IP security solutions
Electronic Security Expo (ESX) 2019 registration is now open for electronic security and life safety industry professionals. The joint trade show and educational conference, owned by the Electronic Security Association (ESA) and The Monitoring Association (TMA), is set for June 3-6, 2019 in Indianapolis, Indiana. ESX is designed to provide passionate professionals a unique forum in which to learn about the latest technology innovations; acquire proven business strategies; gain new insights based...
Renowned sensor solutions provider, HENSOLDT has successfully concluded flight tests with its collision avoidance radar system for UAVs. This sensor is intended to improve safety in both military and civilian air traffic. Detect-and-avoid radar system HENSOLDT has developed a demonstrator of a so-called detect-and-avoid radar system, which uses the latest radar technology to detect objects in the flight path of a UAV and to give early warning of any threat of collision following precise evalua...
Glass windows and entryways give businesses a bright and welcoming feel. But they can be vulnerable to criminals looking for an easy way to break in after hours. To stop them in their tracks, Digital Monitoring Products (DMP) is pleased to introduce the new 1128 Wireless Glassbreak Detector. 1128 Wireless Glassbreak Detector Designed to detect the shattering of framed glass mounted in an outside wall, the 1128 Wireless Glassbreak Detector is a fully supervised, low-current shock and glas...
The recent incident at London Gatwick airport caused major travel disruption for more than a day after drones were spotted flying over this sensitive area. This incident once again highlighted the need for anti-drone technologies to address this evolving threat and secure the safety of airplanes. Following the episode, the US Federal Aviation Administration was instructed to develop a strategy to allow wider use of counter drone technologies across airports. Detecting drones, and any UAV threat...
Two separate divisions of VPS (UK) Ltd are combining to operate under a new banner of VPS Security Services. Their Property division, providing protection for people, property and assets for over 25 years, will merge with their Site Security unit, which specialises in securing construction sites, utilities and assets in remote, challenging environments. Bluetooth-enabled Smart Door and Smart Alarms "We have the widest range of security options in the business, combining the highest qual...
Redvision, the UK’s renowned manufacturer of high-performance, rugged CCTV cameras, has released an image of its new VEGA 2010 camera housing, with its cover ghosted away. It clearly shows installers how their preferred camera and lens combinations can fit neatly inside. VEGA 2010 camera housing Stephen Lightfoot, technical director at Redvision explains, “The VEGA 2010, rugged, camera housing has room for cameras and lenses up to 290mm long. The Tru-park, silicon wiper, which remo...
According to a recent report produced by IHS Markit, which specialises in providing insight on the areas that are shaping the business landscape, the number of video surveillance cameras equipped with advanced low-light functionality is set to soar over the next four years. Whilst it is estimated that in 2015 there were approximately 4.75 million of these types of cameras delivered to the market, in 2022 this number is projected to increase to about 51 million. Advanced low light functionality Whilst it is estimated that in 2015 there were approx. 4.75 million of these types of cameras delivered to the market, in 2022 this number is projected to increase to about 51 million The good news for system integrators and their end-user clients is that through economies of scale and increased competition, the price of these cameras is likely to gradually reduce. This will make them affordable for virtually any video surveillance project and thus fuel the growth in the number of them deployed. Conversely, it is bad news for intruders who would normally use the cloak of darkness to break into a site, as end-users are now able to deploy high definition cameras which are able to capture identification grade images in very low light conditions. What do we mean by ‘advanced low-light camera capability? Well, as an example, a bullet camera which has recently come onto the market is being supplied with the world’s first 0.94 f-stop lens which, when combined with sens-i technology built into the camera’s new sensor, delivers noiseless, clear colour images when the light levels are as low as 0.004Lux. The low light performance of this particular camera means there are unlikely to be many situations where the camera’s built-in IR illumination will be required. Green surveillance and video security Human beings are able to observe objects and activity in relatively low lighting conditions thanks to the complex processing which goes on between the eye and brain. Until recently, video surveillance cameras have not shared anything close to this phenomenal processing power and have therefore struggled to deliver quality images in challenging lighting conditions. Green issues such as light pollution and energy costs, as well as the capital and installation costs associated with the provision of supplementary lighting, have significantly increased the demand for the latest generation of video surveillance cameras which are able to generate evidence grade images in very low light conditions. Red IR LED illumination Although many of these cameras feature built-in IR LED illumination, these alone will not satisfy the requirements for all video surveillance application requirements. Where, for example, cameras have been installed for covert surveillance purposes, the red light emanating from the LEDs are likely to give the game away to unwanted intruders well before a control room operator can alert security guards or the police. For safety reasons, railway operators will not deploy cameras which have red IR illumination. Nevertheless, they are increasing in popularity and understandably so, as the built in IR LEDs which consume low amounts of energy, are automatically activated and depending on the camera model, can provide effective lighting up to a distance of 100 metres. On some of the latest generation of cameras, the IR intensity is automatically adjusted to provide the appropriate level of IR light depending on the zoom ratio Reduced IR diffused reflection On some of the latest generation of cameras, the IR intensity is automatically adjusted to provide the appropriate level of IR light depending on the zoom ratio, whilst some ‘Flat-eye’ cameras have a flat surface cover which is applied to the front of the lens instead of the dome cover. This reduces IR diffused reflection which is caused by moisture and in the absence of a normal transparent dome cover, also removes the effect scratches can have on image clarity. Video surveillance in low light conditions There isn't a single answer to the difficulties presented by low light environments, but with the right advice, designing a video surveillance solution to cope with the challenge should not be a difficult task. A combination of high resolution and low sensitivity is vital, but it is also important that the cameras have performance enhancing features and functions, such as Wide Dynamic Range (WDR), Automatic Gain Control (AGC) and Sense-Up. The lens used must also be able to match the performance of the camera, thereby getting as much light as possible onto the image sensor. It obviously makes sense to work with a manufacturer who is prepared to back its confidence in its low light cameras by being prepared to carry out a live on-site demonstration. It is certainly worth taking the time to research various options so that you don’t suffer from ‘buyers’ remorse’ by making a hasty decision. There is no shortage of cameras to choose from, but these can be filtered by seeking advice from a systems integrator or the technical department of the distributor they source cameras from.
