Intrusion detection

News
PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of EAGL Technology to its Managed Security Service Provider Program (MSSP). EAGL Technology is a manufacturer of indoor/outdoor IoT wireless gunshot sensors, as well as sensors that can detect vape, car collisions, flood waters and critical infrastructure failures. Active shooter threat detection “EAGL produces solutions that address today’s real-world security concerns,” said Tim Brooks, PSA’s Vice President of Sales and Vendor Management, adding “Its solutions are designed to quickly identify an active shooter threat. We are pleased to add EAGL to our lineup of products.” EAGL Technology was initially developed in the wake of the Sandy Hook tragedy and is now deployed globally in airports, schools, C-suites, commercial offices, convention centers, bus stations and inner cities worldwide. Its product portfolio contains deployment for a variety of industries and venues. IoT sensor technology The PSA Network is an ideal partner for EAGL to offer the IoT sensor technology to its partners" “The PSA Network is an ideal partner for EAGL to offer the IoT sensor technology to its partners, to reach the customers most affected by gun violence and an active shooter threat,” said Boaz Raz, the Chief Executive Officer (CEO) of EAGL Technology. Boaz adds, “The rapid detection and emergency notification capabilities increase citizen and first responder survivability and can also assist law enforcement and first responders in identifying a threat much earlier in the timeline.” Integration with building security system The EAGL system can integrate with almost any building security system. Its wireless gunshot sensors detect gunfire and activate within seconds of shots fired. EAGL will then notify law enforcement of the active shooter threat with a map of the building, showing the location of the shooter and ballistic data of the weapon being used. PSA Security Network’s MSSP program hinges on uniting industry-renowned partners in cyber security and cloud-based security solutions, offering training and certification opportunities and financing options with assistance from PSA.
Electronic Security Association’s (ESA) National Training School has launched a valuable new tool to help employers with one of the biggest challenges faced when hiring new security technicians, gauging practical areas of proficiencies. Gauging proficiency areas “Many other professions use skills assessments to verify computer or accounting expertise, for example, so the Electronic Security Association felt with the thousands of test questions we have available from our courses that we would have the perfect resource to create a tool to help hiring managers,” said Michelle Yungblut, Electronic Security Association’s Chief Knowledge Officer. The tool consists of affordable, online aptitude tests, developed with input from industry subject matter experts over the past year and will measure a technician’s skill level on several core proficiencies that employers want when seeking to hire the best possible candidate. Security technician assessment tool Assessment exams are available in general, overall skillset, and in video surveillance, access control, fire and intrusion Assessment exams are available in general, overall skillset, and in specialised areas, including video surveillance, access control, fire and intrusion. Upon completion of each assessment, employees will receive an outcome report that will weigh the test takers’ skills as beginner, intermediate or advanced. These reports will also show areas of strengths and weaknesses so that managers are prepared to assign the employee tasks that match their skill level and design training programmes to enhance employee weaknesses as well as build upon their proficiencies. ESA National Training School courses “We have eight different assessments, each of which is just 25 questions and takes about 30 minutes to complete, so the time needed is very minimal,” said Michelle Yungblut. As with all ESA National Training School courses and training programmes, ESA members receive exclusive discounts. The assessment exams are now available for US$ 35 each for ESA members and US$ 49 each for non-members.
