago, and then worked on putting it all together. There wasn’t a roadmap, so I had to build a methodology which I now share with other hackers, end users and law enforcement. I spend all my time either in the lab building success models, methods, and testing them out in some of the largest customers or agencies in the world for validation and improvement. Also, a chunk of my time is spent re-engineering security assessment and controls for end users or validating vendors on their behalf from a unique viewpoint that’s not (yet) typical in the industry. Q: How well prepared is physical security overall against cyber threats? Gold: Not well at all. While security is imperfect anywhere, much of the practices and designs have critical defects and overlook either best practice or fundamental application security principles. I’d say that the industry is very wide open for exploitation that doesn’t take much sophistication to execute. Breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII) Q: What things stand out to you along your journey regarding the changes that you are seeing on this topic? Gold: Culture. Over the years, the industry (and most end users) have been dismissive of my findings. Industry culture hasn’t been aligned to embrace the topic and make requisite improvements that are needed to achieve “good security.” However, I’m finally starting to see that change – quickly and at scale. It doesn’t mean that we’re close to “good,” but rather reached the inflection point of change – and I’m rather pleased about it. Breach disclosure laws has resulted in IT getting a lot of media attention in comparison to hacks made against physical security Q: D6 does a lot of research in this area. What is the analysis behind the recent push for cyber security in physical security? Gold: First, it must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it. Industry sentiment has been that breaches in physical security don’t happen or that there’s little impact.It must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it Both are false. Mainly, IT gets all the media attention with breaches for two reasons; 1) breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII), and 2) there is really poor detection (mostly non-existent) against hacks in physical security, so they go unrecognised. On the other side, as physical security systems increasingly resemble an IT architecture, so does their risk profile. As it expands to mobile, cloud, IOT and intelligence - InfoSec and auditors are taking a look and are alarmed at what they’re seeing. Before you know it, the scrutiny is cutting pretty deep, pressure for alignment becomes intense, and vendors feel the pinch on the sales cycles. It’s not a comfortable position for anyone. Q: What will be the projected impact? Are practitioners seeing the whole picture? Gold: No, and this area is probably the most important takeaway of this interview. The industry is where InfoSec was about 15 years ago in their journey, except we have an additional headwind to deal with – culture change. This industry tends to rely more on trusted relationships than validating the recommendations are being provided. There are too many prevailing misconceptions, that unless remediated, investments won’t be as effective as expected. Q: What do you believe are the top misconceptions? Gold: Well, this is a longer topic, but here’s a sampling that cuts across different areas. Regarding hackers: A misconception is that they’re generally not interested. Hackers are increasingly very interested. When I teach a workshop at a hacker conference, it’s usually the quickest to fill up and go to wait list (within a couple hours). Regarding attacks: A misconception is that attacks are executed directly against the target system. Example, their goal is to get into VMS and attack it directly. The reality is that they’re more commonly dynamic where physical is part of a larger attack and its role is an easier gateway to another system (or vice versa, with many hops). Regarding protective measures. The most prevalent mistake that the industry is currently making is too much focus and reliance on air-gapping networks or locking ports. This is only a slice of the attack surface and there are various ways to get around it. There’s a heavy price to pay for those that that rely too much on this strategy since its often accompanied by few mechanisms to deal with actors once they do get in (and they definitely will). Regarding the value of exploiting physical security. Too often perceived as low value. In our white paper we review many of the things that hackers can do, what they gain, and how it can impact the overall organisation. It’s far broader and deeper than most. Q: What are the top things that need to change in the industry? Gold: First, culture. This can be answered by adopting the same principles as InfoSec. From an execution standpoint, the industry needs to change how they perform risk assessments.At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference Industry practices, including certifications, are significantly outdated and don’t reflect a methodology that accurately considers cybersecurity, actors, methods, and proactive remedy. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference. End users that don’t re-engineer their practice, will be very limited for meaningful cybersecurity improvement. One of the changes needed in the industry includes how risk assessments are performed Q: Generally, what advice do you give to clients on steps to move their cyber security to the next level? Gold: Don’t operate like a silo anymore. Transition from industry “common practices” to best practices that can be validated. Rely less on previous relationships and more toward domain competence. Collaborate with the CISO to a principled, goal-oriented and metrics-based approach. Embed an InfoSec person on the physical team. Present priorities and risks jointly to the board within an overall risk portfolio. Invite scrutiny from auditors. Get a red team performed once a year. Until you do the last step, you don’t really know where you stand (but don’t do it until the other things are done). Last, set the bar higher with vendors to support these improvements or their products will just end up being weak link. Q: What type of challenges do you see and any advice on how end user and integrators can overcome them? Lessons learned? Gold: There are too many specific domains across cybersecurity – it’s not just a network security resourceFeedback I get from integrators is that they’re struggling to figure out how to deliver expertise to their clients in their area. They’re somewhat overwhelmed with the complexity, becoming an expert or how expensive it is to hire and maintain those skilled resources. My best advice is not to do either. There are too many specific domains across cybersecurity – it’s not just a network security resource. Not even the large integrators have the right bench, and unfortunately, they’re just further down a doomed path than smaller integrators. Form a partnership with boutique cybersecurity firms that have multiple specialists. Negotiate rates, margins, scope, and call on them when needed. It won’t come out of your bottom line, the results will be better, and the risk will be extremely low. You’ll learn along the way too. Q: Anything notable that your research is uncovering in this area that might not be on people’s radar yet? Gold: Yes, quite a bit. Our Annual Industry Assessment Report goes through every segment. We’re making pretty bold statements about the future and impact, but we’re confident. One thing that stands out is how intelligence (and the swath of subsets) will impose stringent demands on physical security due to attribute and data collection (for analysis) which will absolutely require privacy compliance, integrity, and controls. It will even shape organisations that might not care about cybersecurity but are prioritising function. Q: Where can readers learn more about your perspectives on this topic? Gold: Blogs on the D6research.com website. Our annual report. Val Thomas of Securicon and D6 have collaborated on a three-part cybersecurity in physical white paper series. It goes into all of this in detail, as well as remedy.
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminaries and experts for SIA Honors Night, an annual event featuring a cocktail reception, a gala dinner benefiting Mission 500, engaging entertainment and an awards ceremony recognising industry leaders. Sold-out event SIA Honors Night 2018 was a sold-out event held at the Current at Chelsea Piers. The awards presented at SIA Honors Night 2018 were: SIA Progress Award (presented by SIA’s Women in Security Forum) – Eddie Reynolds, president and CEO, iluminar Inc. Women in Biometrics Awards (co-founded by SIA and SecureIDNews and co-presented with sponsors FindBiometrics, IDEMIA and SIA’s Women in Security Forum) – Kelly Gallagher, senior account manager at NEC Corporation of America; Lisa MacDonald, director of the Identity Management Division in the Office of Biometric identity Management at the U.S. Department of Homeland Security; Colleen Manaher, executive director of U.S. Customs and Border Protection; Lora Sims, senior biometric examiner at Ideal Innovations, Inc.; and Anne Wang, director of biometric technology research and development at Gemalto Cogent SIA Insightful Practitioner Award – Guy M. Grace, Jr., chair of the Partner Alliance for Safer Schools Steering Committee and director of security and emergency planning for Littleton Public Schools in the Denver suburb of Littleton, Colorado Jay Hauhn Excellence in Partnerships Award – Larry Folsom, co-founder and president, I-View Now George R. Lippert Memorial Award – Pat Comunale, retired security industry veteran, former member of the SIA Board of Directors and former CEO and president for Tri-Ed Distribution, an Anixter company Standout keynotes SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States Honors Night guests enjoyed keynote remarks from Bonnie St. John, a Paralympic ski medalist, Fortune 500 business consultant, Rhodes scholar, former White House official and best-selling author. St. John discussed her journey to become the first African-American ever to win medals in Winter Olympic competition despite having her right leg amputated at age five and shared her top lessons from mentors and her advice for cultivating resilience. SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States; each year, SIA Honors Night raises funds for Mission 500. SIA presented 26 engaging education sessions through the SIA Education @ ISC East program, including two standout keynotes and four hands-on workshops. Hundreds of conference attendees participated in these sessions, with impressive speakers like Valerie Thomas, ethical hacker and executive consultant at Securicon; Pierre Bourgeix, president at ESI Convergent; Scott Swann, president and CEO of IDEMIA National Security Solutions; and Jumbi Edulbehram, regional president – Americas, Oncam. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event Confronting emerging threats Highlighted education sessions at this year’s conference included: Friend or Foe? Technology Disruption and the Physical Security Industry, a keynote address by Philip Halpin, senior vice president and head of global security at Brown Brothers Harriman, one of the country’s oldest and largest privately held financial firms 21st Century Best Practices: Reporting From the Front Lines on How Law Enforcement and the Security Industry Are Confronting Emerging Threats, a keynote address by James A. Gagliano, a retired FBI supervisory special agent, CNN law enforcement analyst and adjunct assistant professor at St. John’s University Cybersecurity professionals ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo Additional cutting-edge topics covered in the education sessions included the move to smart cities, convergence in the security industry and the use of artificial intelligence in video analytics. ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event, which featured a presentation from world-famous hacker Kevin Mitnick, insights from Dave Hogue of the National Security Agency’s Cybersecurity Threat Operations Center, a discussion on the cyber skills shortage gap and ways to attract, develop and retain talented cybersecurity professionals and more. Handle sensitive data Additional events at ISC East 2018 included: A breakfast presented by ISC Security Events and SIA’s Women in Security Forum featuring a panel discussion celebrating women in security and supporting the participation and advancement of women in the industry Paid hands-on workshops providing cutting-edge information and valuable insights on the most current business trends, technologies and new developments in security Free exhibitor product training sessions sharing live, in-depth demonstrations A meeting with SIA’s Data Privacy Advisory Board, which provides information and best practices to help SIA members handle sensitive data in a safe and secure manner to protect the personally identifiable information of their employees, partners and customers from potential breaches
In a layered approach to security, the outermost layer increasingly might refer to an area outside a fence line. The sooner a facility is alerted to a possible threat, the better, and when a threat reaches inside a facility’s fence, it may be too late to mitigate it. Security directors need situational awareness that extends outside the facility and provides the ability to intercept intruders before they become a threat. Zones of interest, or buffer zones, outside a facility’s fence line are particularly important for security professionals at facilities such as refineries, electrical stations, chemical plants and other elements of critical infrastructure. Ground-based radar systems are expanding the capabilities of buffer zone surveillance at economical prices and with low false alarm rates. Use of multiple radar streams and “behaviour filters” to analyse moving targets has demonstrated its capability in such applications to provide an early warning of intruders and/or to guide pan-tilt-zoom cameras (based on GPS coordinates) to provide real-time images of intruders before they get inside a facility. “What we’re seeing is an upswell in interest and implementation,” says Logan Harris, CEO of radar system supplier SpotterRF. “Security managers are saying it isn’t enough to have sensors on the fence line. Now we need situational awareness of what’s going on around a facility, and to intercept it before it becomes a threat.” The flexibility of behaviour filters allows adjustments to define specific behaviours and ignore irrelevant data. The technology has particularly gained attention in the utility industry, which is looking for a means to mitigate risks such as an attack last year on PG&E Corp.'s Metcalf electric power transmission station near San Diego, Calif., involving a sniper who fired a high-powered rifle for 19 minutes and knocked out 17 giant transformers that supply electricity to Silicon Valley. This August, the same electrical substation was breached for a second time, despite the utility’s efforts to bulk up security after the initial attack. “A lot of security risks, especially internationally, may be a matter of life and death, and two minutes’ advance warning can make all the difference,” says Harris. “That’s where we come in, giving them that extra early warning.” The simplified system could be installed by anyone with experience setting up an IP camera, Harris says. "Security managers are saying it isn’t enough to have sensors on the fence line. Now we need situational awareness of what’s going on around a facility, and to intercept it before it becomes a threat" SpotterRF has teamed with Sensei Solutions to provide a perimeter security approach for electric utilities. Combining SpotterRF radar with Sensei’s sensor fusion software enabled false alarms to be reduced to zero after processing 77,000 events during an eight-week trial period, according to Harris. Displaying its technology at ASIS, SpotterRF saw a lot of interest among utilities and oil and gas companies, and there were some other applications mentioned, too. For example, Harris says SpotterRF can help prevent remotely controlled quadcopters (or drones) from delivering contraband over a fence and into a prison. “They need something that can detect small objects in the air, and our radar is suited for that,” he says. SpotterRF is also a component of the perimeter protection of Mount Rushmore National Memorial in South Dakota, where it helps to protect wide open spaces and rough terrain. Mount Rushmore covers more than 1,200 acres that require constant monitoring, and SpotterRF radar amplifies the effectiveness of existing systems, which include infrared (IR) cameras, video analytics and other intrusion detection technologies. The company’s newest, widest-coverage radar system – the SpotterRF C950 – is a trim five pounds and provides 300-acre coverage (twice the previous area). There are no moving parts to maintain as with rotating radar that provides similar coverage potential. Weather conditions such as rain and snow can negatively impact the effectiveness of video analytics systems, and low temperature differentials (such as when a human walks across hot pavement) can undermine the effectiveness of thermal cameras for early detection. “Radar uses a completely different method, transmitting RF waves, bouncing off targets and then being evaluated. It’s all solid-state, we scan an entire area seven times a second. We collect more data and use efficient algorithms to identify and rule out objects that are not of interest (such as the wind blowing trees). This reduces false alarm rates.” A SpotterRF mobile kit can be used to protect a smaller substation in less than an hour, and weighs less than 50 lbs. Magnetic clamps make installation quick; the system plugs into the wall, uses a cellphone modem and can be operating in less than an hour. Security system manufacturers are integrating their systems with SpotterRF; for example, Honeywell highlighted its Vindicator system’s integration with SpotterRF at the ASIS 2014 trade show.