Hikvision, the global supplier of innovative security products and solutions, will be exhibiting its latest innovations at Intersec 2019, the largest security exhibition in the Middle East, January 20th – 22nd in Dubai, UAE. “As the largest and most prestigious security surveillance industry exhibition in the Middle East and North Africa Regions, Intersec is an event where Hikvision mobilises significant resources every year to engage with customers and partners,” says Binson Xu, the regional president of Hikvision MENA. “The 2019 edition of Intersec marks the 10th year of Hikvision’s participation in this great event, a significant milestone for us.” Demonstrating AI powered solutions Hikvision Smart Retail Solution enables retailers to get an understanding of their business’s status using intelligent cameras, NVRs, and the VMS, HikCentralAt the booth, visitors can experience Hikvision’s market-leading products, solutions, and services across various industries and scenarios. There will be interactive areas for visitors to immerse themselves in an Artificial Intelligence experience and feel the power of AI technology. Hikvision will demonstrate AI industry solutions for vertical markets and applications. For example, Hikvision Smart Retail Solution enables retailers to get a clear understanding of their business’s status using intelligent cameras, NVRs, and the video management system, HikCentral. Visitors will also be able to see a sand box at the booth, demonstrating how Hikvision's Intelligent Traffic System (ITS) recognises vehicle license plates to manage roadway traffic and parking areas. Turnstile with face recognition terminal In addition, the booth will feature a building access control simulation with facial recognition technology. Visitors can pass through an access turnstile equipped with Hikvision’s face recognition terminal after registering at the reception. Meanwhile, a people-counting camera set above the crossbeam provides real-time monitoring, so visitors can experience this powerful technology first-hand. Hikvision will also showcase intelligent products, including AI-equipped Turbo HD 5.0 cameras, the Easy IP 4.0 Series with Hikvision’s AcuSense and ColorVu technologies and the DeepinView deep learning cameras. Hosting technology partners Visitors will be able to see a wide range of innovations and products for new Hikvision enterprises, such as smart home, industrial automationAt Intersec, Hikvision will host several technology partners at the booth, including AxxonSoft, Ela-soft, Milestone Systems, Nedap, Seagate, and Western Digital. Representatives of each of these partners will be available to talk with visitors about how their solutions integrate with and complement Hikvision products and technologies. Visitors will also be able to see a wide range of innovations and products for new Hikvision enterprises, such as smart home (under the EZVIZ brand), industrial automation (Hik Robotics), Automotive Electronics, Intelligent Data Storage, and more. Visit Hikvision at Booth SA-B12 to explore additional information and opportunities.
OPTEX, renowned global sensor manufacturer, will demonstrate the recently enhanced long-range RLS-3060 LiDAR series live on its stand, as well as showcase its new 180-degree outdoor sensor ideal for boundary protection. OPTEX LiDAR and REDSCAN series sensors “OPTEX’s LiDARs have been successfully deployed in the Middle East region for years, for a number of applications ranging from perimeter security to roof and asset protection. At this year’s Intersec we are looking forward to showing the new functionalities of our long-range REDSCAN series which will make it more flexible and compelling for perimeter security,” says Gaurav Mahajan, Divisional Manager for OPTEX in Middle East. The advanced RLS-3060-SH model has been designed for harsher environments and extends the detection area to 50m radius in horizontal mode The long-range RLS-3060L has a detection range of up to 30 metres, and now features four detection areas that can be independently adjusted via an analogue connection, and up to eight areas that can be adjusted via an IP connection. The inclusion of area allocation and masking functions enable these detection zones to be precisely defined. The advanced RLS-3060-SH model has been designed for harsher environments and extends the detection area to 50m radius in horizontal mode. When in vertical detection mode, it can detect a standing or squatting person over 100m away. WXI 180-degree outdoor PIR sensors The event is also the opportunity for OPTEX to showcase its new 180-degree outdoor sensor, ideal to protect the boundary of residential and commercial premises. The new WXI 12m 180-degree outdoor PIR has left and right alarm outputs that trigger alarm signals from both sides individually, making it ideal for PTZ activation, direction, recognition and changing detection pattern by day and night. The WX Infinity series features advanced Super Multidimensional Analysis (SMDA) logic to differentiate between human beings and animals, advanced temperature compensation, an area masking shutter, and a single or dual pulse count. The new series is available as both hard wired and battery-operated models. With the launch of our new 180-degree PIR, we are complementing our boundary protection range" “With the launch of our new 180-degree PIR, we are complementing our boundary protection range,” says Masaya Kida, Managing Director of OPTEX EMEA. “We are now able to offer single sided and double-sided curtain PIRs, 90-degree volumetric and 180-degree volumetric sensors, covering all areas around the building.” Fibre optic perimeter fence detection system Also, on the stand, OPTEX’s sister company Fiber Sensys will be showcasing its compact radar range which offers object tracking and object categorising that differentiates between vehicles, people and drones. It complements its fibre optic perimeter fence detection system by offering protection for wide open areas. Masaya says the company is looking forward to exhibiting again at Intersec and having the opportunity to present its range of perimeter protection sensors: “A delegation from OPTEX EMEA will be attending the show including technical engineers, marketing specialists, Middle East and Africa sales managers, and our Strategic Alliance Manager. This gives visitors to Intersec a great opportunity to connect with the OPTEX team and discuss their projects.”
CNL Software, global supplier of Physical Security Information Management (PSIM) software, is pleased to announce that it will be demonstrating the latest version of its IPSecurityCenter PSIM solution, as chosen by leading law enforcement, Safe City and CNI organisations in the Middle East. It will demonstrate recent enhancements to its open PSIM platform, including the accelerated processing of alarms, a more intuitive interface and a greater focus on the visualisation of data. Artificial Intelligence & Machine Learning CNL Software will share valuable insights into its work with governments, military, enterprises and cities. It will discuss how security operations can leverage the latest technology developments such as Artificial Intelligence (AI) and Machine Learning (ML) to help to identify and respond to incidents faster and more accurately. Additionally, it will highlight its innovation with leading drone detection and defence technologies, which can help to identify, track and mitigate aerial-based threats. In recent years, visualisation inside the control room has become increasingly important, and CNL Software, along with its technology partners, has been at the forefront of the visualisation of assets using 3D technologies. This coupled with IPSecurityCenter’s latest dashboard capabilities will also be demonstrated at Intersec. Intersec is a great forum for us to share the latest on our IPSecurityCenter PSIM software, as well as best practice and trends in the industry" IPSecurityCenter PSIM solution “More than a decade ago, we set out to create a PSIM platform to transform the way organisations manage their security. Today, IPSecurityCenter is trusted by the best-informed security operations in national security, ports, airports, government buildings, transportation and enterprises in the Middle East”, says Craig Menzies, General Manager – ME. “Increasingly, we are developing large scale interconnected deployments, which is where we lead the PSIM field in highly scalable solutions. Intersec is a great forum for us to share the latest on our IPSecurityCenter PSIM software, as well as best practice and trends in the industry.” CNL Software’s IPSecurityCenter PSIM solution provides a single view of all of an organisation’s mission critical security systems, increasing emergency preparedness, delivering intelligence to the point of need and providing process guidance to enhance security responses. Layouts, sequences and process guidance can be created in Arabic and operators are able to work using Arabic to view alarms, search for cameras and locations as well as display maps, gauges, charts and address details.