Anomali, the globally renowned company in intelligence-driven cyber security solutions, has announced that Anomali Match is now integrated with Microsoft Azure Sentinel. By bridging the gap between these two major security solutions, Anomali and Microsoft have created an automated solution that significantly enhances and speeds joint customers’ threat detection, alerting and response capabilities. Azure Sentinel and Anomali Match integration Azure Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI (Artificial Intelligence) to help analyse large volumes of data across an enterprise fast. Azure Sentinel aggregates data from all sources, including users, applications, servers, and devices running on-premises or in any cloud, giving users access over millions of records in a few seconds. Anomali Match is a high-performance threat detection and response solution. It continuously correlates all collected security event and log data against millions of globally observed indicators of compromise (IOCs) to expose previously unknown adversaries that have already penetrated networks. Match retrospective analysis capabilities stretch back as far as five years. Bi-directional data flow With this integration, Microsoft and Anomali have created a bi-directional data flow With this integration, Microsoft and Anomali have created a bi-directional data flow that allows users to easily export Azure Sentinel logs into match for correlation with Anomali global intelligence. Combining IOC matching at a massive scale together with other innovative techniques provides the precision detection needed to investigate and prioritise matched threats for ingestion back into Azure Sentinel, where Security Operation Centre (SOC) analyst teams can then triage. Enhancing cyber and data security “Most enterprises have dozens of cybersecurity tools deployed and access to mass volumes of related information. Despite this, many continue to fall victim to attackers who have figured out how to slip through holes that disparate systems and siloed data leave open,” said Mark Alba, Anomali Chief Product Officer. Mark adds, “Azure Sentinel and Anomali have bridged a gap that allows our joint customers to consolidate essential security technologies, providing them with the information and capabilities needed to identify and mitigate threats that are impacting their networks.” Cloud adoption and threat intelligence “To remain protected, organisations need visibility over what’s going on across their infrastructures, which are expanding rapidly due to things like cloud adoption, growing remote workforces and increasing levels of mobile connections,” said Jason Wescott, Principal PM Manager, Azure Sentinel. Jason adds, “With match enabled, enterprises will gain access to threat intelligence that will allow them to know more about what they are up against and then take smarter steps to further reduce risk.”
Sensor solution provider, HENSOLDT is expanding its capacity to cater for the growth in its business. HENSOLDT is investing approximately 30 million euros at its Ulm site and creating an additional 300 jobs for highly skilled staff throughout the entire group this year, having taken on 250 new recruits in 2020. New radar for Eurofighters This investment is linked to strong order growth relating to the development of new radar for the Eurofighter combat aircraft and other projects. “In its three years of existence, HENSOLDT has strengthened its position in the global sensor solutions market,” affirmed HENSOLDT’s Chief Executive Officer (CEO), Thomas Müller. Thomas Müller adds, “We operate in the high-tech sensor technology arena, a growing segment characterised by very long-term planning. Accordingly, our investment in new technologies and development laboratories is an indispensable part of our growth strategy.” AI-based sensors AI-based sensors for a wide range of applications will also be developed at the Ulm site The company is investing in the construction of a radio frequency technology development centre at the Ulm site, among other things. In addition to electronic components for the new Eurofighter radar, AI-based sensors for a wide range of applications will also be developed at the Ulm site. Last year, the German Parliament approved a budget of approximately 1.5 billion euros for the development of new Eurofighter radar by a development consortium led by HENSOLDT. Other business units of the group are also showing strong growth, such as ground and naval radars, electronic warfare and avionics systems, and optronics equipment. FACS and UAV collision warning system For instance, HENSOLDT is working on future-oriented projects, such as the German/French/Spanish Future Combat Air System (FCAS) and a UAV collision warning system. Recently, in 2020, HENSOLDT already hired 250 new employees, expanded its cleanroom production at its Oberkochen site by 300 sq. meters and converted its radar production in Ulm to series production. The new positions cover many different disciplines, in addition to hardware and software engineers, the company is especially interested in recruiting radar system engineers and project managers.