A Japan based technological enterprise is working towards the formation of a technology corporate group. The company’s technologically advanced products include a diverse range of products that are used on land, sea, air and even space. The company offers a range of environmental and recycling plants, industrial plants to automobile and infrastructure equipment. And at every step, Kawasaki pays the utmost attention to humankind and the environment. This century old company has been able to establish a firm foundation as a technological enterprise. The company’s automobile division, which makes it one of the pioneer automobile companies, is spread on a global scale. Crystal clear images They also wanted to monitor how the employees interacted with customers, cleanliness of the premises The company having franchise stores operated by respective owners in India was concerned about the consistency in branding and customer service across these stores. They wanted a solution that could enable them to view the stores from a central location, specially the front end where their premium vehicles were displayed. They also wanted to monitor how the employees interacted with customers, cleanliness of the premises, whether the products were displayed in the right order, branding in the store and other process compliances. But at the same time, they did not want to invest in recorders as the numbers of cameras at individual locations were very limited. Matrix installed high resolution IP cameras at each store. These cameras provided crystal clear images of every corner of the store. This enabled the company to monitor every aspect of brand management such as order of vehicles, customer service, cleanliness, behaviour of employees, etc. Geographically separated locations A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to itCameras were installed at each location based on the requirement and connected to a network switch with the help of CAT6 cables. Since there was a private connectivity between all the geographically separated locations of the company, all cameras at various locations were configured locally with VPN functionality (same class of IP address), and were viewed at a central location without port forwarding. A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to it. This allowed streams from all twelve locations to be viewed on a single screen. In this way, Matrix helped the automobile giant maintain process compliance in its stores throughout the country. Centralised Control Better Brand Management Elimination of Compliance Check Costs Enhanced Security Employee Discipline Matrix products used: SATATYA CIBR13FL40CW: 1.3MP IP BULLET CAMERA SATATYA CIDR13FL40CW: 1.3MP IP DOME CAMERA SATATYA NVR24P: 24-CHANNEL NETWORK VIDEO RECORDER WITH 6TB STORAGE SUPPORT
The Hong Kong-Zhuhai-Macao Bridge relies on customised security solutions from Bosch to ensure safe operations. The world’s largest sea-crossing bridge was opened by Chinese officials late October 2018. Spanning 55 kilometres in length, the Hong Kong-Zhuhai-Macao Bridge directly connects Hong Kong to Macao and then to the Chinese city of Zhuhai for the first time. At a total cost of USD 20 billion, it is a major boost for China’s Greater Bay Area, an emerging industrial and technological hotbed that is home to 68 million people and a showcase project for Bosch Building Technologies. Equipping critical infrastructures The large-scale project was built over the course of eight years using 400,000 tons of steel and includes underwater tunnels and two artificial islands that serve as customs ports. Ensuring the security of these two islands, where drivers need to present special permits to use the new bridge and pass customs checkpoints, was a priority from the start. Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms With a proven track record of equipping critical infrastructures such as airports, hotels, commercial buildings and underground metros, Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms, as well as public address and voice evacuation systems. On the island between Zhuhai and Macao, the Bosch partner Shanghai SAGA Electronic Technology Co., Ltd. installed more than 5,700 Bosch loudspeakers and over 260 amplifiers which are all managed via the PRAESIDEO Digital Public Address and Emergency Sound system. Custom-ordering solutions Fulfilling a key customer request, the installation incorporates 15 different models of ceiling, wall mount, and line array speakers to blend in with the facility’s modern interior. Furthermore, Bosch was able to match Macao’s local standards by custom-ordering solutions with British power cord, programmed with graphic interfaces in traditional Chinese lettering. On the island outside of Hong Kong, which is home to a customs clearance port, Bosch partner Pro-United Co., Ltd. installed 2,200 public address speakers of various models, including outdoor speakers for the travel inspection building. Experts also adjusted 200 vari-directional array loudspeakers to balance sound variations from different building materials. Live voice