With the need for security guard services growing worldwide, Montreal-based tech startup TrackTik Software Inc., an integrated security workforce management cloud-based software solutions provider, has announced US$ 45 million in financing from Toronto-based Georgian Partners and Montreal-based Caisse de dépôt et placement du Québec (la Caisse). Disruptive AI and Machine Learning Funds will be used to drive new product development — including disruptive artificial intelligence and machine learning technologies Funds will be used to drive new product development — including disruptive artificial intelligence (AI) and machine learning (ML) technologies — that will enable security guard firms or in-house security teams to simplify their operations and maximise profitability. TrackTik will also nearly double its staff of 120 in the next year to help bring to market the new state-of-the-art tools and increase support and provide best practices for customers as the company expands its operations internationally. “This investment is in effect good news for the security workforce management industry as a whole as it is enabling us to reimagine every aspect of the industry, helping users of our technology to perform at unprecedented levels of intelligence and efficiency as they obtain their key business objectives,” said TrackTik Founder and CEO Simon Ferragne in making the announcement. “These unique tools will not only add value to our users but will in turn enable our clients to add value to their own customers,” he said, revealing that the new products are planned to start rolling out in early 2019. TrackTik security workforce management software Applauding the investors for their vision, Ferragne explained that both Georgian Partners and la Caisse are aligned with TrackTik’s commitment to transform the security workforce management market. In particular, Georgian Partners — a firm that invests in growth stage companies using AI and ML to solve real business problems, with a roster that includes players such as Shopify, Cority, Flashpoint and True Fit — has dedicated a group of technical experts to help TrackTik accelerate the development of its new products. TrackTik's unique end-to-end security workforce management software is advancing the security industry to improve services and make smarter, data-driven decisions" “TrackTik's unique end-to-end security workforce management software is advancing the security industry to improve services and make smarter, data-driven decisions,” said Steve Leightell, Partner at Georgian Partners. “They've built a powerful solution that is solving their customers’ greatest business needs and are truly leading the industry. We are thrilled to be working with the TrackTik team to develop their software’s cutting-edge artificial intelligence capabilities. Georgian’s core philosophy is that businesses utilising applied AI will enable superior service levels in terms of capability, delivery, availability, accuracy and convenience, and so we look forward to be a part of this phase of their growth.” Applied Artificial Intelligence Citing a good cultural fit between the two companies, Leightell added that the timing was right to engage with TrackTik because there is a strong market pull for TrackTik’s first-of-its-kind, all-in-one enterprise software solution that delivers all of the mission-critical components required to run a professional security service firm on a single integrated platform, including real-time guard management and incident reporting, back office administrative functions, and business intelligence. In addition to Applied AI, Georgian Partners’ thesis-led approach to investing also focuses on Conversational AI – including the use of text-based messaging, chatbots and voice assistants – and Digital Security, two areas that TrackTik is well positioned to capitalise on, he added. Based on TrackTik’s substantial growth in 2018, Thomas Birch, Managing Director Venture Capital and Technologies at la Caisse stated that “this new investment will enable TrackTik to continue its international development and reaffirms la Caisse’s support for technology companies, which represent a promising sector of Québec’s economy. One of the fastest growing technology companies in Canada, TrackTik will use the proceeds of this transaction to pursue its strategic expansion plan, which includes developing more machine learning technology.” Automated scheduling This is an exciting time for the security guard workforce management space as the industry grows and evolves" Among some of the advanced AI capabilities to be featured in TrackTik’s new software are an automated scheduling tool that uses predictive analysis and ML to streamline the scheduling of large, diverse and mobile security workforces, reducing the number of human interactions and simplifying day-to-day business, Ferragne said. TrackTik’s innovations have helped propel the company’s exponential growth since its inception in 2013, with the company receiving multiple recognitions for its solutions. Last year alone, TrackTik ranked No. 11 on the Deloitte Technology Fast 50 list, was included on the LinkedIn list of Top 25 Startups in Canada, placed 36th on the Canadian Business 2018 Startup 50 ranking of Canada’s Top New Growth Companies, and received a 2018 SaaS Award for Customer Success by San Diego-based APPEALIE. “This is an exciting time for the security guard workforce management space as the industry grows and evolves,” Ferragne said. “We at TrackTik are proud to support its advancement by providing the best products possible in the hopes of helping those in the industry propel their business forward. We want to thank both Georgian Partners and la Caisse for believing in our vision and mission, and we look forward to working together on achieving our goals.”
OODA LLC will provide comprehensive consulting and advisory services including a highly specialised Artificial Intelligence (AI) and Machine Learning security practice. "We'll be addressing not only traditional security and technology issues, but also looking at the vulnerability and integrity of emerging technologies like Artificial Intelligence," added Gourley. AI security practices In addition to the AI security practice, OODA will offer comprehensive assessments using their EVALU8 methodology, Virtual CISO/CTO services, risk management consulting, and business support including market development and investment/acquisition due diligence. Devost and Gourley have been collaborating for over twenty years and were co-founders of the highly successful FedCyber conference. Bob Gourley is a former Naval Intelligence officer that later served as Chief Technology Officer (CTO) of the Defense Intelligence Agency and founder of the popular CTOvision.com web site. Matt Devost is an established security professional and entrepreneur having been Founder of CEO of the Terrorism Research Center and the red teaming and incident response consultancy FusionX and founder of the OODAloop.com site. Insights of OODA Iconic businessman Scott McNealy, the former co-founder of Sun Microsystems and Chairman of WayIn, is an advisor to OODA. On their formation he commented that, "OODA has assembled an unprecedented combination of expertise and has the experience required to help organisations navigate the fine line between risk and opportunity. Innovation today is moving at warp speed and CEOs who want to optimise opportunity will benefit from the experience and insights of OODA."