Expert commentary
Since the start of the pandemic, almost a quarter of UK businesses have been forced to temporarily close, pause trading, or work remotely, with very little notice. Now nearing the 12th month of the crisis, the country is currently enduring its third national lockdown, with an unspecified timeframe. Most workers are being urged to remain at home and only venture out for essential travel. This means a huge number of premises across the board, from recreational venues such as theatres, pubs and leisure centres, to office buildings, and storage facilities, will remain empty. It’s likely that security has been scaled back, so many buildings could be vulnerable to attack for the foreseeable future. Just recently we’ve seen empty pubs in London targeted by opportunistic illegal rave organisers. Physical security strategy Even rural areas aren’t exempt from the problem, as burglars have reportedly targeted beauty salons, etc Even rural areas aren’t exempt from the problem, as burglars have reportedly targeted beauty salons, food stores and vehicle hire premises this winter. Vandalism and burglary remain very real threats, therefore it is vital that facilities managers and property owners ensure the physical security of these empty buildings is maintained to the highest standard to protect property and the assets within. Below we outline key considerations when evaluating a physical security strategy for an empty building. Assess the risk We would urge facilities managers and building owners to carry out regular, thorough checks of the building and the perimeter to assess any obvious factors which would elevate the risk of attack. This includes assessing the location. Is the crime rate high? How visible is the property? Are the contents of the property on show? How secure is the access or perimeter boundary? View the premises from a potential intruder’s perspective, and when you can’t be at the site in person, use photographs, notes and drawings to identify potential weaknesses. For example, there may be high security fencing at the front of the premises, but make sure it is not at risk of being compromised at the back. Conducting regular maintenance Retain and maintain quality Inspecting the fence line may seem obvious and straightforward, but it needs to be a deliberate, scheduled event Conducting regular maintenance is even more essential while premises are left empty, as it is much easier for any issues to appear and escalate undetected. We highly recommend regularly inspecting your fencing for disrepair or damage as this can affect the perimeter’s integrity. Alternatively, choosing high quality galvanised and preferably powder coated steel fencing with a 25-year guarantee will offer longer-lasting protection against rust and corrosion. Inspecting the fence line may seem obvious and straightforward, but it needs to be a deliberate, scheduled event. Take time to check the perimeter on both sides. As you inspect the fencing, keep an eye out for any attempted breaches and note if foliage, weather conditions, or topography changes have affected security integrity. Check all fixtures and fittings are in good working order, look for damage and corrosion, and clear all litter and debris away. Huge security risk Quality investments In a time when businesses are already stretched, it can be tempting to opt for quick, inexpensive fixes. However, poorly executed design or cheap, low quality products can lead to costly, long-term remediation or worse, significant loss to the business. Make wise, informed decisions and specify solutions based on your organisation’s security needs first and foremost. While generic steel palisade is a popular option, owing to its intimidating aesthetic, it is easily compromised. Steel palisade fencing has inherent weaknesses that undermine performance. Its wide pales can obstruct surveillance, while the bolted construction is a huge security risk. Simply removing or breaking the lower fixing on one or two pales would allow them to swing aside to give repeated access to the site without leaving an easily visible sign that the perimeter has been breached. It’s a false economy, as the initial lower price is offset by the costs and inconvenience incurred by regular repairs. Performance classification system The standard works via a performance classification system, and even considers the tools that an intruder may use Specifying a higher quality product that’s fit for purpose makes more sense both in the short and long term, and it adds little to the original cost. Fortunately, there are a number of security accreditations that facilities managers and building owners can refer to when specifying security measures at their site, helping them choose effective solutions to combat the risks the property faces. Proven performance Certifications and approvals, such as The Loss Prevention Certification Board’s (LPCB) LPS 1175 and the British Standards Institution’s (BSI) PAS, prove a product has been thoroughly tested to a specific standard. They prove the strength and durability of the item in multiple different situations. It is worth noting also that investing in effective perimeter protection can actually deliver a positive return by reducing the incidence of burglary and vandalism, and their associated costs. The technical evaluation work carried out by LPCB is extremely thorough. The product is subjected to rigorous quality audit processes, to certify the security products tested by BRE deliver verified levels of protection. All LPS 1175 rated products are vigorously tested before receiving an accreditation. The standard works via a performance classification system, and even considers the tools that an intruder may use. Intrusion detection system Our law enforcement teams are stretched to capacity and coping with reduced workforces due to illness By predicting a likely toolset, specifiers can construct multiple defensive layers to maximise how much time a facility has to respond to an attack. Different levels of security are crucial for the ‘5D defence’ concept, whereby a quintet of security assets work together to prevent access to your site, resulting in a strategy that will: Deter, Detect, Deny, Delay and Defend unwanted access from intruders. 360° security There is no single solution when it comes to securing a building. Every situation must be considered on an individual basis, starting with a full risk assessment. We recommend an integrated approach where appropriate. Along with a secure perimeter, this might also include effective lighting in shaded areas and at doors, gates, and vulnerable windows, Perimeter Intrusion Detection Systems (PIDS) and well-placed CCTV. These measures can hinder entry and escape, or increase the chance of discovery and detection. Domestic burglaries While domestic burglaries have become less attractive as many of our homes are now occupied around the clock, commercial properties have become increasingly more vulnerable. Our law enforcement teams are stretched to capacity and coping with reduced workforces due to isolating and illness. Therefore it has never been so important for building owners and facilities managers to assess the properties they’re responsible for to ensure they’re protected effectively in the event of an attack.
Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorised to enter? Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or What a security guard needs is to be able to hear and to communicate with an individualinvite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds. Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents. Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides valuechallenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open. COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service. The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localisation. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymised and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
Security beat
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones. Beyond video analytics "Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists. AI made its initial splash in the physical security market by transforming the effectiveness of video analytics AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient. Biometrics with access control Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit. AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future. Smarter perimeter protection Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognise a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customisable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Meeting urban needs Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analysing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyse it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. Optimise security solutions As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimise security solutions. In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioural analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. AI surveillance software In many ways, it’s the equivalent of a neighbourhood watch programme made far more intelligent through the use of AI This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighbourhood watch programme made far more intelligent through the use of AI. Fighting illicit trade Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioural anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labour-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.
The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realisation of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staff The advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Case studies
Potawatomi Hotel & Casino is teaming up with Evolv Technology to bring a state-of-the-art security and screening system to enhance the safety of guests and team members. Evolv’s artificial intelligence-based touchless system, Evolv Express®, will help promote safety by using weapons detection screening without needing guests to walk through individually as is the case with traditional screening methods. While weapons of any kind have never been allowed on the property, this new system will detect them if they are brought in and guests will be asked to remove them from the property. Touchless security screening The Evolv system also offers thermal imaging in the continued effort to protect against COVID-19. Guests will no longer need to stop at the entrance to have their temperature taken by hand, which is the system that has been in place since Potawatomi re-opened in June. Evolv system offers thermal imaging in the continued effort to protect against COVID-19 “The health and safety of our guests and team members continue to be our number one priority,” said Potawatomi Hotel & Casino CEO and General Manager Rodney Ferguson. “This new technology allows us to ramp up our efforts while continuing to provide guests the entertainment and service they’ve come to expect.” Evolv, which has been providing this new touchless security screening since 2017, is second only to the Transportation Security Administration (TSA) in the number of people screened by its system – more than 50 million people at venues across the country. Providing screening services While Evolv is providing screening services at high-profile attractions such as Six Flags theme parks, Hersheypark, and Oakland International Airport, Potawatomi Hotel & Casino will be the first casino in the United States to utilize the technology for guest safety. “Potawatomi Hotel & Casino is known for delivering an industry-best guest experience,” said Evolv Technology Chief Executive Officer Peter George. “Proactively addressing concerns brought on by issues like viruses and concealed weapons is paramount for venues to help people feel safe while enjoying their leisure time. It’s in keeping with Potawatomi’s well-earned ‘customer-first’ reputation to be setting the pace for other casinos and hotels.” The new screening system will be in place at each guest entrance: the main lobby on the south side of the casino, the parking garage Skyway, and the hotel lobby. Guests will not have to stop, empty their pockets, or have their bags checked unless directed to by security. Guests may still be asked to provide identification to show they are 21 years or older.
Interface Security Systems, a renowned managed service provider delivering business security, managed network, UCaaS and business intelligence solutions to distributed enterprises, announced that El Pollo Loco, one of the nation’s fastest-growing restaurant chains that specialises in fire-grilled chicken, is relying on Interface's managed video verified alarms and intrusion alarm monitoring to reliably detect intrusions and minimise false alarms. With Interface, El Pollo Loco saves several thousand dollars in annual false alarm penalties across 198 restaurants. When Louis Burke, Senior Manager, Safety & Loss Prevention, joined El Pollo Loco, he had to contend with numerous alarm management protocols as El Pollo Loco had half a dozen vendors for intrusion alarms. Every vendor had different terms of engagement and there was no way to hold anyone responsible even when the alarm systems failed. Security alarm system “When I first started, I received a call from a restaurant about their missing safe. When I called the large well-known alarm company, I was told that they had stopped receiving signals from the alarm system at the location for over six months. Apparently, we had not signed up for a separate add-on service that would have ensured the communication channel between the alarm and the monitoring center was working." We untangled ourselves from the maze of alarm vendors and work with a company that understood our needs" "All along, we were paying service charges with no one monitoring our location and no communication from the alarm company." This incident marked a turning