announcements “The Bosch technical team and partners used professional software to simulate the sound pressure level of a specific area and comprehensively simulate the entire project to ensure that the selected products can meet the requirements of different areas in the actual application,” said Lin Lizhi, Bosch Building Technologies. Bosch also covered the island with more than 2,000 HD cameras including the FLEXIDOME, DINION, and AUTODOME series. The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points Monitored from a security control center on the Hong Kong-side of the island, these cameras support 24/7 surveillance of the customs clearance port, travel inspection building, Immigration Department and Hong Kong Customs Office. The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points, while multiple sets of intrusion alarm systems protect personnel and property. Broad customisation options “We added the supporting intelligent call station PRAESIDEO, which is usually used for airport projects, in order to ensure that the staff can directly perform voice broadcasts throughout the call station during operation, thus making the security management more convenient,” said Wang Yiping, Deputy General Manager of Shanghai SAGA Electronic Technology Co., Ltd. The high-profile infrastructure project highlights the flexibility and broad customisation options offered by Bosch Building Technologies as a one-stop solutions provider. Now that it is fully operational, the Hong Kong-Zhuhai-Macao Bridge is already considered a key asset in the Greater Bay Area, also known as ‘China’s Silicon Valley’. The bridge reduces the travel time between Zhuhai and Hong Kong from four hours to a mere 30 minutes. It also creates a new gateway for travellers between vital transportation hubs such as Shenzhen and Hong Kong airports with the integrated Bosch security solutions ensuring a safe passage.
Property is one of the biggest targets for crime in the UK, especially open land. There are thousands of acres worth of property across the UK which aren’t effectively secured, as a result of which they have become hot-beds for crime, anti-social behaviour, and not least fly-tipping. Security therefore must be a top priority for property owners, too many of whom tend to favour traditional methods such as fencing or hiring security guards. But, these methods come with a premium budget, with manned security running at a cost typically of some £300 per day. Nor is it possible to guarantee that every inch of a property is monitored. An increasingly adopted solution is Ad Hoc Property Management’s Smart Tower Security System and Smart Alarm System. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards Ad Hoc Smart Camera Security Haringey Council contacted Ad Hoc Property Management after one of its industrial sites, Rosebery Industrial Estate in London, was repeatedly being targeted by fly-tippers over the course of many years. Every time the property was dumped with waste, it was costing the council hundreds of pounds to have their waste contractor called out to clean-up. By November 2017, they had expensed literally hundreds of thousands of pounds. By the end of the month the first Ad Hoc Smart Camera Security Tower was deployed, since then costs and incidents have plummeted. In fact, there have been no major incidents and local residents and tenants alike are delighted, welcoming the improved local environment. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards, and a 12x digital zoom to enhance optical performance. Using state-of-the-art SMART technology (the same technology used in monitoring US Defence Centre, The Pentagon), the tower boasts a 360 degree camera which can be programmed to move zones at set intervals for 24/7 monitoring. Utilising wireless technology, the camera is able to filter large objects from those that are small, ensuring the alarm is only triggered when there is a clear threat. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK" Ad Hoc's property security solutions “Open land is one of the biggest targets for waste dumping, but it doesn’t have to be. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK, preventing anti-social behaviour and, more importantly, reducing opportunity for property-related crime,” said Darren Tubb, General Manager, Ad Hoc Security UK Limited. Land owners aren’t the only ones who can benefit from Ad Hoc’s security solutions; property owners of retail spaces, industrial buildings and homes who traditionally look at hiring in security guards, can benefit too, deterring fly-tipping and other anti-social crimes. As it stands, if a property is fly-tipped and no one is caught, it is the responsibility of the property owner to remove the waste legally at their own expense, which means hiring in a company licensed to remove these materials. However, as more property owners become aware of the technology available to them through Ad Hoc, not just in protecting the property but in helping police to identify the culprits, we could see property damage and fly-tipping become a thing of the past.
As a wholly-owned subsidiary of Tebian Electric Apparatus Stock Co., Ltd. (TBEA), Shenyang Transformer Group Co., Ltd. (Shenyang TBEA) is one of the largest transformer manufacturers in China, and a major exporter in the industry with manufacturing and R&D capabilities. Shenyang TBEA is the first transformer company publicly listed in China and has an annual productivity that has reached 30 million kilovolt-ampere (KVA). It is the only company that provides 840,000 KVA/500KV main transformers and converter transformers for the left bank of the Three Gorges Project. Shenyang TBEA has a world-class industrial park occupying 720,000 square meters for production of UHV AC and DC electricity transformers. Featuring dispersed entry points over a large area, the company needed a new access control system to safeguard the plant’s integrated factory, R&D building, administrative offices, elevators, mixed working areas and key equipment rooms. Access control system with TCP/IP connection Shenyang TBEA required specific technical features for the new physical access system including TCP/IP connection and high-speed processors In particular, stringent access control for the general manager’s office, financial department, conference rooms, elevators, and core mechanical room was mandatory and the new system needed to also perform time and attendance and data generation for night patrol. In addition to security and stability, the access control system needed to enable seamless integration with the plant’s existing security equipment from third-party vendors, and be interoperable with the cards already deployed in the field to save cost. To address these challenges, Shenyang TBEA required specific technical features for the new physical access system including TCP/IP connection and high-speed processors, as well as data generation and communication capabilities. In addition, each access point needed to execute all commands offline in case of network failure. Centralised web-based access control solution After a thorough analysis of Shenyang TBEA’s requirements, HID Global provided a comprehensive solution that included 17 VertX V1000 network controllers, 107 VertX V100 door/reader interfaces, 173 iCLASS R10 contactless smart card readers and ten iCLASS R30 contactless smart card readers. The new system leverages Shenyang TBEA’s existing TCP/IP network for a centralised, web-based access control solution that provides central monitoring, report generation, the ability to establish staff access level settings and visitor management. The security officer on duty can then verify the employee’s identity to prevent unauthorised entry, enhancing the efficiency and internal security iCLASS R10 and iCLASS R30 readers are installed at each access point and connected to VertX V1000 network controllers through the VertX 100 reader interface to transfer entry records to the host. Each entry point can still execute all commands when communication is lost with the central station. By integrating with the system software, the administrator can restrict staff access based on job function. For example, only authorised staff members are allowed to use the elevator to access specific floors. Enhancing security by preventing unauthorised entry HID Global’s solutions also meet Shenyang TBEA’s access control system requirements and perform the following functionality: Staff management: The solution is integrated with system software and main entrance and factory monitors. When a cardholder presents his/her card to the reader, the cardholder information and photo is displayed on the monitors. The security officer on duty can then verify the employee’s identity to prevent unauthorised entry, enhancing the efficiency and internal security. Enhanced Security: HID Global’s iCLASS readers and credentials deliver increased security with the readers’ data encryption and mutual authentication capabilities. Additionally, HID Global’s VertX networked access solutions enable access level settings and area control to prevent unauthorised entry to specific areas. All employees must present their cards when entering or leaving the main gate of the site, and the entry records are transmitted to the central server to further improve security management. Integration with surveillance and fire control systems When any abnormal alarm signals are received, the new access control system can activate a pop-up camera to perform video monitoring and screen capture Interoperability: VertX access control solutions are interoperable with a wide range of hardware and management software, enabling additional deployments such as time and attendance, remote area control, visitor management and more. The readers support the factory’s existing MIFARE credentials, offsetting the cost of swapping out all of the cards at once. Integration with other sub-systems: The solution can seamlessly integrate with multiple sub-systems such as surveillance and fire control systems. When any abnormal alarm signals are received, the new access control system can activate a pop-up camera to perform video monitoring and screen capture. For fire control, the system can determine the incident type and location and unlock emergency doors for evacuation in the case of a fire. Lifetime warranty on products and solutions “After our extensive assessment, we selected HID Global and its physical access control solutions for its leading technology and comprehensive product functionality. We had an experience where some HID Global controllers were accidentally submerged under water and the products still functioned properly without any defects, validating HID Global’s robust product design and quality,” said Mr. Yu Liuyi, project manager with Shenyang TBEA. “As a global leader in secure identity solutions, HID Global offers a lifetime warranty to their customers. HID Global and its channel partners has promptly responded to our requests and provided quality support to achieve satisfying results, eliminating our concern regarding post-sales service and support,” Liuyi added.
To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, a new smart IoT industrial park in Hangzhou has been put to use by Dahua Technology, a video surveillance solution provider. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Efficient information integration The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialised requests and ever-changing reality.The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production(preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning high-end devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools, etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. Fast processing According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35 multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. Dahua Smart Industrial Park provides the great benefit of internal synergy The faster speed also applies to the development of new molding, since Dahua Smart Industrial Park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organising system is supported by topnotch equipment, such as MAKINO high-speed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005MM, while also supporting CAD / CAM / CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days.Higher quality results in less likelihood for products to malfunction especially when they are used in critical situations Time- and cost-saving solution By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors, etc., all of which proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, not-allowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons: first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, Dahua has put together an effectively closed loop for quality control in the manufacturing process. Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example: it can process components, in metric size, as small as 03015(0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry.Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process Enhanced vision and intelligent analytics Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high-definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognise flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.In the future phase, this industrial park is expected to be more intelligent to enable a safer society and smarter living Safe society and smart living Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialised needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialised use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one. And in the future phase, it is expected to be more intelligent, to realise client-centred flexible production and to enable a safer society and smarter living.
National Business Crime Solution (NBCS), a not-for-profit organisation that enables the sharing of data between law enforcement agencies and the business community in order to reduce crime, is celebrating the success of the very first Business Impact Reduction Day (BIRD)—also known as Operation BIRD—an industry-led initiative that is designed to target and manage the effect of business related crime activity. Police-assisted retail surveillance The initial exercise took place at Westfield shopping centre in London, where 51 security and loss prevention professionals from across the industry joined forces with the police service and retailers to target prolific and persistent offenders. The brainchild of NBCS, Operation BIRD was supported by the Metropolitan Police’s Business Crime Hub, National Business Crime Centre, Territorial Support Group, London Borough of Newham and Westfield Stratford City—all of which played a vital role in planning and executing the manoeuvre. The day began with a full briefing and the identification of persistent offenders, who were to be apprehended in a safe manner with no violence. In addition, a team of ‘super-recognisers’ from the Metropolitan Police was present to identify any other offenders on the police radar.Perhaps the most significant, and unexpected, result of the day concerned the apprehension of a 15-year-old female from the north of England Officers in this unit have the ability to instantly place a familiar face, a skill that some researchers estimate is present in just one percent of the population. Successful implementation with civil recovery Operation BIRD proved to be a remarkable success with 18 detentions and various actions including penalty notices, community resolutions and civil recoveries, as well as a number of arrests and charges. Perhaps the most significant, and unexpected, result of the day concerned the apprehension of a 15-year-old female from the north of England, who it transpired was the victim of child sexual exploitation and was being coerced into shoplifting. She is now under the auspices of the child protection authorities and currently in care. Retail security education and training NBCS managing director, Dan Hardy, commented, “The story of how this vulnerable young person came to be shoplifting in Westfield shopping centre was truly shocking. It has brought into sharp focus why safeguarding intervention requires sensitive and considerate handling when dealing with the victims of child sexual exploitation. "It has also highlighted the need for security service providers to educate their officers on this subject and implement consistent training. NBCS will be looking to drive this forward with its industry partners, while further Operation BIRD activities will take place around the country in places that NBCS intelligence suggests are crime hotspots.” Detective chief inspector, Georgina Barnard, leader of the National Business Crime Centre, was equally impressed with the results. She concluded, “Operation BIRD has proved what can be achieved when relevant parties join forces to target and prevent the impact of business related crime activity. I applaud NBCS for this initiative and look forward to working on similar activities in the future.”