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SourceSecurity.com. Q: What do you believe are the main physical threats to data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organisation, which are: Every organisation is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organisation is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What do you think influences employees to steal data from their own organisation? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many of us think of security threats coming from an outsider, do companies still face these type of threats? Yes. Unfortunately, organisations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether it be an insider threat or an outsider threat, what are ways these individuals can steal sensitive data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What is the difference between COTS and disguised devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With these types of discrete items, can security personnel still catch individuals in the act? For example, through security screenings? Poor or nonexistent screening is the most substantial security threat to any organisation when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s surprising that so many organisations would neglect physical security when protecting their data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So how can an organisation protect against these risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organisation, with little overlap or communication. Organisations now are realising that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How can companies and government agencies combine both physical data security and cybersecurity initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What type of technology can you use to protect physical data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How does FMDS work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What are the key takeaways for organisations looking to enhance data security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognising the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organisation’s data. Organisations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organisations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as this level of connectivity and collection of business-sensitive data becomes more widespread, the threat from cybercrime also rises. This is clearly an issue that affects everyone. After all, nobody is immune from cybercrime, not even the experts, which raises the question: What is the viewpoint of the experts when it comes to data security? Geoff Kohl, Senior Director of Marketing for the Security Industry Association, was keen to get the opinions of those who are experiencing the current situation with regard to data protection, and its impact on video security, first-hand. What follows is an outline of the discussion with Gregor Schlechtriem, Senior Vice President business unit Security of Bosch Building Technologies, a global player in video surveillance, and Pierre Racz, CEO of Genetec, who are world-renowned for their software in the safety and security domain. End-to-end security system According to the experts, data security starts with an end-to-end solution The introduction of a key statistic started the conversation: by 2025, it is expected that 75 billion devices will be connected to the Internet. Clearly, this also impacts video security as it is no longer isolated and part of a ‘closed’ system; it has become part of the IoT. Therefore, the focus cannot remain solely on image quality and the reduction of bitrates; equal prominence must be given to data security. According to the experts, data security starts with an end-to-end solution. For example, the consequences of having an unprotected computer inside your firewall are immeasurable; it’s like an open door to cyber criminals. To successfully minimise the risks the complete video security infrastructure needs to be considered, rather than single components. This is a key advantage of an end-to-end security system that eliminates potential weak links. Secure communication between trusted devices So, end-to-end data security solutions have their advocates, but what makes them so persuasive, and effective? Well, solutions such as those developed by Bosch and Genetec are designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted and any commands and configurations to control cameras and other devices are transmitted via a secure channel (HTTPS). When one side questions the design of the other we accept that the observation is accurate" To achieve this effectively requires collaboration, which is why, according to Geoff Kohl, an ecosystem of trusted partners is invaluable, “Risk is not the responsibility of one company. Everyone has to be working together. Bosch and Genetec are obviously doing this.” To support Geoff’s opinion, Pierre Racz believes that trust is a quality to be earned, not bought. A case in point is the 15-year working relationship between Bosch and Genetec, “The engineers know each other. We have a trusted relationship, so when one side questions the design of the other we accept that the observation is accurate.” Management of massive data In what ways can more focus be applied to data security? Although the basic task of video security systems remains unchanged, new technologies are consistently being introduced that offer new possibilities. An example of this is IP technology which, when combined with the increasing computation power, enables video security cameras to capture images of a quality that was previously unimaginable. GDPR instils an obligation to guarantee privacy by design According to Gregor Schlechtriem, “As the industry moves to delivering great image quality it creates new challenges, like how to intelligently manage the massive influx of data. On the other hand, video security devices connected to the internet and the wealth of their collective data is a fantastic enabler for new opportunities.” Video security has undergone substantial changes and offer limitless possibilitiesHe is also of the opinion that video security data should be viewed as business tool that provides insights to improve efficiency, increase security or create new business opportunities. It is clear that, compared to the earlier days, other departments, like marketing, are getting more interested in video security data. Meanwhile, as CEO of Genetec, Pierre Racz confirms that video security has undergone substantial changes and offer limitless possibilities. The change to a digital (IP) infrastructure enables the use of video analytics that deliver metadata. This metadata adds sense and structure to video data and provides metrics such as speed, direction, colour, size, object class and trajectory. The result of this enriched, more business-focused video data collection is a deeper level of business intelligence. Minimising risks Gregor Schlechtriem is only too aware that this level of connectivity also brings a higher level of risk, “Because there is valuable information included in videos we have to focus more on data security, and think beyond the basic tasks of a security system.” Pierre Racz agrees.A digital infrastructure and connectivity opens up countless opportunities The consequences of being hacked are clearly front of mind for him, “If we turn on the news today we can see the circus that has resulted from the global chaos caused by a recent cyber-breach.” By focusing on minimising these risks, Pierre Racz believes that IoT and the technology enabling us to collect and interpret video data will outweigh the risks and provide improvements in health, and wealth. The key learning here is that a digital infrastructure and connectivity opens up countless opportunities, as expressed by Gregor Schlechtriem, “It is the enabler to generate valuable data for your business, to understand what’s going on with video analytics at the edge and derive invaluable data for situational awareness to improve your business. If you don’t use IP, you miss out.” The change to a digital (IP) infrastructure enables the use of video analytics that deliver metadata Operational efficiency Pierre Racz agrees, “Compared to video cassettes we can provide so much more value with the kind of technology that can be initially utilised for security, but then leveraged for operational efficiency and even shared with other departments, such as marketing.” He also believes that, although the economic lifetime of analog equipment is almost double that of digital equipment, analog is a low pass filter, so image quality is limited to standards established in 1937. As Geoff concludes the interview and the various opinions are assessed, it’s clear that the end-to-end data security solutions such as those employed by Bosch and Genetec are the way forward for video data security. GDPR influence Considering the recent changes in European regulations, Geoff Kohl of the Security Industry Association now invites invited Gregor Schlechtriem and Pierre Racz to briefly share their thoughts regarding GDPR – one of the first official data protection acts – and its impact on solutions and business models. If these regulations are applied to Facebook, the resultant penalty will be $1.6b"Pierre Racz highlights the recent Facebook case, “If these regulations are applied to Facebook, a technologically savvy company with $40b of revenue, the resultant penalty will be $1.6b. There is no better example of why data negligence and fiduciary irresponsibility is simply unacceptable.” Gregor Schlechtriem’s point of view is that GDPR instils an obligation to guarantee privacy by design, therefore it should influence any business model from the moment of conception. “You have to bring the right ingredients to the table to guarantee privacy, it’s the responsibility of the system owner. That’s why we analysed our systems to ensure our technology was capable of meeting the requirements.” And, of course, trust. But the significance of this to people's everyday lives must also be considered; a sentiment which Pierre Racz captures perfectly, “Privacy is our democratic right.”