point in El Pollo Loco’s approach to loss prevention and paved the way for a complete review of how intrusion monitoring was implemented. “We decided to untangle ourselves from the maze of alarm vendors and work with a company that understood our needs and was willing to take ownership for the service. That’s why we decided to hire Interface,” said Burke. Alarm monitoring systems The service scope included replacing outdated alarm systems with a state-of-the-art new system along with Interface’s 360 Alarm Maintenance Service that ensured all maintenance issues with duress buttons, connectivity, and the alarm panels were proactively addressed along with a comprehensive yearly technical inspection to ensure the alarm systems remain operational at all times. The revamped managed alarm service by Interface became the gold standard for El Pollo Loco, as Burkes team insisted on following a similar engagement model and protocol with other service providers as well. Once El Pollo Loco streamlined the basic alarm monitoring systems, Burke set his eyes on rolling out cameras to the remaining 40% of restaurants that still did not have a video in place. However, the team wanted to effectively demonstrate ROI on the proposed investment first. Video verified alarm service As Burke was reviewing the security operations, the hefty false alarm fines that added up to several thousands of dollars every year stood out. Working with Interface, El Pollo Loco piloted a video verified alarm service at a few of their restaurants where cameras were already installed. The results of the pilot project were eye-opening. Every time a restaurant location had an alarm event, Interface’s remote monitoring team would verify if the alarm required a call to the local law enforcement or not. Only 5% of the alarm events actually required police intervention. The rest were all false alarms. The pilot project paved the way for the installation of security cameras at all El Pollo Loco locations. Interface’s video verified alarm was then made available in all the locations and directly contributed to thousands of dollars in savings per year as El Pollo Loco cut down false alarm penalties and associated costs by 95% across their corporate-owned restaurants. Eliminating false alarms The Interface Command and Control Center identified the burglary in progress and immediately dispatched police “In addition to the direct savings associated with eliminating false alarms, our store associates are happy as they are no longer being woken up at odd hours with a false alarm. Every time they receive an emergency call from Interface, our associates know that they have a verified event,” says Burke. The custom-built video verified alarm solution is also helping to prevent crime at El Pollo Loco. Recently, a serial burglar attempted to make off with a significant amount of cash stolen from the smart safe at a Los Angeles-area location. The Interface Command and Control Center identified the burglary in progress and immediately dispatched police. The burglar was arrested on the scene. Convert alarm panels Interface is currently in the process of working with El Pollo Loco’s IT department to also eliminate expensive POTS lines and convert their alarm panels to help them reduce costs for all their locations. According to Burke, “The biggest advantage of working with Interface is not just the value for money, it’s the robust, process-oriented culture, the willingness to listen to customers, and the ability to creatively solve problems keeping the interest of the customer in mind.”
The Chilean Minister of Justice and Human Rights, Hernán Larraín, recently inaugurated the new Soter RS 250A Body Scanner at the Rancagua Penitentiary Complex in Chile, which will raise the security standards of the prison facility. The Soter RS 250 is a Full-Body Scanner, that uses X-ray technology to allow the rapid detection of prohibited items that could be smuggled into the prison. To facilitate inspection the scanned image can be managed through various effects and filters, such as sharpening, embossment, multi-touch zoom functions, brightness and contrast. Accumulative radiation dosage The image that the Soter scan delivers is similar to that of a medical X-ray, although the Soter technology uses 1000 times less radiation than a medical X-ray. The ANSI N43.17 international certifications which the Soter adheres to, are even stricter than the current Chilean radiation safety standards. In addition, the system calculates the accumulative radiation dosage a scanned individual is exposed to, (administered by the Gendarmerie Health Department) which is tracked by an implemented biometric reader. The system generates quarterly report for the Instituto de Salud Publica – (ISP – The Chilean public health institute). Also present at the opening ceremony were the national director of the Gendarmerie, Christian Alveal, together with the Minister of Justice of the O'Higgins Region Bárbara Perry, among other authorities. Detecting prohibited elements The Rancagua Penitentiary Complex is the first prison under concession to have this technology The Rancagua Penitentiary Complex is the first prison under concession to have this technology, joining the state criminal units of; CPF Arica - Female Penitentiary Centre, CP Arica, and CP Valparaiso - Penitentiary Complexes, CDP Santiago Sur – Preventative Detention Centres, High Security Prisons, Colina I, Colina II and CCP Temuco Penitentiary Compliance Centres. After the inauguration, the Minister of Justice and Human Rights, Hernán Larraín, pointed out that “This tool is extremely effective in detecting prohibited elements, increasing security inside prisons, since it allows a thorough body search to be carried out on all persons who enter the premises, whether they are officials, lawyers or family visits, but without giving an invasive treatment in the inspection procedure, eliminating manual inspection and thus guaranteeing the integrity of the people.” Optimising internal processes The national director of the Gendarmerie, Christian Alveal, added that “It is very relevant to have this type of technology inside the penal units, as it improves and optimises internal processes, where detection capacity contributes to guarantee comprehensive security of the enclosure. In addition, it allows a non-invasive treatment in the inspection process, guaranteeing the integrity and dignity of the people who visit those deprived of liberty.” Speaking from their Head Quarters in Leeuwarden, The Netherlands, Mr. van der Veen said of the installation; “We are delighted to have been awarded this contract and to be part of increasing of security across the Chilean Prison estate.”
