Internet of Things (IoT)
Pulse Secure, a renowned provider of Zero Trust Secure Access solutions, announced that analyst firm Frost & Sullivan recognised Pulse Secure among the top ten NAC vendors by global revenue market share and one of six leading vendors to show market share gain. Frost and Sullivan market report identifies Pulse Secure among top 10 Network Access Control (NAC) vendors by global revenue market share. The 2020 Frost & Sullivan Network Access Control (NAC) Market, Forecast to 2024 report stat...
Axis Communications has introduced a body-worn camera solution, which the company says represents a natural extension of their corporate vision, business strategy and core competence. The new body-worn cameras and other elements of the system will provide Axis new opportunities to grow by tapping into existing and new customers. The fast-growing body-worn camera market is an attractive one, and Axis sees opportunities to extend the use of body-worn cameras beyond the current core market of poli...
Digital Barriers, a provider of edge-intelligent surveillance and security technologies, announces the release of a real-time remote fever scanning solution that adds remote monitoring to this capability. Fever scanning cameras help safeguard frontline workers against potential infection. The addition of Digital Barriers’ government-grade remote monitoring enables this to be carried out without the need for close human contact, thereby cutting the risk of transmission. Providing both a th...
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data centre, the IT department has complete control over network acce...
Arcules, innovators in integrated video and access control cloud services, announces the appointment of Bruce Nisbet as Senior Director of Sales. In this role, Nisbet will help guide the regional sales teams and develop strategic initiatives for expanding the reach of the company’s cloud-based services in key markets. With more than 30 years of security, video surveillance, sales and management experience, Nisbet has executed successful sales strategies and business development initiative...
Effective March 1, 2020, Michael Seiter (48) and Magnus Ekerot (51) have taken over newly established roles within Bosch Building Technologies. Michael Seiter has assumed the role of Senior Vice President, responsible for the Video Systems & Solutions business. Magnus Ekerot has joined Bosch as Senior Vice President, responsible for the global marketing of the company’s comprehensive Security offering as well as for sales coordination and product management of the Video Systems &...
GlobalPlatform, the standard for secure digital services and devices, publishes a new specification that simplifies the communication between embedded Secure Elements (eSEs) and connected devices. The specification now supports the serial communication interfaces – Serial Peripheral Interface (SPI) and Inter-Integrated Circuit (I2C) – that are widely deployed in smartphones, wearables and other internet of things (IoT) devices. Biometrics matching on SE The standardisation of the communication between eSEs and devices brings interoperability and flexibility to device manufacturers, comments Gil Bernabeu, Technical Director of GlobalPlatform: “The growing use of embedded SEs is driving usage of physical interfaces such as SPI or I2C. The APDU Transport spec helps device manufacturers to configure the device’s internal communication bus in advance, embed SEs into connected devices and optimise usage of their chosen protocols. This work will help to use eSE powered secure services to create more secure devices across all sectors globally.” The specification allows the transfer of commands between the device and eSE. This enables eSEs to offer additional value and uses cases to devices, such as device attestation, secure storage, biometrics matching on SE, and many more. It also supports the update of the secure services at any point in a device’s life cycle.