The term Internet of Things (IoT) has almost been beaten to death at this point, as more and more security integrators, manufacturers and customers take advantage of the ability to increase connectivity between devices (and therefore take on the dangers this introduces). But the methods by which we interact with the IoT and protect its devices are still catching up, which means security manufacturers must take part in shifting their focus toward safeguarding data, engaging in vulnerability testing of products and incorporating stringent protections at every stage of the product development process. One small leak or breach on a single connected device can potentially cause significant damage across an organisation Who is responsible for IoT security? One small leak or breach on a single connected device can potentially cause significant damage across an organisation, creating a disruption within a company, affecting its assets, employees and customers. The continued question seems to be: Who is ultimately responsible for the security of IoT devices? In a recent survey from Radware, a provider of application delivery and cybersecurity solutions, there was no clear consensus among security executives when asked this question. Thirty-five percent of respondents placed responsibility on the organisation managing the network, 34 percent said the manufacturer and 21 percent chose the consumers using the devices as being primarily responsible. Several schools of thought exist for each: The Organisation It's not surprising that most people see the organisation as the main stakeholder for IoT security responsibility; after all, if a company is managing a network, one would expect it to protect the network as well. One way that the organisation can embrace this responsibility is by adopting a user-centric design with scalability, tactical data storage and access with appropriate identification and security features (for example, the use of multilevel authentication through biometrics in access control). Organisations must also use their IT team to strengthen the overall cybersecurity of the IoT by keeping up with the latest software updates, following proper data safety protocols and practicing vulnerability testing. The Manufacturer Manufacturers that provide IoT-enabled devices as part of a security system must be fully knowledgeable of the risks involved and effectively communicate them to the integrator or end user. Providing the education necessary and dedication to protecting users of its equipment makes a manufacturer more trustworthy and understanding in the eyes of an end user. Ensuring encryption between devices is a key step that manufacturers can take to work toward achieving complete protection in the IoT. The User Despite the protection delivered by the organisation and manufacturer, there's always the option for IoT security to be enhanced or possibly even diminished by the individual user. It's critical that best practices for data protection are in place every time an individual uses a device that is connected to the network. These include disabling default credentials, proper password etiquette, safe sharing of sensitive information and the instinct to avoid any suspicious activity or requests. Manufacturers that provide IoT-enabled devices as part of a security system must be fully knowledgeable of the risks involved The short answer to the responsibility question is this: everyone. Each sector has a responsibility to contribute to the protections needed for IoT-enabled devices. However, as a manufacturer, it is imperative that our teams think about each level of protection when developing products for public consumption, including how the organisation implements the technology and how the integrator engages in training with users. Organisations must also use their IT team to strengthen the overall cybersecurity of the IoT by keeping up with the latest software updates Manufacturer vulnerability testing One way that manufacturers can implement added protections against outside threats is by boosting their attention to security protocols in the product development stage. For some, this requires a different approach in the design and development of security systems. Identifying vulnerabilities is at the core of this. A security vulnerability in a product is a pattern of conditions in the design of a system that is unable to prevent an attack, resulting in weaknesses of the system such as mishandling, deleting, altering or extracting data. Increased connectivity makes these vulnerabilities more of a liability, as IP-enabled (or networked) devices are more likely to be breached by outsiders looking to permeate an organisation and collect valuable data. A security vulberability in a product is a pattern of conditions in the design of a system that is unable to prevent an attack, resulting in weaknesses of the systemWhile some of these hacks are a little more “simple” in nature — such as outsiders trying to guess a password using manufacturer-set passwords — others are more complex, such as a denial-of-service, where attackers attempt to overload the system by flooding the target with excessive demands and preventing legitimate requests from being carried out. This makes it virtually impossible to stop the attack by blocking a single source. As a result of these potential threats — and to help manufacturers deliver best-in-class products — it's imperative that vulnerability testing is done throughout a product's development, starting at phase one in the process. This includes analysis of the type of cyberattacks that can potentially attach, breach and disable a system. Many manufacturers attempt to hack their own products from within the organisation — or even go as far as hiring a third-party professional group to do it for them. Success in a volatile technology landscape This kind of development puts a product through rigorous levels of testing, and once weaknesses are exposed, they can be patched up and the cycle of attack-and-defense can take place until the product is protected fully and ready for market. Skipping this step in the development process can open manufacturers up to significant liability, so it's important for this testing to take place and corrective actions be taken to rectify gaps in security. The more extensive an organisation's security testing approaches are, the better are its chances of succeeding in an increasingly volatile technology landscape. But the testing doesn't stop in the development stage. Attacks on a system continue long after the product has been introduced to market, requiring continued updates to be made available in an effort to protect customers. Manufacturers are tasked with implementing further firmware updates to keep a product in the field readily prepared to revoke the latest critical bugs that can affect the market. What end users demand from security We're seeing a significant shift in the education and demand from a customer perspective. In the past, consumers took the advice of integrators and consultants as far as the “right” security systems to install for their needs. Today, the self-education of end users is on the rise as more and more IT departments become involved in the selection and investment of physical access control systems. We're seeing a significant shift in the education and demand from a customer perspective A larger number of end users are demanding security products that meet IT standards of network protection, and they take these considerations into account when working with integrator partners on the selection of systems to meet their needs. As a result, manufacturers are tasked with not only developing robust IoT-centric products, but also continuing to be involved on a regular basis in an effort to continuously keep organisations safe. A comprehensive security strategy from manufacturers must involve multiple levels of product selection, testing and integration — centered on the team-based approach to implementing training and protocols within an organisation. While manufacturers are stepping up their game in the development of robust products, this remains a team effort that must be addressed every week — not something you implement, then forget about. The safety of data — and the entire organisation — depends on it.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve. However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfil a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from? What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take onboard all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theatres, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the programme. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational programme for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favourite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognisable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognises when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognisable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing a lightweight alternative “When you trigger a pathway, it’s signalling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customised to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern network infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analogue to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 metres. The products have been used recently to transition a series of cruise ships from analogue to IP video without having to replace cabling and spending only two days in dry dock for the installs. A new focus away from AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
The U.S. Congress has voted on, and the President has signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision is buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which passed the U.S. House of Representatives on July 26 and the Senate on August 1. The President signed the NDAA into law on August 13. The provision was originally introduced as an amendment to the House version of the bill but was not included in the Senate version. However, the provision survived in the final version, negotiated by a conference committee and passed by both houses. The President had previously voiced support for the bill, which authorises U.S. military spending, and signed it into law two weeks later. Scope of the ban The President has previously voiced support for the bill, which authorises U.S. military spending, and signed it into law two weeks later The ban covers “public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes.” It bans “video surveillance and telecommunications equipment produced by Hytera Communications Corporation, Hangzhou Hikvision Digital technology Company, [and] Dahua Technology Company (or any subsidiary or affiliate of such entities).” Hytera Communications is a Chinese digital mobile radio manufacturer. The final bill eliminates specific mention of “white label” technology, which refers to cameras manufactured by Hikvision and/or Dahua but rebranded and labelled by other companies such as Honeywell, Stanley or UTC. However, interpretation of the word “affiliate” could include OEM partners. The ban, which takes effect “not later than one year after … enactment,” applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a "phase-out plan" to eliminate the equipment from government uses. The requirement suggests an opportunity of additional government business for non-Chinese manufacturers and integrators involved in switching out the equipment. Mention of the words “critical infrastructure” in the final bill points to inclusion of another whole category of installations in the ban; that is, facilities operated by non-government entities that are judged to be essential to the functioning of society and the economy. The Security Industry Association (SIA) declined to comment on the bill, citing its complexity and the need to research the potential impact. Both Hikvision and Dahua have issued corporate statements in reaction to the ban. The bill can be viewed in the context of a broader U.S. political backlash against China in general Broader context of the bill The bill’s passage is a setback to the growing profile of Chinese companies in the video surveillance market. It can also be viewed in the context of a broader U.S. political backlash against China in general, as evidenced by the recent acceleration of import tariffs and simmering trade war. The NDAA also targets China in another way: it strengthens the Committee on Foreign Investment in the United States, which reviews the impact of proposed foreign investments on national security.The NDAA is an annual act passed by Congress that authorises U.S. military spending Another view is that Chinese companies invest heavily in research and development, can operate at greater scale and with lower costs, and therefore provide good overall value. For these reasons, many had expected Chinese camera products to increase their presence in the US market. The government ban, at the very least, slows down that transition. The potential is there for it to totally change the face of the industry. The NDAA is an annual act passed by Congress that authorises U.S. military spending and is used as a vehicle for a variety of policy matters. It has been passed annually for more than 50 years. The August 1 Senate vote marks the earliest Congress has passed the defence spending bill since 1978. Ironically, the final bill softened restrictions on China’s ZTE Corp. and Huawei Technologies, two telecommunications companies, because of national security concerns. These restrictions are weaker than in earlier versions of the bill. This article was updated on the 14th August 2018.
More and more police forces in the EU are getting equipped with bodycams. Recently the State Police of Niedersachsen in Germany, the Police of Mechelen in Belgium and the Police in the Czech Republic have signed contracts for the supply of bodycams by Dutch company Zepcam. Body worn video (BWV) and body worn cameras (BWC) Body worn video (BWV) and body worn camera’s (BWC) improve the safety of law enforcement officers Body worn video (BWV) and body worn camera’s (BWC) improve the safety of law enforcement officers, increase transparency and supply video-evidence for criminal investigation purposes. Surveys in the US, where bodycams are used for years now, show that they de-escalate aggression or have a civilizing effect on police-citizen encounters, thus reducing complaints. Also, police forces want to use bodycams as a countermeasure against the public shooting more and more videos of incidents on their smartphones. Unlike public videos, footages captured by law enforcement can be admissible in court. Zepcam, bodycams supplier for police forces globally Zepcam already supplies bodycams to police forces in 15 countries like Switzerland, Germany, Hong Kong and The Netherlands. The Dutch company is global supplier in Europe, with clients in over 40 countries. It both manufactures and supplies the camera systems and the IT structure which automatically stores and processes the captured footages. Zepcam has seen and enormous increase in the use of bodycams by law enforcement in the past five years The State Police of German State Niedersachsen has ordered 500 bodycams in a 4-year contract. Zepcam has won this tender because its cameras and software platform made the best match with requirements of field users and the central IT department. The region of Mechelen is the first police zone in Belgium to deploy bodycams on a large scale. Zepcam was selected after a test period with 7 different bodycam suppliers. Video management software (VMS) integration The Czech Police in the Central Bohemian Region purchased Zepcam bodycams for law enforcement purposes. Also, the company will assist the police force to expand and integrate the new video management software in the management software that is used in over 80 locations in the Czech Republic. Zepcam has seen and enormous increase in the use of bodycams by law enforcement in the past five years. According to the company the cameras help reduce aggression and allow for better transparency. For instance, because situations tend to de-escalate when people know they are being recorded.
Bosch experts for building safety are networking the IKEA MAR Shopping mall in the Algarve, Portugal with trendsetting solutions. They make sure everybody can feel at ease and safe during their shopping experience. Scores of tourists are attracted every year to the Algarve, Portugal’s most southerly region where vacationers enjoy the sun and beaches and descend on popular seaside resorts like Lagos or Albufeira. However, whenever people have had enough of sunbathing, the Algarve also offers a multitude of other things to do – whether it is hiking or shopping, there is something for everybody. Those fancying a spot of the last mentioned have every opportunity to do just that in “IKEA MAR Shopping” – an IKEA-run mall in the Algarve that is home to about 100 other brand shops. Every day numerous visitors frequent the mall and they not only present a challenge to the staff at the checkouts. The safety technology in such a mall also has to work smoothly and on the dot. It is why the architects and planners of the IKEA MAR Shopping mall decided to use a connected, smart safety solution from Bosch Building Technologies. Intuitive and fully-integrated security solution “Our customer wanted a fully-integrated solution whose systems could be controlled via a single management system,” is how Luis Gomes, Bosch Building Technologies Sales Manager Iberia, describes the remit. Networked systems that communicate with each other have to facilitate quick and precise measures in emergencies. The customer also requested a means by which they could schedule the deployment of security personnel more efficiently plus intuitive-to-operate and clearly-structured systems to make their jobs easier. The Bosch Intelligent Video Analytics software which is installed in each and every camera processes the image data in real time Together with the customer and partners, Bosch has created a harmonious overall picture consisting of a video and public address system, a fire and intrusion detection system and access control within the space of two years. It includes 1,100 loudspeakers inserted in the ceiling and 390 video cameras. The mall is equipped with a total of 4,000 fire detectors and 520 sensors for both intrusion alert and controlling access to IKEA MAR Shopping. Bosch Intelligent Video Analytics The Bosch Intelligent Video Analytics software which is installed in each and every camera processes the image data in real time and recognises suspicious activities by means of an algorithm. Whenever there is danger, it can make all the information available to the staff who need it as quickly as possible to initiate appropriate measures. For a person, it is virtually impossible to continuously retain an overview of the images provided by 390 cameras. “Intelligent Video Analytics and the complete solution make the security personnel’s everyday jobs significantly easier,” says Luis Gomes. “At the same time, the customer has lower costs – and every shopaholic can feel safe.”
Hikvision, global provider of innovative security products and solutions, is partnering with Green River, a China-based NGO that promotes and organises environmental protection activities, in particular towards protecting the bar-headed goose, one of the highest-flying birds in the world. The Yangtze River source and Bender Lake in Western China is a natural high-altitude habitat for the wild bar-headed goose. Although this area is a “no-man’s land” at 4,700 meters above sea level, it serves as a haven for rare animal species. Threatened by poachers and theft of their eggs, the number of bar-headed geese in this area once plummeted to about 1,000. In 2012, Green River launched its program to monitor and protect the bar-headed goose, with non-stop monitoring and protection of the birds and the local environment. Hikivison security cameras for wildlife monitoring Earlier this year, Green River began using Hikvision security cameras to monitor and protect bar-headed geese. Dozens of bird observation spots have been set up to implement an all-weather, 24/7 monitoring solution in the high-altitude wilderness. Hikvision has provided video technology that reduces the need for conventional manual patrol as well as the associated negative impact of human activities on bird habitats. Green River uses Hikvision equipment to stream high-definition live video to online audiences, raising awareness about the need to protect all kinds of wildlife, including the bar-headed goose. On December 6, 2018, Green River and Hikvision signed a memorandum of understanding (MoU) to continue their collaboration in 2019. Hikvision will develop customised video cameras to be used in high-altitude habitats of the bar-headed goose. The company will continue to support Green River using advanced image processing, data storage and transmission technology, to ensure the organisation can effectively collect and process wildlife data. All of this serves to secure the biodiversity and sustainability in the Yangtze River source region. Advanced video technology Public welfare and environmental protection are benefiting from high-tech applications around the globe" “Public welfare and environmental protection are benefiting from high-tech applications around the globe. In particular, video technology helps wildlife protection efforts immensely. And Hikvision has the tools as well as the willingness to help,” said Yang Xin, founder and president of Green River. He further added, “Signing this MoU is only a start. In the future, we will collaborate to promote research and conservation, and use new technologies to unveil the beauty of biodiversity.” Environmental protection Hikvision is best known as a provider of security equipment that is used to secure businesses, communities, and families. However, as evidenced by its collaboration with Green River, Hikvision’s security equipment can also be used to protect our natural world. Noting that Hikvision video technology has been used in a number of environmental protection projects, Hikvision senior vice president Cai Changyang said that the company is pleased to promote environmental protection and conservation. “In the past few years, Hikvision has accumulated valuable experience and technical know-how in environmental protection with video technology. We have engaged in the protection programs for pandas, Siberian tigers, and now bar-headed geese. But there is still a long way to go,” said Cai Changyang. “And, we will continue to explore new technologies in the future to make our own contribution to the sustainable development of the world.”
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-site CCTV surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Centre, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Centre, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defence Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defence. High-definition video security to secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfil the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedised Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analogue and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analogue systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP video streaming networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminium and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical relationship with 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centres via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-speed fibre-optic connectivity High-speed fibre-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
Globally-renowned Pay on Foot parking systems manufacturer, DESIGNA, has worked with the White Rose shopping centre in Rhyl, North Wales, to update its car parking system to the company’s advanced ABACUS software and equipment. Contactless card payment The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology After many successful installations abroad, the shopping centre is the first DESIGNA site in the UK to have installed its new tap in/tap out contactless credit card technology. The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology. There are also three full pay stations, a DBS server, manual pay station and intercom. All of this helps improve the efficiency and security of the car park, which is popular with shoppers due to its seafront location. As the first part of the shopping experience, the convenience and availability of a car park is crucial to the overall service and satisfaction of a customer. DESIGNA recognised this and developed ABACUS, an advanced car park access system that intelligently integrates various elements to create the ultimate system that is highly reliable and requires less maintenance. It can also cope with large volumes of traffic while providing the highest level of monitoring to ensure a secure parking environment. ABACUS car park access system The parking system is barrier controlled and makes use of DESIGNA barcode ticket technology. In addition to the standard ticket technology, the car park offers the facility to tap in/tap out using a contactless credit card. This operates with a unique identifier from the credit/debit card as a substitute for a ticket for the duration of the stay at the car park. When the customer presents a contactless card on entry, it recognises them and by tapping again at the exit it automatically calculates the tariff and allows payment to take place at the exit. The system has three pay on foot machines which accept coins, notes and credit cards. With more than 30 stores, White Rose shopping centre, Rhyl’s number one shopping destination, has a wide range of quality stores. Located in the centre of the town, White Rose is a short walk from Rhyl’s seafront, railway station and sea aquarium, and has direct access car parking for 300 vehicles. The centre previously had a chip coin solution installed on site. Advanced ticket machines The biggest advantage of having the DESIGNA system in place is the easy payment method" Sue Nash, Centre Manager at the White Rose commented, “The biggest advantage of having the DESIGNA system in place is the easy payment method. The advanced ticket machines make it possible to pay using several means, therefore reducing the problem of queuing at the pay machines and having to pay with change. Another payment option we now have is the facility to pay through mobile devices and via contactless cards.” She continued, “The majority of people move around with credit cards rather than cash and having a versatile payment option in the car park makes for a painless process. The maintenance of the system at our local level was extremely important to avoid costly and timely engineer callouts. Simple things like ticket and coin jams, system resets are now extremely easy to resolve as is the exchange of entry tickets when required. I would certainly recommend the DESIGNA system to others and we are extremely pleased with the results.” Car parking ease and convenience Specifier Andrew Bailey, of Parking Ideas, commented, “Parking Ideas is a complete car parking and transportation consultancy that helps institutions, property owners, landlords and managing agents develop and optimise their assets. I have worked with the White Rose shopping centre for a number of years and following a competitive tender found that DESIGNA’s systems best suited the client’s requirements.” He continued, “The ABACUS system is good value, commercially viable and ticked all the right boxes for the White Rose. It is very important to have the facility to pay by card, so the payment terminals having this feature are vital to the centre and have made all the difference to the running of the car park. Parking Ideas has been in the parking industry for more than 15 years, so we have worked with DESIGNA before and are very happy with the end result.” DESIGNA ticket terminals The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy. The advanced terminals operate on the lowest energy consumption of their class with the ability to hold more tickets than before, with the bin adapting itself to the fill quantity. Customers are greeted with excellent user-friendliness due to the simplicity of the equipment and illuminated display with clear instructions. The four-way barcode readers also ensure visitors can insert their ticket any way round into any of the pay stations around the site. DESIGNA Pay on Foot machines For payment, three of DESIGNA’s new Pay on Foot machines are in place in the car park. This allows customers to pay for their visit before returning to their car and exit the car park more quickly. The pay station is deliberately designed to allow disabled customers to pay freely without assistance. Each of the pay stations is installed with an interactive monitor that makes it easy to pay and offers several different languages. Shopping centre management has full control of the ABACUS system through the DBS server, with a manual pay station (MPS) to allow them to create or override payments. The control room also links with the ticket and payment terminals via a DESIGNA VoIP Intercom to assist customers if required. Global implementation DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations DESIGNA’s parking systems are used in a number of impressive shopping centres around the world. These include the Dundrum shopping centre in Dublin, the Mid Valley Megamall in Malaysia and the Mall of Emirates in Dubai. In the UK the Belfry shopping centre in Redhill, the Woolshops shopping centre in Halifax and the Wellgate centre in Dundee have also benefited from the ABACUS system. Recognised worldwide for its high quality and intelligent systems, DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations, including shopping centres, airports and hospitals. ABACUS is one of the company’s innovations and demonstrates the endless possibilities available to car park operators. The future-proof technology allows for expansions of premises or new property acquisitions by allowing additional systems to be added to the network. In its many global applications, ABACUS has proved to be an effortless system for both operators and users and is a great investment for companies looking to the future.
The first Starbucks coffee house opened in in Moscow in 2007 and in ten years the chain’s growing popularity across Russia has seen more than 100 outlets open. There are now several different store formats including classic coffee shops located in shopping centres; stand-alone stores characterised by open vaulted ceilings; smaller kiosk outlets; and drive-through outlets where customers can buy fragrant coffee and fresh-baked goods round the clock without leaving their cars. Following a survey of the latest solutions AVIX recommended IDIS technology as the best option for reliable, scalable video that could be remotely accessed via PCs and mobile devices. Maximum design IDIS Solution Suite was identified as the best video management software option to integrate existing legacy equipment IDIS Solution Suite was identified as the best video management software option to integrate existing legacy equipment, the analogue IDIS DirectCX range to leverage existing infrastructure as well as the latest IDIS IP solutions. The VMS also offered the most user-friendly and convenient for use not only for Starbucks security controllers but also by the senior operations managers In the classic coffee house outlets IDIS HD TVI DVRs have been installed handling either 8 IDIS cameras (TR-3108) or 16 cameras (TR-4116) depending on the site requirements. A mix of analogue and IP camera technology is used across the Starbucks estate, giving maximum design and installation flexibility. New drive-through outlets are protected by a combination of external and internal cameras. Older legacy cameras In the shopping centre kiosk outlets an easy-install and compact full-HD flat dome camera (DC-F1211) has been deployed, while a compete view of the entire point of sale is covered by a vandalresistant IR camera, the DC-D2233WR, with both cameras linked to an H.265 4K recorder (DR-2304P). With thousands of customers visiting stores every day, and hundreds of staff to take care of, Starbucks’ management wanted a robust, flexible video surveillance solution that would operate effectively in every store location and in all store formats. AVIX, a Russian distributor was challenged with designing a system that would deliver optimum quality video regardless of the store format and make use of older legacy cameras in certain locations. The system also needed to be convenient to install while maintaining the aesthetics of each outlet with the ability to focus in on sales transactions in real-time. Maintaining quality standards This IDIS solution gives us excellent video quality the operational control we need to manage our continued expansion" The system was required not just to ensure high security standards but also to be used by Starbucks’ senior operations managers to control efficiency and underwrite customer service and performance as the number of stores continues to grow. Senior staff in the Starbucks operations department, and security managers, now use the video system day-to-day, verifying working hours, maintaining quality standards and controlling incidents. “This IDIS solution gives us excellent video quality the operational control we need to manage our continued expansion. The IDIS Solutions Suite VMS is comfortable and convenient for remote monitoring and it works perfectly by allowing our current mix of IP and analogue cameras, including the latest IP IDIS models and equipment. The system is future scalable, and we will easily adapt it to changing needs.” Alim Sizov, General Manager ‘SVS Project’ – Starbucks Partner. Following the success of this first phase installation a comprehensive upgrade to IDIS video cameras is being implemented across the entire Starbucks estate.