Rohde & Schwarz has installed Ireland’s first Quick Personnel Security (QPS) scanner at Kerry Airport, Farranfore, Ireland, delivering state-of-the-art technology that enables a high throughput, enhanced security, and increased safety for airport customers and staff. The airport has chosen the latest model, the latest generation R&S QPS201 launched earlier in 2020, becoming the first Rohde & Schwarz security scanner installation in Ireland. R&S QPS201 security scanner The R&S QPS201 security scanner by Rohde & Schwarz features enhanced second-generation algorithms that increase sensitivity to further boost threat detection while minimising false alarms and reducing processing time. In addition to strengthening security, these performance gains reduce post-alarm manual checks and so help avoid physical contact to ensure social distancing. Moreover, a more efficient scanning time with R&S QPS201 balances the effects of incoming new X-ray inspection systems, which scan items inside baggage that previously had to be removed, such as laptops. The security scanner restores parity to baggage- and personnel-scanning times, helping security staff manage throughput at checkpoints and avoid excessive queueing. Rohde & Schwarz QPS scanners The Rohde & Schwarz QPS scanners are highly regarded by the air travel industry worldwide" “The Rohde & Schwarz QPS scanners are highly regarded by the air travel industry worldwide and the latest technology takes performance to an even higher level,” said Gary Walker of Rohde & Schwarz, adding “I am confident that Kerry Airport and its customers will appreciate the enhancements to service, security, and safety, and that others in Ireland will follow their lead.” Tom O’Driscoll, Chief Security Officer of Kerry Airport, commented “Now is the right time for this investment in the future of Kerry Airport, to meet the heightened expectations for safety and security within our industry. Having recently installed explosives detection systems for cabin baggage (EDS CB), we are proud to now also adopt this state-of-the-art technology in Ireland, which will set new standards for service and well-being.” R&S QPS201 was installed and setup at Kerry Airport with minimal disruption to daily activities. The system is designed to be easy to use, with intuitive graphical displays that require minimal training and let operators quickly achieve full proficiency. Integrated with millimeter-wave technology Leveraging Rohde & Schwarz expertise in millimeter-wave technology and utilising machine-trained software algorithms, R&S QPS201 detects all types of potentially dangerous objects whether metal, ceramic, plastic, or liquid. The harmless low-energy millimeter-waves enable personal privacy to be maintained while capturing high-resolution data that enhances threat detection. The system allows an easy, hands-down posture for scanning, which is comfortable while at the same time ensuring effective screening for safety and security.
Round table discussion
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Products


White papers

Optimise your business with analytics and AI
Download
How end-to-end video security solutions can help your organisation with social distancing
Download
Schooling the market on education security
Download
How to catch shoplifters with thermal imaging
Download
What Do I Need to Know to Successfully Deploy Mobile Access?
DownloadIntrusion detection: Manufacturers & Suppliers
- DSC Intrusion detection
- OPTEX Intrusion detection
- Bosch Intrusion detection
- Vanderbilt Intrusion detection
- Dahua Technology Intrusion detection
- NetworX Intrusion detection
- Climax Technology Intrusion detection
- RISCO Group Intrusion detection
- Visonic Intrusion detection
- Texecom Intrusion detection
- Pyronix Intrusion detection
- Honeywell Security Intrusion detection
- Axis Communications Intrusion detection
- Gallagher Intrusion detection
- Senstar Intrusion detection
- Enforcer Intrusion detection
- CIVINTEC Intrusion detection