AAEON, a provider of IoT and AI edge computing solutions, is helping to power the pandemic response with the BOXER-6638U rugged embedded box PC. Featuring Intel Core i3 processors, the BOXER-6638U brings the power of industrial computing to mobile X-ray machines, used to perform chest X-ray scans of suspected COVID-19 patients. This vital equipment helps increase the speed and accuracy of diagnosis, and prevent the spread of the pandemic. The spread of Coronavirus disease 19 (COVID-19, previously known as “2019 novel coronavirus”) has had serious worldwide impact, becoming the largest and most widespread epidemic in the past century. The impact to human lives and global economies is severe. The workload and stress endured by the medical professionals on the frontline of containment and prevention is immeasurable. Alongside these medical professionals is the mobile X-ray machine developed by AAEON’s customers to help accelerate the diagnosis of diseases, saving time and effort. BOXER-6638U rugged embedded box PC The BOXER-6638U is equipped with the Intel Core i3 5010U processor, providing low power consumption At the heart of these mobile X-ray machines is the BOXER-6638U from AAEON. To integrate into this vital medical equipment, AAEON’s customers have strict requirements for specifications and testing. The BOXER-6638U meets these requirements and offers the additional benefits of being lightweight and easy to integrate into the device. With a fanless design and rugged construction, the BOXER-6638U has proven reliability with a failure rate below 0.2%. The BOXER-6638U meets the customer’s requirements for provide redundant communication methods to provide accurate data in real time on site. Meeting customers’ needs for flexibility and customisation is what drives AAEON’s business philosophy of developing and manufacturing industrial computers, and has for nearly 30 years. Intel Core i3 5010U processor The BOXER-6638U is equipped with the Intel Core i3 5010U processor, providing low power consumption and high performance. With rugged, fanless construction, it can operate in temperatures from -20°C to 60°C, and operate without errors in places with drastic temperature changes. In this fight to prevent the spread of the pandemic, AAEON products have been working effectively on the forefront" Compact and lightweight, the BOXER-6638U can easily integrate with new systems, or upgrade existing infrastructure. The BOXER-6638U offers I/O features including DisplayPort, two Ethernet ports and antenna hookups for wired and wireless transmission, two Mini-Card expansion slots, and storage with mSATA, HDD/SSD slots. Mobile X-ray machines “Our customers in China who specialise in manufacturing medical equipment purchased nearly a thousand BOXER-6638U box PCs, which were installed in mobile X-ray machines deployed to key hospitals,” said Alex Hsueh, Director of AAEON’s System Platform Division. “In this fight to prevent the spread of the pandemic, AAEON products have been working effectively on the forefront with several platforms and solutions employed in various applications. AAEON is proud to be a part of this ongoing effort and every member of the AAEON Team looks forward to our continued contributions,” Alex added.
Accellion, Inc., provider of the enterprise content firewall that consolidates, controls, and secures sensitive third party communications, announces key capabilities that protect the sensitive data remote employees access, share and collaborate on while working from home. Hackers tap into a treasure trove of PII, PHI, and IP when they leverage home network vulnerabilities like weak passwords, unpatched software, and connected IoT devices such as smart TVs and virtual assistants. Now, confidential corporate information like contracts, financial data, and customer records become susceptible to unauthorised access as more employees begin working from home to contain COVID-19. Data protections at home With the Accellion enterprise content firewall, remote employees receive the same data protections at home that they have in the office. Accellion consolidates security across third party communication channels, including email, file sharing, enterprise apps, web forms, SFTP, MFT, and mobile. With Accellion, employees working from home utilise a single platform to share PII, PHI, IP and other sensitive information with complete security and control. Accellion also provides employees secure access to connected business systems Every file uploaded, downloaded, sent, and received is logged and auditable to demonstrate compliance with data privacy regulations like GDPR, HIPAA, CCPA, and more. Accellion also provides employees secure access to connected business systems like Salesforce, Oracle, Office 365, and SAP, as well as cloud and on-premises content stores like Box, OneDrive, and SharePoint. Employees upload, download, edit, and share confidential files of any size or type in these and other systems without requiring any content migration or a VPN. Enterprise content firewall As a result, employers avoid adding costly software licenses and configuring VPN accounts. “While the COVID-19 pandemic affects work environments, it must not impact workflows,” commented Jonathan Yaron, chief executive officer of Accellion. “The Accellion enterprise content firewall ensures organisations continue working seamlessly, securely, and in compliance with industry regulations, regardless of their locations.” Organisations know their PII, PHI, and IP is protected when employees work remotely because the Accellion content firewall provides: Multi-factor authentication Data encryption in transit and at rest A hardened virtual appliance Compliance with most data privacy regulations Auditable logs of all file activity Seamlessly scan file uploads with AV and your ATP Seamlessly scan file downloads with your DLP
Arecont Vision Costar (AV Costar), a globally renowned IP-based megapixel camera technology and video surveillance solutions provider, has unveiled multiple high performance cameras for the ConteraIP megapixel (MP) series. The four new models build upon the high performance, superior image quality, outstanding reliability, ease of installation, and competitive pricing that are the hallmarks of ConteraIP. “We’ve taken the most in-demand form factors from our proven MegaIP single, dual, and multi-sensor camera families to bring similar choices to our expanding ConteraIP series,” said Brad Donaldson, Vice President of Product Development at Arecont Vision Costar. “ConteraIP will now address an even wider variety of challenging customer requirements as these new NDAA-compliant cameras roll out in coming weeks.” ConteraIP MicroDome LX cameras Indoor models feature a built-in microphone, while the outdoor MicroDome LX includes integrated IR illuminators The newly unveiled ConteraIP MicroDome LX IP cameras offer customers the choice of indoor ultra-low profile flush mount models for discreet surveillance or compact surface mount versions for indoor/outdoor use. Indoor models feature a built-in microphone, while the outdoor MicroDome LX includes integrated IR illuminators. All MicroDome LX cameras deliver up to 30fps of megapixel video and include a motorised remote focus lens for rapid setup, with choice of 1080p (2.1MP) or 5MP resolution. The new ConteraIP MicroDome Duo LX offers twin, independent domes with motorised remote focus lens, each capable of up to 30fps of megapixel video. The Duo is ideal for indoor/outdoor applications such as coverage of hallways, walkways, and corners, or for monitoring ATMs or POS terminals where a 4-sensor Omni or panoramic camera may not be suitable. The compact platform brings models with 4 (2x1080p), 10 (2x5MP), or 16 (2x8MP) MP resolution choices, each with twin remote focus motorised lenses. ConteraIP Omni LX cameras AV Costar continues to build upon its legacy of surveillance industry leadership in adjustable-view multi-sensor models with the unveiling of the new ConteraIP Omni LX. The highly flexible remote-focus camera series offers 4 high resolution megapixel sensors with motorised remote focus lenses for easy installation and setup. Omni LX offers the choice of 8 (4x1080p) or 20 (4x5MP) megapixel resolution with the customer’s choice of interchangeable lenses. Each sensor can be adjusted to the perfect individual view then remotely focused. The Omni LX delivers up to 360-degrees of non-stop coverage of virtually any scene for complete situational awareness. The Omni LX reduces complexity and cost, using a single PoE IP cable, IP address, and VMS license (on most VMS systems) instead of multiples of each being required for individual single-sensor cameras. NightView low light technology and H.265 compression ConteraIP cameras offer enhanced WDR up to 120db for varied lighting conditions, NightView low light technology, and H.265 with SnapStream+ & M-JPEG support. Other common features are high frame rates, defog technology, on screen display, MicroSD card support (most models), and multi-streaming capability. Just as in the entire MegaIP camera family, all four of the new ConteraIP models include both NDAA (National Defense Authorization Act H. R. 2500) and ONVIF compliance, plus are IP66 environmental and IK10 impact resistance rated. 360-degree Fisheye Panoramic and multi-sensor cameras Existing ConteraIP models include compact single sensor 360-degree Fisheye Panoramic cameras With the addition of these newest megapixel models, the ConteraIP camera series covers an even wider range of video surveillance and security system needs for a wide range of applications. Existing ConteraIP models include the compact single sensor 360-degree Fisheye Panoramic cameras with built-in microphone and two award-winning multi-sensor cameras - the 4-sensor 180-degree Panoramic with integrated IR and the Omni LX Remote Setup, which features 4 remotely positioned and focused motorised sensors for the ultimate ease of installation and configuration with non-stop surveillance across up to 360 degrees of coverage. ConteraIP Indoor Dome and Micro Bullet cameras The ConteraIP family further includes single-sensor ConteraIP Indoor Dome and award-winning indoor/outdoor Micro Bullet, Bullet, and standard Outdoor Dome models. EX series Bullet and Dome models complete the ConteraIP lineup, offering choice of standard and optional advanced analytics. Visitors can see the newest ConteraIP series in action at the Costar booth, #8045, at ISC West 2020, which has now been rescheduled to July 20-22 in the Sands Convention Center, Las Vegas, Nevada, USA.
RFID technology is nowadays considered to be almost pervasive. Thanks to this technology, objects or even living things can be identified and localised without contact. In order to meet the increasing demand for RFID hardware components, GERA-IDENT has now significantly renewed and expanded its production. Ramin Hassan, Managing Director of GERA-IDENT GmbH stated that "Demand for the construction of customer-specific ID points and their basic components such as RFID readers and antennas has increased significantly", clarifying the reason behind the expansion of the production area. Development of identification products and systems Electronics research and development have been pushed forward throughout the market; GERA-IDENT is currently reinforcing the development of identification products and systems for customers, as well as cooperating with universities and R&D institutions. In order to be able to meet the increasing requirements, design competence has been enhanced with new software, whereas the electronics area has been expanded to include new manufacturing and testing possibilities. Additionally, internal prototype production has also been expanded. The assembly area is now upgraded and equipped with more space and technology. Furthermore, new employees have joined the GERA-IDENT team and new regional partners have been acquired for mold construction / sheet metal processing, painting as well as for electronic components. "Apart from the fact that we can operate our production completely and permanently in Germany, we are laying the foundation for our future in the IoT."
Malwarebytes, a globally renowned advanced endpoint detection and remediation solutions provider, has announced that it has hired Adam Hyder as its new Senior Vice President of Engineering. In this role, Hyder will drive Malwarebytes’ product development, innovation strategy, technical vision, and cloud operations. “Adam is known for being a gifted technology strategist with a contagious energy. He has built many successful products and propelled companies during critical growth periods,” said Marcin Kleczynski, CEO of Malwarebytes. SaaS solutions expert Marcin adds, “I knew immediately when I met Adam that his drive and creativity would be the perfect addition to our engineering team to help us stay ahead of a consolidating market and build the right products for our customers both today and in the future.” Hyder joins the Malwarebytes team with over 20 years of experience in engineering and a reputation for skilled management and strategic expertise. He has a proven track record of successfully bringing large-scale consumer and SaaS products to market and accelerating growth. Importance of cyber security In a digitised world, cyber security is the backbone we need to build tomorrow’s technology responsibly" “In an increasingly digitised world, cyber security is the backbone we need to build tomorrow’s technology responsibly. Enterprises and consumers alike are taking advantage of the convenience and efficiency offered by the Internet of Things and new mobile tools, but neither can ignore the risks that these technologies inherently expose us to,” said Adam Hyder. He adds, “I look forward to ensuring Malwarebytes continues to make the world more secure through innovations on its cutting-edge cyber security solutions.” Nebula and OneView cloud platforms Among Hyder’s first projects at Malwarebytes, he was instrumental in the launches of Malwarebytes Nebula cloud platform and OneView, a cloud-based operations console designed for MSP Premier Partners. Malwarebytes Nebula provides cloud delivery and management across the entire Malwarebytes’ product portfolio including Incidence Response, Endpoint Protection, and Endpoint Detection and Response. OneView enables MSPs to grow their revenue through streamlined delivery of high-value security solutions to their small-to-medium enterprise customers. Prior to Malwarebytes, Hyder was EVP of Engineering at BlueJeans Network. He also served as the CTO of Jobvite and as the CTO of Yahoo HotJobs. Hyder started his career with Sun Microsystems, where he worked on Java technology in its early days.
Morphean’s CEO, Rodrigue Zbinden, explores the benefits of hosted video surveillance and access control, and what the growing interest from the IT community might mean for the physical security sector. Digital transformation continues to have an impact on every industry. In the physical security sphere, traditional CCTV and access control systems that once sat outside the connected world, are being replaced by their intelligent, cloud-enabled equivalents. The tired stand-alone legacy solutions of the past are increasingly being overhauled in favour of the smarter, customisable and scalable digital versions of these technologies. The question then is this: does this represent a new horizon for the physical security industry, or is it an existential threat in the form of a land-grab from the IT sector? Digital transformation continues to have an impact on every industry As the tectonic plates, as represented by the physical security and IT industries, continue to converge, it is clear that the underlying responsibility for physical security systems will be questioned. Conscious of the rapidly growing adoption of IoT devices, such as a surveillance camera, and their connection to IT networks and hosted data centres, Morphean commissioned an independent survey into the attitudes and behaviours of 1000 IT decision makers across the UK and Europe. We wanted to gain a better understanding of purchasing intent for evolving security provision in the 2020s. Landscape Report: Hosted Security adoption in Europe Our results revealed that as many as 84% of IT managers are currently using, or considering using, cloud-based video surveillance (VSaaS) or access control (ACaaS) systems. This points to an appreciation of the convergence of the physical and cyber security realms, and a willingness to embrace the merging of physical devices, connected through the IoT, with existing IT and cloud infrastructure. Of those considering such solutions, nearly 8 in 10 respondents said that integration with existing platforms or emerging technologies would also accelerate VSaaS and ACaaS adoption. The growing confidence in cloud seems to translate into more positive purchasing intentions around hosted security solutions with 77% of IT managers reporting that physical security is not currently optimised and one in five identifying it as a priority for 2020. Of those considering hosted security solutions, 4 in 5 (79%) anticipate introducing them to their business within a year. Our survey also revealed that 36% of IT managers identified operational performance as a priority for improvement within the next year. When we consider the many aspects of operational performance, productivity will always be a key measure, and cloud facilitates leaner decision-making, being more adaptable to the changing business landscape as required. Business application: unlocking intelligence Cloud-enabled physical security has much potential beyond security Cloud-enabled physical security has much potential beyond security. The data collected by network cameras and other physical security devices, combined with other sources of intelligence, can be used for a multitude of different purposes. For example, real-time analysis of visitor numbers, gender and age demographic in a retail store could be cross-referenced with promotional campaigns to gauge effectiveness, or used to identify insights into customer behaviour patterns, such as hot and cold zones. The same platform might ‘learn’ to predict the behaviours that cause queue build-ups, and trigger alerts more readily to advise management that more till staff are needed. In the transportation industry, intelligent analytics can be used to improve operations across a small fleet of vehicles or an entire transport hub. Cameras and sensors can be integrated on board buses and trains to provide instant images and video footage to control centre personnel, while proactive intruder and loitering alarms employed at busy stations and depots, can deter suspected troublemakers before an incident occurs. People counting technology provides insights which can be used to increase or decrease security provision according to the amount of footfall, or to predict when additional turnstiles should be opened to more effectively manage queuing customers. The existential threat For the IT security professional already working with cloud systems and services, the growth in connected digital devices through the IoT is resulting in a growing appetite for physical security, such as network cameras, to enhance existing IT systems and assist business intelligence gathering. And, it is perhaps because of its digital DNA that the IT department is increasingly responsible for physical security purchasing decisions, a relationship historically managed by the fire and security professional who has been slow to adopt digital transformation practices and cloud-based business models. But we know there is an opportunity for the physical security provider because the IT manager who is well versed in computing protocols may have scant knowledge around maximising the full potential of physical security systems. The challenge is that IT will already have an existing relationship with their own IT solution providers, to whom they may naturally turn to help them with their physical security requirements. It is imperative, therefore, that the physical security provider of today becomes well versed in not only cybersecurity principles but is also able to speak the language of IT in order to successfully compete. The challenge is that IT will already have an existing relationship with their own IT solution providers Establishing partnerships One approach, given the nature of the shifting security landscape, is for IT and physical security vendors to unite in the delivery of a mutually beneficial and overarching solution. This would enable them to pull together their combined expertise to not only offer comprehensive protection of software and systems from a cybersecurity standpoint, but also take care of access control, perimeter protection, surveillance and all aspects of physical security too. For the IT manager, confident about the security of their cloud provision and committed to optimising physical security within their business, the bringing together of physical and cybersecurity solutions, provided by IT and physical security providers who speak the same language, can only be beneficial, enabling them to meet all of their security requirements. As the threat, both cyber and physical, continues to evolve, vendor partnerships and a joined up strategic approach could well prove to be the best line of defense for today’s businesses.
As New York City hip hop group Non Phixion boldly proclaimed in their 2002 debut album: The Future Is Now. From drone fleets and autonomous transportation systems to smart homes with computer-controlled lighting, heating, media and security systems, a new group of highly-automated technologies is gripping the popular imagination. These technologies – known collectively as the Internet of Things (IoT) – form advanced ecosystems of interrelated devices with the capacity to monitor, detect, communicate and act on the real world independently of human intervention. Promising to fulfil all of our wildest technological dreams and needs, the IoT age has arrived – and it looks like its here to stay. While the consumer applications of IoT tend to receive the most attention, one area that is seeing strong growth in the uptake of IoT devices is workplace safety. Workplace safety costs businesses billions every year, and industries with especially hazardous working environments – Construction, Oil & Gas, Mining, Utilities, Rail, etc. – are beginning to adopt IoT technology to help minimise risk and address preventable threats. Before exploring these IoT solutions, however, let us first consider some of the key threats faced by workers in these industries. Workplace safety Construction is one of the world’s most dangerous occupations, accounting for 1 in 5 worker deaths in the US and incurring tens of thousands of short and long-term injuries each year. In construction, the major risk is falling from a height, which accounts of 26 per cent of fatal injuries in the workplace. Additional risks come from being struck by vehicles and heavy moving objects, proximity to overhead/underground high voltage power lines, confined spaces, high noise environments, and exposure to dust and fumes. In underground mining operations, hazards include respiratory health problems In Mining & Quarrying, sustained overexertion is the most common threat to workplace safety, accounting for 24 per cent of nonfatal injuries. In surface mining operations, specifically, the leading hazards come from geological instability (i.e. falling rocks), blast debris and collisions with large and heavy plant equipment. In underground mining operations, hazards include respiratory health problems (e.g. Black Lung), explosions and gas leaks (particularly in coal mines), heat stress, confined spaces and ionising radiation. Other industries are often faced with some combination of the above, or similar, threats. In the Rail sector, for instance, there is high risk from collisions with vehicles, objects and machinery and vulnerability to electric shock. In Utilities, the number one risk is slips, trips and falls, accounting for 30 per cent of Lost Workday Injuries (LWIs) in 2016. And in Oil & Gas extraction, exposure to flammable gas, chemical emissions and oxygen-deficient atmospheres creates vulnerability to explosions and chemical poisoning. Tackling threats in a high-tech world What, then, is being done to tackle these threats? In a high-tech world, many safety measures currently in use – hardhats, earplugs, gloves, gas masks, guardrails, harnesses, protective goggles and high visibility clothing – appear decidedly primitive. Therefore, whilst these measures are still useful in minimising risk, companies have started to integrate IoT technologies to enhance their application. These technologies bring together real-time analytics, machine learning, advanced sensors and embedded systems to offer a number of key functionalities: Physiological monitoring Wearable technology is used to monitor a worker’s physiological state in real-time. Japanese wearable tech company Mitsufuji is active in this space, creating smart clothes woven from silver-metallised fibres that collect a range of data about its wearer, including heart rate and body temperature. Other examples include wristbands with bio-sensors to accurately measure stress levels and glasses that detect eye movements to identify fatigue and periods of micro-sleep. Environmental monitoring Sensors used to measure temperature, radiation, gas leaks, carbon monoxide and other harmful chemicals can automatically alert workers to unsafe external conditions. Additionally, visual imaging software can map 3D representations of a worker’s environment, facilitating effective two-way communication between supervisors and personnel in the field, and remote guidance technologies provide live assistance to workers caught in serious danger (e.g. guide a miner trapped in a tunnel to the best way out). Situational awareness, training and behavioural data Augmented Reality (AR) technologies offer new ways to support decision making in the field by providing holographic representations of physical equipment, while Virtual Reality (VR) technologies offer immersive situational training without the risks associated with real-life procedures. These technologies also offer up valuable behavioural data, which can be used to gauge a worker’s risk tolerance level and tendency to respond to danger. Proximity detection Proximity detection systems utilise wearable sensors to monitor workers’ location, map their movements, and alert them to nearby hazards. One example of this are radio-frequency identification (RFIDs), which can measure a worker’s proximity to moving equipment and alert them to possible collisions and near misses. Another piece of kit is the ‘smart helmet’, which can immediately detect an accident, determine the worker’s location and send an alert containing coordinates to a safety control centre. The centre is able to make video and audio contact and communicate with the worker until help arrives. Exoskeletons Exoskeletons can assist with heavy lifting and the prevention of musculoskeletal disorders (MSDs) by analysing worker movements and providing the necessary support. The Chairless Chair, for example, used by factory floor workers, fixes around the back and legs to provide support whenever the worker sits or crouches. Exoskeletons are also used to monitor worker movements, identifying repetitive movements and sustained periods of overexertion. IoT technologies and innovations IoT innovations are helping to improve workplace safety on multiple fronts Taken together, these IoT innovations are helping to improve workplace safety on multiple fronts. Firstly, they are preventative. By closely monitoring one’s environment – both internal and external – IoT technologies can pre-empt and alert workers to potential dangers. Secondly, they are responsive. In the case of an accident, IoT technologies can alert supervisors and help coordinate a quick and effective response. Thirdly, they are informative. By accumulating and analysing rich pools of data, IoT technologies can help optimise work in the field and find improved ways to limit risk. While IoT certainly cannot eliminate all risk from the workplace – it cannot prevent rocks falling in quarries, explosions on oil rigs or gas leaks in mines – it can go a long way to make these environments safer and better places to work. Because when it comes down to it, workplace safety is certainly no accident!
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyse a security event, machine learning can analyse the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the centre of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level”, Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centres, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organisation has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centres, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions.Mergers and acquisitions have been commonplace in the integrator space Beyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognised brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy”. He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted”. Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organisation. A panel of security leaders emphasised the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organisation being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organisation presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomised by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realising it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyse applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cyber security, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analogue cameras. A higher percentage of commercial customers use mobile applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
The year 2020 is bound to be a special year with the outbreak of coronavirus disease 2019 (COVID-19) globally. The highly contagious disease has taken away many lives and counting, especially in China, South Korea, Japan, and some countries in Europe and Middle East. Dahua Technology, globally renowned video-centric smart IoT solutions and services provider, has been an early participant in the epidemic prevention and control in Asia, joining the global efforts in combating the virus to minimise the impact on mankind. Dahua Thermal Solution Since sending its first batch of thermal cameras to the hardest-hit area Wuhan on January 24th, 2020 Dahua Thermal Solution has been deployed in thousands of sites in China, including transportation hubs, commercial complexes, banks, and other places, and some are on the way to multiple countries in Asia. Hong Kong, a financial capital in Asia, also suffers from the COVID-19 epidemic situation. Dahua Thermal Solution has been applied in some local business complexes, banks, company parks, and other places. To enable safe and smooth work resumption recently, quite a few major corporations have been using Dahua Thermal Solution in their headquarters and subsidiaries to improve their workplace safety. Dahua Thermal Solution measures the body temperature of their employees, handling thousands of staff flow every day. Thermal cameras deployed at virus-hit zones Using Dahua Thermal Solution will significantly improve speed and accuracy in body temperature measurement Compare to the traditional way of body temperature measurement – a forehead thermometer, using Dahua Thermal Solution will significantly improve speed and accuracy, and at the same time, help reduce cross-infection via non-contact measurement. To measure the temperature of 5,000 people, it will take about 4.2 hours using a forehead thermometer, as it takes at least 3 seconds to measure a person. However, it takes only 30 minutes if using the Dahua Thermal Solution, which measures 3 person per second. It also features a high accuracy of ±0.3℃ . Epidemic prevention and control “Dahua Thermal Solution helped us detect a couple of suspected cases in just a few hours of operation, which we greatly appreciate,” a Hong Kong user commented. Dahua Thermal Solution has been on the front line since the very beginning, helping with the epidemic prevention and control in airports, railway stations, hospitals, schools, and other sites all over Asia. Featuring high accuracy, high efficiency, strong adaptability and easy deployment, Dahua Thermal Solution can also be applied to all kinds of entrances and exits, kitchens and kindergartens.
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a renowned construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Replacing analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Dahua Smart Residential Security Solution The complete solution deployed more than 300 pieces of Dahua equipment, including IP cameras The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualised and integrated in the Dahua DSS platform for centralised management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. ANPR and IP cameras installed When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronise the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognise moving vehicle's plate number within low speed. Vehicle tracking and identification For both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognised. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers industry-leading light sensitivity, capturing colour details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Integrated management platform Dahua smart residential solution provides an integrated management platform for the personnel of BI-City Tokyo Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. IP video intercom solution “We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases,” said Arman Lesbekov, General Manager of BI Group. Dahua Technology is an internationally renowned video surveillance and security solutions provider with more than 6000 professionals in their R&D team, dedicated to providing cutting-edge products in technologies like AI, IoT, Cloud services, video, cyber security, and software reliability with high quality and performance. Video surveillance systems expert Since 2014, Dahua has ranked second in the global video surveillance equipment market according to an IHS report, and in 2017 Dahua ranked third in the A&S International "Security 50". The company believes in investing and building strong R&D capabilities for new technology and innovation.
Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities. Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018. Smart diagnostic platform OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyser, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge. “Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.” Trustonic security platform Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology: Enables a secure image processing channel from the sensor to the application processor; Provides cryptographic tools to protect individuals’ sensitive medical data; Ensures data integrity; Creates a secure environment to run algorithms analysing raw data from the sensor; Encrypts sensitive data when being shared with the cloud. Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data." Enhanced data security To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.” OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Located at the very heart of Amman, Jordan, Landmark Amman Hotel is one of the most renowned 5 star hotels in the city, as well as a true local landmark in more than one ways. Boasting seventeen flexible event spaces for everything from small intimate meetings to large-scale exhibitions and 258 rooms that are among the largest hotel accommodation in Jordan, Landmark Amman Hotel is an ideal choice for high-end customers of many types. Dahua Technology, a video-centric smart IoT solution and service provider, is trusted, for the first time in Amman, with the job of keeping Landmark Amman Hotel safe in its phase 2 CCTV improvement. Need of a competent surveillance system The other challenge concerned old system’s storage, which couldn’t meet the requirement of local policeIt is difficult for a large-scale hotel like Landmark Amman to patrol the grounds and premises of the hotel relying only on security personnel. Moreover, there might be no standardised evidence for the police to check without a competent surveillance system when an accident happens. There are two aspects of the old system to be improved. The analogue system the hotel was using was not easy to manage, the problem which was exacerbated by the condition that a great number of cameras were broken. The other challenge concerned old system’s storage, which couldn’t meet the requirement of local police. IP camera and NVR solution Dahua Technology’s CCTV solution comprising IP camera and NVR solves the problems just right. IPC-HDW1431S, the 4MP WDR IR Eyeball Network Camera, supports Smart Coding (H.265+ & H.264+), Intelligent Video Analysis(IVS), Wide Dynamic Range(WDR), Smart IR Technology, etc., which is fully capable of smartly capturing the 4MP resolution images in hotels. NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite NVR can be served as edge storage, central storage And NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite Network Video Recorder, which supports 4K and H.265 encoding technology, can be served as edge storage, central storage or backup storage with an intuitive shortcut operation menu for remote management and control. Compatible with ONVIF 2.4 protocol Easy to install, it is compatible with numerous third-party devices making it the perfect solution for surveillance systems that work independently of video management system (VMS). It features an open architecture that supports for multi-user access and is compatible with ONVIF 2.4 protocol, enabling interoperability with IP cameras. Dahua surveillance system has helped Landmark Amman Hotel find a new way to enhance the guest experience through improving the level of security with reduced property damage and thefts in hotel. It also improved team cohesion and work efficiency of the hotel employees. Furthermore, the hotel could increase revenue by monitoring and invoicing according to actual numbers of guests, and be compliance with local authorities’ security and safety regulations.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
How plate reader technology increases your perimeter securityDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals