SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Openow from SMARTair wireless access control

    Openow from SMARTair wireless access control

    Vanderbilt Bluetooth Low Energy readers

    Vanderbilt Bluetooth Low Energy readers

    Dahua Fixed-focal Dome Network Camera

    Dahua Fixed-focal Dome Network Camera

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • TDSi to unveil latest GARDiS integrated security solutions product line at Intersec 2020 in Dubai
    • Technocover achieves 100% across all assessment categories in the Achilles UVDB verify audit
    • Minut unveils fully secure, all-in-one Smart Home Alarm for residential security systems in the UK
    • IDIS DirectIP NVR-anchored video surveillance solution and SARC secure luxury cars at Autobahn Collision
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • Year in Review 2018
    • Year in Review 2017
    Featured
    • MOBOTIX M7 platform provides more flexibility and computing power
    • Trends in banking security include more networks and software
    • Fast and accurate, Rapiscan’s CT scanning improves airport baggage screening
    • The intersection of education and fire and security
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Upcoming Events
    • Crime Prevention International Conference (CPIC) 2019
    • IFSEC India 2019
    • 2019 China Smart Homes & Buildings Expo
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Crime Prevention International Conference (CPIC) 2019

    Crime Prevention International Conference (CPIC) 2019

    2019 China Smart Homes & Buildings Expo

    2019 China Smart Homes & Buildings Expo

    Oman Facilities & Environment Exhibition & Conference 2020

    Oman Facilities & Environment Exhibition & Conference 2020

    Kuwait Health Safety & Environment Forum 2020

    Kuwait Health Safety & Environment Forum 2020

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY EMEA
    • FLIR Systems
    • Hanwha Techwin America
    Other Resources
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Financial institutions require future-ready physical security technologies

    Financial institutions require future-ready physical security technologies

    H.265 High Efficiency Coding: Video compression for security applications

    H.265 High Efficiency Coding: Video compression for security applications

    How to overcome the storage challenges of adopting surveillance AI

    How to overcome the storage challenges of adopting surveillance AI

    Physical security supports a future-proof cyber security strategy

    Physical security supports a future-proof cyber security strategy

About us Advertise
  • Artificial intelligence (AI)
  • Cyber security
  • ISC West
  • Counter Terror
  • Robotics
  • Body worn video cameras
  • Intrusion detection
  • Video management software
  • Trade Show/Exhibition
  • Video analytics
  • View all

Intrusion detection

  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
TDSi to unveil latest GARDiS integrated security solutions product line at Intersec 2020 in Dubai

TDSi to unveil latest GARDiS integrated security solutions product line at Intersec 2020 in Dubai

Events
SRI and Echodyne collaborate on 3D Airport Security solution at the 19th AAAE Aviation Security Summit

SRI and Echodyne collaborate on 3D Airport Security solution at the 19th AAAE Aviation Security Summit

Events
3DX-Ray to showcase ThreatScan x-ray scanning systems at International Security Expo 2019

3DX-Ray to showcase ThreatScan x-ray scanning systems at International Security Expo 2019

Events
Safer Scotland achieves Double ROCCO Victory for Innovation and Technology

Safer Scotland achieves Double ROCCO Victory for Innovation and Technology

Corporate
Hikvision showcases Video & Audio Convergence Solution with real-time intrusion deterrent functionality

Hikvision showcases Video & Audio Convergence Solution with real-time intrusion deterrent functionality

Product

News

360 Vision Technology to showcase their high-performance surveillance cameras at International Security Expo 2019
360 Vision Technology to showcase their high-performance surveillance cameras at International Security Expo 2019

UK CCTV manufacturer, 360 Vision Technology, will be showing their latest range of high-performance surveillance cameras on the Nukleas Integrated Security Solutions stand (H51), at International Security Expo, Olympia, London, 3-4 December. Designed to provide a reliable solution even within difficult transmission environments, 360 Vision will be showing their ultimate performance Predator, Invictus and lightweight VR Dome PTZ wireless ‘TX’ video transmission cameras. The TX Range negates the need for fixed infrastructure, saving installers and end-users money on installation time. Video & PTZ control Particularly suitable for rapid or temporary redeployable, or permanent deployment applications, 360 Vision’s TX technology delivers video & PTZ control from just 6 Kbps and Full 1080p HD edge recording / remote retrieval on demand. “Unlike standard or off-the-shelf wireless video transmission systems, the new 360 Vision TX Range has been specifically designed to suit low bandwidth or unreliable network conditions, such as satellite or cellular networks,” says Mark Rees, Managing Director at 360 Vision. “Always On and ‘Rugged at the Roadside’ IK10 certified, TX Range cameras include built-in cyber security, local point-to-point Wi-Fi access, easy Plug & Play set-up, require no fixed infrastructure and can be easily integrated into existing VMS control systems.” Surveillance camera solution Also to be seen at the show is the latest 360 Vision Predator Radar camera Also to be seen at the show is the latest 360 Vision Predator Radar camera. Perfect for a wide range of electronic surveillance applications, Predator Radar scans 360 degrees once every second to detect and track multiple objects simultaneously (with 400m of coverage) - providing a highly effective surveillance camera solution for wide area security monitoring and intruder detection. Designed to protect against hacking and ransomware attacks, 360 Vision cameras showcased feature advanced SSL & 802.1 encryption protection, with high-performance camera technology designed to deliver secure 24/7 video imaging, reliability and performance within any application. Secure wireless transmission “The Nukleas Integrated Security Solutions consortium combines British industry excellence to provide complementary solutions for a coordinated approach on all types of security projects,” says Richard Freeman, Director of Nukleas. “This single integrated solution combines, command and control systems, robust camera surveillance solutions, secure wireless transmission and networking, integrated communication hubs, incident management, perimeter intrusion detection, mobile devices, live streaming of images, video analytics and multiple other security and safety solutions, scalable and tailored for each unique project requirement.”

ExtraHop extends cloud-native network detection and response with Google Cloud Platform integration
ExtraHop extends cloud-native network detection and response with Google Cloud Platform integration

ExtraHop, a pioneer in cloud-native network detection and response, announced a new integration between ExtraHop® Reveal(x) and Google Cloud Platform (GCP) via the new packet mirroring feature announced by GCP at Google NEXT ‘19 UK. Google Cloud’s new Packet Mirroring feature enables Reveal(x) to passively and agentlessly analyse network traffic within GCP to provide robust, real-time threat detection, investigation, and response. Cloud computing Traffic visibility is critical to prevent security breaches and attacks as networks grow in complexity" Armed with this visibility, security teams can protect data and workloads in Google Cloud and expand control across the entire hybrid attack surface. Reveal(x) for GCP automatically discovers, classifies, and maps dependencies between workloads, and applies advanced machine learning to surface the most critical threats. Equipped with this information, GCP customers can rapidly identify, investigate, and respond to threats, fulfilling their obligations under the shared responsibility model. "Ulta Beauty is a company built on seeing possibilities. It's informed everything from our in-store shopping experience to how we build our business – including the technology that supports it," said Diane Brown, senior director of IT risk management and CISO at Ulta Beauty. "In cloud computing, we see the ability to grow faster and deliver more 'wow' experiences to our customers. The new integration between ExtraHop Reveal(x) and Google Cloud's new packet mirroring accelerates our cloud adoption by giving us the visibility we need to secure our applications and protect our most precious asset, our customers." Full threat visibility Through the integration with GCP packet mirroring, ExtraHop Reveal(x) provides full threat visibility, detection, and response across cloud and hybrid workloads. Full Packet Analysis: Reveal(x) leverages GCP Packet Mirroring to capture payloads and headers, enabling in-depth analysis and threat hunting. Machine learning at the application layer provides immediate detection of difficult-to-spot activity, including exfiltration. Encrypted Payload Visibility: Reveal(x) decrypts SSL/TLS-encrypted traffic at line rate, including cipher suites supporting perfect forward secrecy, providing complete visibility into all communications, including encrypted malicious traffic. Augmented Investigation: Reveal(x) for GCP automates several early investigation steps to provide analysts with workflows that can be completed in clicks, enabling quick and confident response. Detect network intrusions "Traffic visibility is critical to prevent security breaches and attacks as networks grow in complexity," said Mahesh Narayanan, product manager at Google Cloud. “With Packet Mirroring, our customers now have a way to proactively detect network intrusions, analyse, and diagnose application performance issues for both Compute Engine and Google Kubernetes Engine, across all regions and machine types." "Traditional security tools are falling short and new thinking is needed for hybrid enterprises today," said Jesse Rothstein, CTO and co-founder at ExtraHop. “Reveal(x) for GCP Packet Mirroring provides security teams with unparalleled network visibility and cloud-scale machine learning for detection and automated response across your business's complex attack surface.” ExtraHop Reveal(x) for GCP is now available in alpha.

Videonetics recognised as top Video Management Software provider in India by IHS Markit Report 2019
Videonetics recognised as top Video Management Software provider in India by IHS Markit Report 2019

Videonetics, globally renowned visual computing platform development company, has announced that it has achieved No. 1 position as video management software provider in India with the dominant market share of 36.1%, according to a recently released report by IHS Markit. Videonetics market share is more than the aggregate of total market share of 2nd to 4th ranked VMS providers, which is a huge achievement and a testimony of its undisputed leadership in the VMS segment. VMS solutions provider Videonetics is also the youngest and the only Indian VMS provider in the top 5 listing Videonetics is also the youngest and the only Indian VMS provider in the top 5 listing. Recently, Videonetics was also ranked amongst top 5 VMS providers in Asia market with the market share of 5.4%. IHS Markit is globally renowned in critical information, analytics and expertise to forge solutions for the major industries and markets that drive economies worldwide. Rankings are adjudged using a robust rating scale and evaluated based on percentage revenue growth, competitive advantage, size and innovation capabilities over the years. Commenting on the achievement, Dr. Tinku Acharya, Fellow IEEE, Founder & MD, Videonetics, “It is a prestigious honor to be recognised as an industry leader in VMS by IHS Markit. This recognition validates our drive for high performance, innovation, differentiation and scalability.” Unified Video Computing Platform “Building upon our award winning and patented AI & Deep Learning framework, we continue to achieve widespread adoption of our Unified Video Computing Platform (UVCP), in smart & safe cities, aviation, industrial, education, BFSI, retail, healthcare sectors”, he further added. Mr. Avinash Trivedi, VP – Business Development, Videonetics expressed, “The findings of lHS Markit reaffirm our leadership position in the VMS market. We’ve always strived to bring more value to our partners, integrators and customers. I would like to dedicate this achievement to them for their continued support, commitment and excellent contribution to Videonetics growth”. Videonetics Intelligent Video Management Software Videonetics Intelligent Video Management Software (IVMS) is an open architecture, agnostic, scalable and modular video management and analytics software. IVMS provides enterprise-class features without discriminating on the size of the project and manages the video effectively, optimally and securely. IVMS offers flexible deployment environments to suit user’s preferences and needs. IVMS is a part of Videonetics’ patented Unified Video Computing Platform (UVCP) which brings together other applications such as AI & Deep Learning based Video Analytics, Intelligent Traffic Management Applications and Face Recognition to address all of the video computing requirements. Built on open architecture, IVMS enables easy 3rd party integration with various sub systems such as access control, fire alarm systems, SCADA, Intrusion Detection, ICCC, C4I and IBMS systems.

Panasonic i-PRO Sensing Solutions Corp. to exhibit advanced security solutions at ISC East 2019
Panasonic i-PRO Sensing Solutions Corp. to exhibit advanced security solutions at ISC East 2019

Panasonic Security Systems, a business unit of the newly formed Panasonic i-PRO Sensing Solutions Co., Ltd., is showcasing its impressive solutions capabilities at ISC East 2019, booth #435 at the Javits Centre. By combining superior imaging technologies with new AI-driven software and analytics solutions, Panasonic i-PRO Security Systems offers comprehensive, customisable solutions to meet the most diverse range of users’ specific needs. Core solutions on display include the company’s fully integrated Video Insight 7 Video Management System Video Insight 7 VMS solution Core solutions on display include the company’s fully integrated Video Insight 7 Video Management System (VMS) and MonitorCast access control platform, innovative FacePRO facial recognition software, and a wide variety of analytics. “There are many new and exciting developments at Panasonic that we will be unveiling over the next several months – the most significant being our enhanced solutions portfolio,” said Bill Brennan, Vice President of the Security Division., Ltd. AI-driven software and analytics Bill adds, “Where Panasonic was once almost exclusively recognised for our superior imaging products, our enhanced portfolio of AI-driven software and analytics enables us to provide advanced integrated solutions that move beyond detection to preventive analysis and business intelligence. This is the new Panasonic i-PRO.” Video Insight 7.5, a powerful and versatile VMS solution with innovative 3D De-warp functionality, fully integrates the company’s MonitorCast access control platform to deliver uncompromised system management and control with unlimited scalability, and no license fees when used with i-PRO Extreme cameras. FacePRO facial recognition solution FacePRO facial recognition software employs an innovative neural network with deep learning technology FacePRO facial recognition software employs an innovative neural network with deep learning technology providing fast face matching on both live and recorded video; the ability to identify and match multiple faces against 10 million records in seconds; and GDPR compliant privacy protection via end-to-end SSL communications and fully encrypted facial data. The National Institute of Standards and Technology (NIST) rated FacePRO as the ‘world’s most highly rated facial recognition engine’. A new portfolio of Intelligent Analytics including, License Plate Recognition; Vehicle Search Detection; Intruder Detection, Loitering Detection, Direction Detection, Object Left Behind Detection; Object Removed Detection; and Cross Line Detection. i-PRO Extreme IP cameras i-PRO Extreme IP cameras in a wide range of models with up to 4K/9MP resolution, and in multi-sensor, PTZ, dome, and box configurations. Highlights include the new WV-X8570N iA (intelligent Auto) 4K/33MP H.265 Panoramic Multi-Sensor Camera; WV-S3532LM iA H.265 Compact Dome Camera; and the WV-S2570L4K iA H.265 Dome Camera. The ISC East exhibit also showcases new Remote Demo Sites, with feeds from the majority of the i-PRO Extreme line-up, as well as the ability to demo FacePRO. For added versatility, the Panasonic Partner Ecosystem includes deep integration with over 4,500 cameras from 151 different manufacturers, and integration with 19 access control partners.

View all

Expert commentary

How to build an insider threat programme
How to build an insider threat programme

Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.

Artificial Intelligence: A new weapon in the cyber security arms race
Artificial Intelligence: A new weapon in the cyber security arms race

The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected.  And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars –  the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals.  Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled.  AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities.  As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.

How to reinforce your cybersecurity strategy
How to reinforce your cybersecurity strategy

We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.

View all

Security beat

Q&A: Gallagher’s Richard Huison on innovation and challenges
Q&A: Gallagher’s Richard Huison on innovation and challenges

Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernise legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.

Honeywell is enhancing its product line, working towards proactive security
Honeywell is enhancing its product line, working towards proactive security

Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning “We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customisation during the commissioning phase.  Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs).  In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a mobile credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cyber security, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasising “cyber security by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cyber secure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)

ISC East 2019 Preview: Keynotes, free sessions and workshops among conference offerings
ISC East 2019 Preview: Keynotes, free sessions and workshops among conference offerings

In addition to providing the Northeast’s largest security trade show, ISC East will include free conference sessions and keynote speeches right on the show floor and several paid workshops. The Nov. 20-21 event at New York’s Javits Center will also include vendor solution sessions from Axis Communications, Hikvision and NAPCO. Wide variety of paid workshops An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees, and location of the sessions on the show floor means attendees don’t have to leave the exhibition to take in a session. The paid workshops include technology sessions about cyber terminology for physical security integratorsThe paid workshops include an Active Shooter Workshop and technology sessions about cyber terminology for physical security integrators; and basic installation and configuration of video surveillance solutions. An OSDP (Open Supervised Device Protocol) Boot Camp Short Course will also be offered. As a smaller show, the topics of ISC East conference sessions are broader and of more general interest, rather than organised into focused “tracks” as at ISC West. Attendance at sessions can provide continuing education (CE) credits with organisations that partner with ISC East – one credit for each hour-long session. Attendees can use their Certificate of Attendance from any session to self-report their education hours to relevant industry bodies: ALOA (AEU education credits), ASIS (CPE continuing professional education credits) and NICET (CPD Continuing Professional Development points). An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees Keynote sessions at the Main Stage The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management (on Day 1 – Nov. 20); and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration (FAA) (on Day 2 – Nov. 21). The two SIA Education@ISC East educational theaters on the show floor will be booked up both days with a variety of interesting topics. A new session covers penetration testing for physical security, presented by Michael Glasser of Glasser Security Group. A session on LiDAR (Light Detection and Ranging) sensors will be presented by Frank Bertini, UAV and Robotics Business Manager, Velodyne LiDAR. Another popular topic is Safe Cities, and FLIR will present a session on moving from secured to smart cities with intelligent, connected systems. New addition is Active Shooter Workshop  The Active Shooter Workshop is a new addition to the ISC East programme. It has been a popular session at ISC West for three years now. At ISC East, presenters of the workshop will be David LaRose, System Director Public Health, Lee Health; and Ben Scaglione, Director of Healthcare and Security Programming, Lowers and Associates. At the end of the workshop, an additional hour of programming will be the “Stop the Bleed/Save a Life” session presented by Jerry Wilkins, Co-Owner of Active Risk Survival. The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management, and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration Woman in Security event A Women in Security Forum breakfast event will be held on Nov. 21 (Thursday). It’s the second annual event and this year will focus on diversity and inclusiveness in the workplace of the future. Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”Moderator Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”. Panelists are Lisa Terry of Allied Universal, Andrew Lanning of Integrated Security Technologies, Elaine Palome of Axis Communications and Dawne Hanks of Milestone. The Women in Security event is likely to attract up to 100 attendees. SIA’s Women in Security is an active organisation, with monthly meetings and a newsletter that recognises prominent women in the security industry. “It’s really a group for both men and women,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. “There are many programmes, recruiting efforts, and professional and networking opportunities. They are a robust group of people who are active in making a difference. It’s important to support women in the security industry, which is 95% male, and to develop a new generation of women to be a part of the industry’s future.” The keynote addresses at ISC East will also highlight two high-profile women.

View all

Case studies

Everbridge Public Warning System selected as Peru’s Disaster Alert and Early Warning Emergency Messaging System
Everbridge Public Warning System selected as Peru’s Disaster Alert and Early Warning Emergency Messaging System

Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honoured to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022.  Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.

Nortech stresses on access control systems to effectively secure, manage hospitals and residential care homes
Nortech stresses on access control systems to effectively secure, manage hospitals and residential care homes

Often spread over large premises, housing expensive equipment and with a high number of visitors accessing the site every day, care homes face numerous threats. Care home safety and security is a big issue, and ensuring the safety of patients, staff, visitors and assets is a top priority but also a challenge, so by installing access control systems workers are able to easily manage areas around a building. Access control systems can also carry out functions such as time and attendance, staffing level management and parking management. “Access control systems are increasingly being used to enhance safety and security in residential care homes by restricting and monitoring the movement of staff, residents and visitors without impacting on the residents’ everyday lives,” say access control specialists, Nortech. “Installing an effective access control system not only provides a flexible form of security but also one that is bespoke to each individual site.” Importance of access control systems Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers Access control allows staff to manage, control, monitor and restrict the movement of people or vehicles in, out and around an individual site. Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers. Access control systems can be easily installed to ensure that only authorised persons can access specific areas. In more sophisticated facilities, systems can also be used to restrict access to areas that need to be kept separate for the safety of other patients, such as isolation rooms. Access control solutions in care homes Care homes are known to be targets for criminals because they hold valuable goods such as computers and IT equipment and sensitive patient data as well as the personal possessions of staff, visitors and patients. To combat this and deter thieves, a growing number of premises are now installing access control systems to offer instant, flexible protection. One system Nortech can offer is a hands-free access control solution which is both secure and user-friendly. This Nortech system uses Nedap’s uPASS access readers which offer both convenience and security. UHF ID badges and uPASS access readers Each member of staff is issued with a long-range (UHF) electronic ID badge that they carry on a lanyard or clip. The UHF ID badges are automatically read by the uPASS readers at a distance of up to 2m allowing staff access though doors without the need to physically present their ID card to the reader. Two advantages of this hands-free system are that it allows staff to push trolleys or wheelchairs or to carry equipment easily around a care home whilst also avoiding the spread of germs or viruses through constant contact with door handles. Integrating access control system with security solutions Access control systems can work on a small scale for just one door or used as part of a wider security system The ease of integrating access control with other security measures is another reason why the system is so appealing, as access control software enables hospitals and care homes to provide even tougher protection for their sites. The systems are often effectively linked to the likes of CCTV, property marking, perimeter protection or intruder alarms. Access control systems can also work on a small scale for just one door, as well as being used as part of a wider security system. They provide users with a great deal of flexibility according to individual requirements. Enhancing security of hospitals, residential care homes By using access control as a method of security, different authorisation levels can be easily set, thereby preventing people from accessing areas they do not have clearance for. New photo ID cards can also be created instantly for new staff or if a replacement is required. Electronic access control systems are increasingly being used to enhance safety and security in hospitals and residential care homes. In these environments, staff often needs to gain access through doors while escorting patients in wheelchairs or beds or when carrying sterile equipment, etc. so hands-free access is the ideal solution. Card-based access control systems Managers, trained staff, ancillary staff, residents and visitors can all be assigned a pass card that will allow them access around the building appropriate to their status. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.

Gallagher Security’s integrated access control solution creates a safe environment for visiting dignitaries of Saïd Business School
Gallagher Security’s integrated access control solution creates a safe environment for visiting dignitaries of Saïd Business School

An Oxford University facility has enhanced its security with the help of world technology pioneer in integrated access control, intruder alarms management and perimeter protection. Saïd Business School, the University of Oxford’s centre of learning for undergraduate and graduate students in business, management and finance, has replaced its former system with an integrated Gallagher Security access control solution to protect it against theft and create a safe environment for visiting dignitaries. Saïd Business School is located right next to a train station – a heavy transit route into Oxford. While this location is convenient for students and staff, proximity to the station was making it easy for organised thieves to target the school and use the train to get in and out quickly. As hosts to international heads of state, royalty and others with strict personal security requirements, the school also saw a clear need to upgrade its security system to achieve a higher level of security. Safe from unauthorised intruders T-series were  installed on doors throughout the building and new access cards were issued to all Saïd Business School wanted a system which could meet its need for complete control, yet maintain an open and welcoming feel on campus. “We needed to ensure only current employees and students had access to the school, and that those people were only accessing the areas relevant to them,” says Martin Boyt, Estates Operations Manager at Saïd Business School. “We also needed it to be easy and efficient to manage cardholder permissions, with the flexibility to adapt as the school grows.” Gallagher T-series readers were installed on doors throughout the building and new access cards were issued to all employees and students. Gallagher Command Centre is used to manage access control groups and set privileges to enable varying levels of access to different parts of the building. Students and staff can now easily move around the school and access the rooms and resources they need on a day-to-day basis, with confidence they’re safe from unauthorised intruders. Certified security installer Access control has been integrated with the student and staff induction process, meaning access control cards are not issued until induction has been completed. The school also uses the new system to issue event and conference visitors with temporary cards that have restricted access suited to the purpose of their visit. Boyt says protecting their people is of paramount importance. “Schools can be vulnerable to vandalism, theft and, increasingly, violence and terrorism by individuals or groups, so security is a top priority. We want our students and staff to have peace of mind that they are studying and working in a safe and secure place.” Partnering with Gallagher Security and a Gallagher certified security installer streamlined the process of installing the new system. Boyt says working with someone who understood their needs made all the difference. Building integrated security system Saïd Business School is using its learnings to improve security at its other university facilities“Translating the needs of our staff and faculty into workstreams and access control groups was a complex undertaking, and having trusted advisors on hand helped us get it right the first time.” Built-in reporting tools enable the estate managers to carefully monitor the system to keep the site secure. “We can run reports to check on occupancy levels and usage of certain areas, helping to reallocate rooms quickly and efficiently,” says Boyt. Saïd Business School is an active member of the Tertiary Education Security Network (TESN), organised by Gallagher. The aim of the group is to bring Gallagher customers together to build relationships and share knowledge. Boyt says: “We have found this group to be extremely useful as we continue our journey of building an integrated security system that meets our needs. We have learned a lot about campus security by attending TESN events and working closely with Gallagher and our security installer.” Learnings to improve security Saïd Business School is using its learnings to improve security at its other university facilities. “We want to integrate the CCTV cameras at our Park End Street events venue with Gallagher Command Centre to improve our monitoring capability,” says Boyt. “We will also insist the Gallagher system and CCTV integration is installed on future projects, including the redevelopment of Osney Power Station which is set to become a world-leading centre for executive education.”

Delta MP5000 portable barrier disables an intruder vehicle at Naval Air Station - Corpus Christi
Delta MP5000 portable barrier disables an intruder vehicle at Naval Air Station - Corpus Christi

Delta Scientific, the prominent manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that, on Monday, October 7, at approximately 7 am, a Delta MP5000 portable barrier stopped a stolen Dodge Ram pick-up truck at an entrance gate of the Naval Air Station - Corpus Christi. The stolen car was chased by the local police onto the base. The barrier then impacted the rear of the vehicle, disabling it. Simultaneously, the Air Station announced that an unauthorised person was on base and the facility immediately would go under lockdown with all gates secured to all traffic. Having taken flight after the truck was stopped by the barrier, the intruder was quickly apprehended within the hour and taken into custody by the Bureau of Alcohol, Tobacco, Firearms and Explosives. "This is the second attempted intrusion into the Naval Air Station - Corpus Christi in eight months," explained Greg Hamm, Delta vice president of sales and marketing. Control vehicle access "On February 14, a Delta MP5000 portable barrier stopped a stolen Ford Edge crossover SUV at the North Gate. The trespasser had driven across the base to escape but crashed into the Delta unit and erupted into flames. The driver was shot and killed." Delta's totally self-contained MP5000 mobile deployable vehicle crash barriers now carry an ASTM rating as high as M50, able to stop and disable a 15,000 lb (66.7 kN) G.V.W. vehicle moving at 50 mph (80.4 kph). They tow into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades will unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. Once the event is over, procedures are reversed and the barriers are towed away.

View all

Round table discussion

What’s new in Command-and-Control Systems?
What’s new in Command-and-Control Systems?

Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?

What are the mainstream uses for thermal cameras?
What are the mainstream uses for thermal cameras?

The high cost of thermal imaging cameras historically made their use more likely in specialised law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?

How are standards changing physical security?
How are standards changing physical security?

The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?

View all

Products

Check and control your security system wherever you are

Check and control your security system wherever you are

Vanderbilt (formerly known as Siemens Security Products) access control, intrusion detection and CCTV solutions

Vanderbilt (formerly known as Siemens Security Products) access control, intrusion detection and CCTV solutions

ACT ACTpro Enterprise role based access control software application

ACT ACTpro Enterprise role based access control software application

RISCO Group introduces the LightSYS Hybrid Security System

RISCO Group introduces the LightSYS Hybrid Security System

ReX — Intelligent radio signal range extender

ReX — Intelligent radio signal range extender

Vanderbilt (formerly known as Siemens Security Products) SI410UK - Sintony® control panel 16 – 464 zones, English

Vanderbilt (formerly known as Siemens Security Products) SI410UK - Sintony® control panel 16 – 464 zones, English

Vanderbilt SPCK521 compact keypad with graphical display, card reader and audio

Vanderbilt SPCK521 compact keypad with graphical display, card reader and audio

Visonic introduces the touch-screen keypad KP-160 PG2

Visonic introduces the touch-screen keypad KP-160 PG2

Vanderbilt SPCK421.100 - LCD keypad with 2 x 16 characters and integrated card reader

Vanderbilt SPCK421.100 - LCD keypad with 2 x 16 characters and integrated card reader

Honeywell new wireless DUAL TEC® motion sensor helps reduce false alarms and can lead to lower intervention costs

Honeywell new wireless DUAL TEC® motion sensor helps reduce false alarms and can lead to lower intervention costs

Vanderbilt SPC intrusion detection platform

Vanderbilt SPC intrusion detection platform

Hikvision Anti-Corrosion series: Anti-corrosion network PTZ dome camera

Hikvision Anti-Corrosion series: Anti-corrosion network PTZ dome camera

New Management Experience with VIVOTEK VAST 2

New Management Experience with VIVOTEK VAST 2

Vanderbilt (formerly known as Siemens Security Products) GT2 glass break detector

Vanderbilt (formerly known as Siemens Security Products) GT2 glass break detector

Vanderbilt (formerly known as Siemens Security Products) SPCS410.000 SPC Safe Software

Vanderbilt (formerly known as Siemens Security Products) SPCS410.000 SPC Safe Software

View all

White papers

How to catch shoplifters with thermal imaging

How to catch shoplifters with thermal imaging

Download
What Do I Need to Know to Successfully Deploy Mobile Access?

What Do I Need to Know to Successfully Deploy Mobile Access?

Download
View all

Videos

Gallagher’s perimeter detection solution helps to safeguard properties from intruders

Gallagher’s perimeter detection solution helps to safeguard properties from intruders

Ajax Security System incorporates next-gen technology for enhanced security

Ajax Security System incorporates next-gen technology for enhanced security

Vanderbilt explains installation, features and uses of its SPC intruder detection platform

Vanderbilt explains installation, features and uses of its SPC intruder detection platform

Vanderbilt highlights security features of its SPC wireless intruder alarm system

Vanderbilt highlights security features of its SPC wireless intruder alarm system

View More

Intrusion detection: Manufacturers & Suppliers

  • DSC Intrusion detection
  • Optex Intrusion detection
  • Vanderbilt Intrusion detection
  • Bosch Intrusion detection
  • NetworX Intrusion detection
  • Climax Technology Intrusion detection
  • RISCO Group Intrusion detection
  • Texecom Intrusion detection
  • Visonic Intrusion detection
  • Pyronix Intrusion detection
  • Honeywell Security Intrusion detection
  • Gallagher Intrusion detection
  • Senstar Intrusion detection
  • Enforcer Intrusion detection
  • CIVINTEC Intrusion detection

Follow us

Sections Products Companies News Insights Case studies Markets Events White papers Videos
Topics Artificial intelligence (AI) Cyber security ISC West Counter Terror Robotics Body worn video cameras Intrusion detection Video management software Trade Show/Exhibition
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2019, all rights reserved

Our other sites: SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec