IP security solutions
Allied Universal, renowned security and facility services company in North America, has announced the acquisition of Cypress Private Security, LP - a San Francisco-based company offering comprehensive security services. Terms of the deal were not disclosed. Manned guarding “Cypress Private Security is a company that we have long admired and always wanted to partner with,” said Steve Jones, CEO of Allied Universal. “This security company has built a brand and a culture t...
Seniors require and deserve peace of mind, knowing that help is easily available when they need it; they also need their boundaries respected, ensuring their privacy is paramount. Essence’s Care@Home solution delivers both. Essence will present its technology at Health+Care, June 26 & 27 at ExCel, London, to introduce the general availability of its offerings in the UK market. Essence SmartCare, part of the Israel-based Essence Group, is a pioneer in intelligent IoT and cybersecurity...
Advanced video projects delivered by SECOM, Johnson Controls and ISD Tech have been recognised at IFSEC with a special award event on the IDIS stand. Over the last 12 months, large-scale implementations and high definition IP system upgrades, harnessing the latest IDIS technology, have given enhanced video capability at NHS facilities, fashion chains, coffee shops, variety stores, and market leaders in the eating-out sector. Each year, IDIS invites VIP guests to recognise outstanding achieveme...
The world’s first National Surveillance Camera day is being launched by a University of Stirling academic to stimulate public debate about the spread of the technology. National Surveillance Camera day Surveillance centres across England and Wales will be throwing their doors open on Thursday 20 June, in an event planned by leading CCTV expert Professor William Webster. The national day, which is being organised in conjunction with the Surveillance Camera Commissioner, aims to reveal the...
MOBOTIX cameras and solutions rightly have a reputation for being particularly cyber-secure. MOBOTIX customers all over the world trust the reliability of products developed and manufactured in Germany to protect their images and analysis data from unauthorised access and to prevent an insecure interface from offering hackers an opening. The hard work pays off, as evidenced by the fact a MOBOTIX camera has never been hacked. “We are constantly working on identifying possible security gaps...
Security video wall and visual display solutions experts Ultimate Visual Solutions (UVS) works on projects in 15 countries around the world since its launch nine months ago. UVS changed its name from eyevis UK last September following the acquisition of eyevis GmbH by the Leyard group. Providing turnkey solutions The rebranding has allowed the company to offer an expanded range of products and services The rebranding has allowed the company to offer an expanded range of products and services...
The 230 delegates who attended the recent Tyco Engage Conference 2019 were among the first to see how Tyco, the security products division of Johnson Controls, is continuing to help system integrators grow their businesses by developing innovative solutions which capitalise on emerging technologies. ‘Beyond Security’ was the central theme of the conference held at the Melia Villaitana Hotel, Costa Blanca, Spain, which began with delegates being welcomed by Alan Riegler, Senior Sales Director EMEA, Access & Video, for Tyco, the security products division of Johnson Controls. Electronic security products We were delighted so many of our customers throughout EMEA accepted our invitation to attend this inaugural event" “We were delighted so many of our customers throughout EMEA accepted our invitation to attend this inaugural event,” said Alan Riegler. “In my opening remarks I took the opportunity to highlight how we intend to build on our reputation for developing quality electronic security products with the introduction of new market leading solutions which incorporate the very latest advances in technology.” “I was also pleased to confirm that whilst almost all Tyco products now have Johnson Controls branding, our security division products are an exception. This decision to retain the Tyco name reflects the fact that we are a well established and highly respected brand within the electronic security sector.” Video Surveillance solutions Day 1 of the conference included a wide range of presentations covering key aspects of Tyco branded Access Control, Fire Detection, Intrusion and Video Surveillance solutions. Day 2 enabled delegates to attend more in-depth presentations, as well as see live demonstrations of various solutions carried out in the fully equipped Tyco Mobile Exhibition Unit, which was parked in the centre of the hotel complex. Presentations on the company’s ongoing commitment to its Cyber Solutions Product Security Program, as well as the Tyco Cloud and Drone solutions, were among the various sessions which attracted considerable interest from the delegates. Face identification technology The event also provided an opportunity for our customers to exchange ideas" Live demonstrations of the new Tyco Frictionless access control solution were also well attended, with many agreeing that it is a potential game changer. Due to be launched at the end of 2019, this uses advanced face identification technology to provide a highly effective method of controlling access to restricted areas of a building. Johnson Controls’ sales and technical personnel were on hand to ensure that the delegates achieved maximum benefit from attending the conference. “In addition to showcasing how Tyco is no longer just focusing on traditional electronic security products, the event also provided an opportunity for our customers to exchange ideas on how to succeed in a highly competitive market,” added Alan Riegler.
barox, the manufacturer of professional standard switches, media converters and IP extenders specifically designed for video applications, has released a new Layer 2/3 DIN Rail Industrial Managed Switch, designed to meet the demands of PoE heavy video applications. A rugged, high-quality switch for use in high performance 10/100/1000Mbps Ethernet ring networks in compliance with IEEE802.x, the barox RY LPITE-802GBTME features eight copper ports with PoE, PoE + and PoE ++. SFP 100/1000Base SX/LX/ZX bays The switch allows two or more ports to build one or more fault tolerant rings, where, for example, a two-port bundle can be used to provide 120W (Max), configured as Port 1 60W/Port 2 60W, or Port 1 90W/Port 2 30W, etc. In the event of a network interruption, the ring closes automatically (in less than 20ms), to maintain the availability of the system. For the backbone, two SFP 100/1000Base SX/LX/ZX bays can be used for multi-mode or single-mode fibreFor the backbone, two SFP 100/1000Base SX/LX/ZX bays can be used for multi-mode or single-mode fibre. The switch can also be used as a stand-alone device, for point-to-point connections or connection modules. The extensive possibilities of the supplied barox management software allows the switch to be deployed in systems with high functionality demands, such as PTZ camera domes, LED illuminators, wipers and heaters – negating the need for a network injector. Supports PoE heavy applications “The new 480-Watt PoE DIN Rail Industrial Managed Switch provides installers and end-users with the power to support the latest PoE heavy applications,” says Rudolf Rohr, barox Co-founder & Managing partner. “As well as active PoE performance management and reporting, and automatic camera re-boot, the switch features extra high backplane performance for smooth video transmission at full port occupancy, and jumbo frames up to 9600Bytes are supported at 100Mbps. “Other network friendly functionality includes DMS integrated network monitoring and control, graphical network overview, device discovery, error handling, network diagnostics and sophisticated security protection mechanisms to guard against unauthorised access.”
LOCKEN’s latest innovation in cable free access control, powered by contactless technology, wins certification from health & safety regulator ATEX, in accordance with new explosive atmosphere requirements. Approved to ATEX II 2 G Ex ib IIB T4, the solution is suitable for gas delivery and regulation stations, specific hydrocarbon processing and distribution infrastructures and chemical factory enclosures. It is also suitable for areas where an explosive mixture of gas, vapour or mist may ‘occasionally’ occur in ‘normal operation’. The contactless solution meets strict legislation concerning equipment and protective systems intended for use in potentially explosive atmospheres, which are most prevalent in the energy, chemicals, timber, household waste and food and drink industries. Contactless access control How does contactless access control work? Communication and energy transfer between the key and cylinder is based on tight inductive coupling. An alternating magnetic field, which is generated by the key, transfers energy to the cylinder. Data is transferred by modulation of the magnetic field. The system is made by two coils. One coil, which generates the alternating magnetic field, is located inside the key, the second coil resides inside the cylinder. The metal parts of the key and the cylinder are designed in order to close the magnetic circuit. In order to permit good alignment of the two coils a mechanism that activates the magnetic field generation in the primary coil is implemented. A Hall Effect sensor, mounted close to the primary coils, senses a permanent magnet inside the cylinder and the magnetic field generation is activated. Energy and data transfer is only possible when the key is inserted into the cylinder and the horizontal alignment of primary and secondary coil is within few hundredths of a mm. Smart key solution Catherine Laug, Marketing Director of LOCKEN explains: “Meeting ATEX legislation guarantees that our latest access control innovation, the new contactless key, is safe to use at potentially hazardous sites, enabling us to provide the most robust and future-proof solution to our customers.” “Several large-scale organisations in the gas and hydrocarbons industries have already opted for the LOCKEN smart key solution and we are looking forward to working with many more in the future.”
iluminar, a specialty security lighting manufacturer, is excited to announce its partnership with Professional Sales Representatives (PSR) to increase the company’s services and sales presence with customers across the western United States. PSR is an independent sales agency operating in the 13 western states and Guam. Their associates bring many years of field sales experience in the security marketplace as well as the audio/video, low voltage, fire and life safety industries. Since PSR’s founding in 2001, their fundamental principles are to represent quality products from quality manufacturers. Experienced representatives “Our partnership with PSR will allow us to bring the latest solutions in lighting technology to our customer base in the western U.S.,” said Eddie Reynolds, iluminar CEO. “A key part of iluminar’s growth is building a team of experienced representatives who know our products, our value and our industry.” "We are very proud to be a part of Eddie’s team,” said Scott Crown, PSR managing partner. “We have respected the accomplishments of this brand and have enjoyed our friendship with Eddie for years. We will do great things together.”
DW (Digital Watchdog) Complete Surveillance Solutions, globally renowned manufacturer of digital video recorders, surveillance cameras and management software solutions, has announced the release of our new 5MP complete Universal HD over Coax (UHDoC) surveillance solution. The new products include 5MP Star-Light Plus color in ultra-low-light UHDoC cameras, VMAX A1 Plus UHDoC digital video recorders (DVR) and C3 CMS, a brand new remote management software for DW’s VMAX A1 Plus DVRs and VMAX IP Plus NVRs. The complete solution and individual products are ideal for users looking to discover new ROI by utilising their existing coaxial infrastructure and upgrade to HD multi-megapixel resolution image quality. Star-Light Plus Universal HD over Coax cameras 5MP Star-Light Plus Universal HD over Coax cameras offer image enhancement features such as Star-Light Plus ultra-low-light technology for clear color or monochromatic images in almost zero light, true WDR and Smart DNR 3D digital noise reduction. The new cameras come in a variety of housing options, including new vandal ball cameras with true 90° field-of-view angles and zero IR distortion. All DW Universal HD over Coax cameras are engineered to work with our new VMAX A1 Plus Universal HD over Coax DVRs to easily get new ROI from existing coaxial infrastructure. The DVR’s powerful capabilities are easily managed with an intuitive and simple-to-operate User Interface A VMAX A1 Plus DVR can record cameras with up to 5MP resolution, including 1080p video at real-time 30fps. The DVRs simplify camera installation and adjustment through Up the Coax (UTC) remote configuration, available with all compatible cameras. The DVR’s powerful capabilities are easily managed with an intuitive and simple-to-operate User Interface. Unique and dynamic features include P2P Pathfinder remote connection, camera event group recording, auto channel signal swap and live system monitoring. VMAX A1 Plus DVRs The VMAX A1 Plus DVRs can be controlled remotely via a built-in web server, our new powerful and easy-to-use C3 CMS software, DW mobile apps including the new state-of-the-art DW Mobile Plus app for iOS and Android smartphones or tablets, as well as on Apple TV with the DW Site Viewer app. The VMAX A1 Plus models are available with up to 20TB of storage. The C3 client and event server make up a remote management software suite for DW VMAX A1 Plus and VMAX IP Plus embedded recording solutions. It provides users a powerful and easy-to-use new way to monitor a system from anywhere. Full-featured yet lightweight, the software delivers simultaneous live views and playback of recorded video. The C3 client and versatile event management software support hundreds of devices simultaneously. C3 CMS provides actionable information in real-time, helping users to make more informative decisions as events happen. HD video over coaxial infrastructure “HD video over coaxial infrastructure is one of the fastest growing segments in the video surveillance industry,” said Mark Espenschied, Director of Marketing, DW. “DW makes it easy to breathe new life into that investment in cabling by swapping recorders and cameras for an instant HD upgrade. Our development of the C3 software has made it possible for us to offer powerful remote management features at no charge for which users would expect to pay a premium.”
Specialist provider of tech and cyber-security staffing solutions, La Fosse Associates, launches a first-of-its-kind pro bono recruitment and advisory practice to help charities combat the threat of a cyber-attack on their organisations. La Fosse Pro Bono will operate with charities throughout the UK. In 2018, one in five UK charities fell victim to a cyber-attack and the number is expected to continue in line with the size of the sector itself. Indeed, latest figures show there are 200,000 registered charities in the UK who between them employ almost 900,000 people and generate a combined income of £48 billion. Supporting organisations Care is a founding principle of La Fosse that extends beyond our own people" This makes the charity sector one of the largest in the UK economy and the reason why 40,000 charities experienced a cyber-attack over the last 12 months. But with tightening budgets, many charities lack the resources available to prevent these crimes from taking place. That is where La Fosse’s Pro Bono practice comes into play, as James Parker, CEO, explains: "Care is a founding principle of La Fosse that extends beyond our own people, the clients we work with and candidates we help. It is the driving force behind the rapid growth we have experienced over the last 10 years, and the reason why we are now perfectly positioned to support those organisations who need it most. With a team of over 200 people operating across the UK and the United States, we have built a national and international network of skilled cyber professionals who are among the best in the industry. Our charity partners can tap into this network to source the cyber expertise they need to protect their organisations at no cost to themselves. It is the very definition of tech for good.” Successful advisor placements La Fosse’s Pro Bono practice is unique to the recruitment industry and can already boast a handful of successful advisor placements, including: Amnesty International: Steve Wright (DPO at The Bank of England) The Natural History Museum: Simon Hodgkinson (Group CISO at BP) Comic Relief: Thom Langford (Founder at (TL)2 Security Ltd) United Response: Yolande Young (IT Director – Information Security at BP) Cancer Research: Moty Jacob (CISO at Traiana) The company, which is headquartered in London and has offices in New York and Santa Monica, has featured in The Sunday Times’ Top 100 companies To Work for each of the last seven years. Other commercial organisation A significant reason for this is La Fosse’s commitment to living the core value of ‘caring’ that is central to the company’s culture. This has made it an ideal partner of choice for those charities who have already partnered with the newly-formed Pro Bono practice, including Amnesty International. As a Human Rights Charity we are exposed to the same threats as any other commercial organisation" Mike Robinson, Head of Technology, at Amnesty International said: "As a Human Rights Charity we are exposed to the same threats as any other commercial organisation – more so at times, given the work we carry out. We can’t operate with integrity without knowing we are doing everything we can to keep our donors and activists’ personal data safe and secure.” Innovative solution “La Fosse’s pro bono advisor practice has provided us with invaluable access to advice and mentorship from an industry-leader in the security space, allowing us to continue to campaign for our causes safely and effectively." Steve Wright, a Pro Bono Advisor placed by La Fosse with Amnesty International and Data Protection Officer at the Bank of England, added: "La Fosse’s creation of a platform for pro bono work in cybersecurity is an innovative solution to solve the real problems these organisations face. [It] will allow me to give back to a cause more than I ever would be able to in donations. I believe it’s important that we help not-for-profits such as Amnesty as much as we can to enable them to carry out the crucial work they do."
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT global market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-expanding edge devices market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralised cloud computing and even coins the phrase, “Cloud computing, decentralised” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost efficiency of edge processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilising edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilising edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratisation of AI in the IP camera market. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding the global IP camera market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analysed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-processor-enabled video analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time Microprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognise how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast processing for rapid response at city level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyse traffic situations Quick local decisions on the video cameras are also used to help analyse traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-time HD video monitoring and recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-gen IP cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognised in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyse the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalisation. Each camera at the edge can be personalised to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recogniser on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI at the edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
As political winds present new challenges for Chinese companies doing business in the U.S. market, the countdown is under way to implementation of a ban on sale of Chinese manufacturers’ video surveillance products to the Federal government. Some good news is a delay enacting the wider-reaching “blacklist” aspects of the ban. Meanwhile, possible sanctions to prevent U.S. manufacturers from selling components to Chinese companies are posing immediate public relations difficulties – and the possibility of eventual more tangible ones. Chinese ban imposed by U.S. government The “Chinese ban” provision [[Paragraph (a)(1)(a) of section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019] prohibits Federal government procurement of “equipment, systems, or services provided by specified entities.” The “specified entities” are Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. Hikvision and Dahua are two of the largest manufacturers of video surveillance equipment, and Huawei manufactures HiSilicon chips widely used in video cameras. NDAA specifies that the ban be implemented within a year of the law taking effected The “Chinese ban” provision is an open Federal Acquisition Regulations (FAR) Case, and a proposed FAR draft rule is due in early June. NDAA specifies that the ban be implemented within a year of the law taking effected (signed by President Trump on August 18, 2018). Blacklisting integrators that sell Chinese products Implementation of a “blacklist” provision has been spun off into a separate FAR Case, and enactment has been delayed allowing time for public comments on its ramifications. The provision [Paragraph (a)(1)(B) of section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019] addresses “entities that use covered equipment.” As it relates to the video surveillance market, this provision has been interpreted to mean, for example, that an integrator that sells Hikvision equipment to anyone (e.g., to a small retailer) would be banned even from selling non-Hikvision equipment to the U.S. government or ‘recipients of Federal loan or grant funds.’ Obviously, this represents a broader impact on the industry compared to the Chinese equipment sale ban. The government’s stated reasons for the delay include concern about a dramatic reduction in the available industrial base Reduction in available industrial base The government’s stated reasons for the delay include concern about a dramatic reduction in the available industrial base (including small business suppliers), who will no longer be able to sell to the government, either because their non-government business is more valuable, or due to the cost of the potential regulatory burdens associated with compliance. Another concern is that Federal grant recipients in rural areas may be ‘disproportionally impacted … due to the limited number of market options in rural areas.’ The delay will allow time for a public meeting to solicit input on the proposed rulemaking The delay will allow time for a public meeting to solicit input on the proposed rulemaking. In fact, the Department of Defense (DoD), General Services Administration (GSA) and NASA (National Aeronautics and Space Administration) are hosting a public meeting on July 19 from 9 a.m. to 3 p.m. at the Department of Interior (DOI) Auditorium in Washington, D.C. Interested parties may also attend virtually via the Internet. NDAA ban on Chinese technology, equipment Furthermore, a proposed rule of implementation will be published, followed by a second public meeting. The Office and Management and Budget will solicit feedback on proposed changes to existing grants and loans and consider public comments and feedback prior to finalising changes. The White House has sent a legislative proposal to Congress to "adjust certain implementation deadlines to allow for additional stakeholder engagement." The Federal Acquisition Security Council would be tasked with submitting a report “containing a discussion and recommendations regarding any changes required for effective implementation of that section.” Do these processes represent hope for leniency? Hikvision targeted in ban The NDAA ban is one of several issues facing Chinese companies in the U.S. market The NDAA ban is one of several issues facing Chinese companies in the U.S. market. Another is snowballing backlash about the involvement of surveillance companies in human rights abuses at detention camps in the Xinjiang region of China. For example, a number of Congressmen and Senators have sent a letter asking the U.S. State Department and Treasury to impose sanctions, export controls and financial disclosures to counter the human rights abuses. In response, Hikvision has retained human rights expert and former U.S. Ambassador Pierre-Richard Prosper to advise the company regarding human rights compliance. According to a company spokesperson: “Hikvision takes these concerns very seriously and has engaged with the U.S. government regarding all of this since last October.” (See Hikvision USA’s full statement here.) Furthermore, Hikvision expressed optimism at the ISC West trade show. The Trump administration has also singled out Hikvision and is considering seeking limits on the video surveillance giant’s ability to buy American technology, similar to a ban already implemented against chipmaker Huawei. HiSilicon chips, manufactured by Huawei, currently run millions of security cameras across the United States, and several video camera manufacturers are rethinking their use of HiSilicon chips in wake of the ban.
While most security teams are focused on preventing malicious outsider attacks, recent data suggests that close to 30 percent of confirmed breaches today involve insiders. Today’s increasingly complex networks across physical, information technology (IT) and operational technology (OT) systems make it difficult for security teams to detect and prevent insider threats. This is compounded by the proliferation of data, devices, applications, and users accessing networked resources. Rising insider malicious attacks threat As the threat landscape evolves rapidly, CISOs need to step up their game According to the 2017 U.S. State of Cybercrime Survey, 50 percent of organisations experience at least one malicious insider incident per year. And the Verizon 2018 Data Breach Report found that close to 30 percent of confirmed breaches today involve insiders. In August 2018, a tragic crash involving a Seattle airplane stolen by an employee raised awareness for the need for physical insider threat awareness (as well as more psychological screening before employment). As the threat landscape evolves rapidly, CISOs need to step up their game, says Aamir Ghaffar, Director of Solutions Engineering at AlertEnterprise. They should implement security controls that protect their company’s people, physical assets, data, intellectual property, and reputation both inside and out. And they need to do it while simultaneously satisfying industry compliance requirements. In response to our questions, Aamir Ghaffar offered some additional insights on the timely topic of insider threats. Q: We are hearing discussion about the emergence of cyber-physical security systems. What are they and how do they help organisations address insider threats? Threats now originate not only in the physical space but also in cyber environments Ghaffar: The concept of convergence has evolved in response to risk and the overall threat landscape. Threats now originate not only in the physical space but also in cyber environments – this is what is commonly referred to as blended risk. These blended risks require a converged approach and a converged view of security as a whole; connecting data, building new capabilities and gaining new insights to allow security teams to better defend against attacks. Q: How are organisations responding? Ghaffar: They are shifting towards centralisation – from the security operations center all the way to the executive level, where one C-Suite executive manages all security across physical, IT and OT domains. According to Gartner by 2023, 75% of organisations will restructure risk and security governance to address new cyber-physical systems (CPS) and converged IT, OT, Internet of Things (IoT) and physical security needs, which is an increase from fewer than 15% today. Q: How does the shift impact insider threats? Ghaffar: Unifying cyber and physical unlocks powerful new capabilities. For example, cyber-physical teams faced with a threat such as an intrusive device planted within their network environment, can quickly connect the cyber footprint to a physical location – understanding where the threats originate and identify those responsible for bringing it in. Converging physical and cyber identity through platforms that connect physical access control, IT and OT systems is an example of how organisations can better prepare for blended security threats An AI-enabled automated system is the most practical and human error-proof solution today Q: How is AI being used to protect against insider threats? Ghaffar: With increased security convergence we are now collecting such a large volume of data that relying on manual detection of insider or external threats is no longer a viable solution. An automated system, powered by artificial intelligence used with digital identities, is now the most practical and human error-proof solution today. AI and machine learning (ML) technology helps organisations map complex patterns of user behavior, process tens of millions of events within seconds to detect threats in near-real-time and respond swiftly. This benefits security operations personnel to go from distraction to action, allowing them to focus on what really matters, which are their most critical security events. Q: Sometimes the threat is about human error. Oftentimes we think the most harmful insider threats are intentionalGhaffar: Oftentimes we think the most harmful insider threats are intentional; however, unintentional user behavior and negligence could have serious ramifications for an organisation. Organisations should deploy technology that delivers automation and active policy enforcement to prevent employees from making inadvertent yet critical errors. Organisations should also do regular risk assessments – not one and done. Don’t implement a process and think you’re secure. Automated identity and access management technology can provide scheduled access reviews to help detect high-risk user profiles with accumulated or a toxic combination of access, as well as segregation of duties violations due to department change or job transfers. Q: What are the biggest misconceptions about insider threats? Ghaffar: First, that the biggest threats originate outside my company. Or that insider threats are a problem for government agencies and highly sensitive organisations, not “regular” companies like us. A company may also mistakenly think that they have limited assets that could be exposed, or that the assets are of little value; therefore, a large-scale breach is less likely to happen. And even if it does, it probably won’t have a big impact. Risk management leaders should start by developing a compelling visionQ: So, they think “it can’t happen here.”? Ghaffar: Yes, and they think their employees are inherently trustworthy, and that with basic security measures in place, the risk is small. They think that insider threats are always intentional. Or they think “it’s not my job.” Q: What next steps should security leaders take in addressing insider threats in their organisation? Ghaffar: Security and risk management leaders should start by developing a compelling vision and strategy that will resonate with key company stakeholders. They can expand the visibility they have into user activity beyond things that happen on the network. Go beyond a data-centric approach to a people-centric approach through identity behavior analysis. Improving visibility into user activity and taking a more preventive approach are the best ways to manage risk of an incident. Develop an inside-out approach to security. By converging physical, cyber and OT security you’ll gain a holistic view of your enterprise-wide security landscape.
King Chulalongkorn Memorial Hospital (KCMH) is a public medical facility in Bangkok, Thailand. The hospital is operated by the Thai Red Cross Society and functions as the teaching/training medical center for Chulalongkorn University’s Faculty of Medicine as well as the Thai Red Cross College of Nursing. With 1,479 in-patient beds, it is one of the largest hospitals in Thailand. Bhumi Siri Mangalanusorn Building (BSMB) is the largest Centre for Medical Excellence in Thailand. The building has 34 floors and total area of 225,000m. Gallagher security solution benefits Can integrate with other systems, such as Symphony video management software, building automation, parking and fire alarm systems Has a user-friendly Graphical User Interface (GUI) Is highly reliable and scalable, to meet future security needs Can meet increasing compliance requirements Supported IT industry standards for integration, XML, SQL, OPC, BACnet, etc Gallagher and AES Group Ltd, the local Gallagher system integrator, worked closely with the designer to ensure that the proposed system met the tender requirements of securing the hospital and protecting staff, patients and assets. The system is fully integrated, scalable and expandable, digital-based, user-friendly and crucially, a combination of enhanced operational efficiency and cost saving. Gallagher Command Centre Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems, including fire alarm, video management system, building automation and parking, and feed the information into Command Centre. KCMH Security Manager, Adul Karutbumrung, says having one central monitoring platform ensures operational staff quickly identify, locate and respond to any risks on site. “The Gallagher system provides us with a higher level of validated access control in critical areas”. Centralised operation platform Gallagher’s system streamlines operations for KCMH to lower total cost of operation through its centralised operation platform. The user-friendly GUI also delivers the best value to reduce training time. In addition to meeting KCMH’s requirements for security, privacy and compliance, Gallagher provides additional benefits and features not available in other systems. Its scalability ensures that future expansion requirements can be addressed in a cost effective manner.
Two years ago, LABS opened up its new co-working facilities in Camden Market and has a number of locations centered around this iconic area of London. LABS isn’t just popping up in random locations but creating a co-working ecosystem of interconnected buildings and communities. Many companies who hire space are high tech, therefore they expect the facilities they work in to include the latest technology. The challenge LABS faced when developing a co-working environment was to offer a safe and secure working environment that is easy to use by both the clients and staff and uses the latest technology features and provides flexibility and future proofing. Gallagher Command Centre The Gallagher solution was specified for the project because of the central hub it provides The Gallagher solution was specified for the project because of the central hub it provides as well as its ability to integrate with a number of products, such as visitor management software (VMS) and CCTV. The Gallagher Channel Partner was able to offer a tailored security package that ensured LABS premises are safely monitored, guaranteeing smooth day-to-day operation. The buildings are managed by Community Managers, whose role is to understand all the companies and people who work within the LABS buildings. With this understanding the managers can bring the community together and help create beneficial relationships. Community Manager at Camden, Fran, is able to use Gallagher Command Centre for a number of tasks such as monitoring who enters the building including visitors, checking which meeting rooms are reserved, what hospitality is required etc. Bluepoint Real-Time Access Management LABS also use Bluepoint Real-Time Access Management (RAM), which integrates with the Gallagher Visitor Management system to create and modify cardholders and groups. Commands sent from the integration provide muster functionality and enables Community Managers, like Fran, full visitor and staff journey awareness. In order to attract new clients, the building runs open events and also allows people to book a tour. Guests will receive a QR code on their mobile phone so they can enter the building. Fran will receive a notification to say her guest has arrived so she can meet them and show them round. People within the building can also use the same functionality for visitors. Mobile access control Leases can be short, medium or long term and range from the occupation of offices to desks Everyone who works within a LABS building has access to an app so they can book meeting rooms seamlessly, find talent, swap skills, and engage with the community. This is the customer facing tool which links to Command Centre to ensure when someone books a room the relevant people are notified, and the system is updated. Leases can be short, medium or long term and range from the occupation of offices to desks. This means there are lots of leases starting and ending at different times making it difficult to keep track. By integrating with Command Centre access can be instantly revoked should a lease lapse, saving Community Managers time by not having to manually deny access.
New Covent Garden Market is a London icon with a history dating back to medieval days. Now the largest wholesale market in the UK, it has been feeding and flowering London every day for over 40 years. Brand New Covent Garden Market is the next evolution of the market, transforming the site into a 46,500m2 better, modern trading space during a phased build between 2015-2021. As a place of significance in a highly sought-after central London location, with hundreds of food and flower traders, suppliers and customers operating in the early hours every day, Brand New Covent Garden Market required an access control system that offered more than just granting door access. Gallagher access control solution Having successfully used a Gallagher access control solution for over 20 years in New Covent Garden Market, the decision to stay with Gallagher to meet the unique requirements of the new development was simple. New Covent Garden Market has worked with a Gallagher certified channel partner for a number of years, so facilities manager Jo Breare said they trusted their advice when deciding which access control system to go with. “The Gallagher card reader system has always worked for us,” says Jo. “With the developments in Command Centre, including the ability to customise features such as reporting, and integrating with CCTV and Nedap Transit Readers, we knew we had a system that suited our requirements. There were also fewer problems as we moved to the new site because staff and card users already understood how the system worked, causing minimum disruption.” Integration between Gallagher’s access control solution and Nedap technology has provided great benefit to the market Integration with Nedap technology Integration between Gallagher’s access control solution and Nedap technology has provided great benefit to the market. Each trader pays an annual fee to trade and enter the market. They are then given a tag so when they drive into the car park the market knows who does and doesn’t have access. Parking without a permit is very costly at £200 for 24 hours, so permits are an important part of the traders’ membership. During renewal time at the end of October each year, Gallagher Command Centre makes it easy to produce a report detailing the permit holders, which is then used as the basis for a mail merge to email renewal notifications to all traders. “Permits are one of the biggest sources of vehicle site management information and control for the market,” said Jo. He adds, “The renewal period could be a busy and stressful time, but the reporting function in Command Centre makes it quick and simple for all involved.” Groups have been created to allow access to different parking areas. Flower traders and suppliers park in their designated car park, while food traders and suppliers only have access to their designated car park. Parking lot access control Several customisations have also been created to support the unique operating environment of the market. Zone counting of underground parking spaces hired to local companies mean if an allocation is full, anyone trying to badge in from that company will not be granted access. A report on vehicle sizes to map car park sizes was also created and although this was not implemented, the data can be captured if needed in future. Traders contact the New Covent Garden Market Authority to revoke access for former employees and check if they have accessed the car park since leaving. They can also check if anyone is parking out of hours. This information can be easily pulled from Gallagher Command Centre and put into a simple report, saving time and providing value for traders. FLIR CCTV system The CCTV footage will be shown in the Command Centre workspace, keeping all security and access control in one place. When planning Brand New Covent Garden Market, the commercially-savvy organisation designed the New Covent Garden Market Authority’s office area to include office space available for rent. With a Gallagher access control solution in place, tenants will be able to easily enter their offices, manage users and grant parking access, with the peace of mind that their office is safe and secure. The next stage of the project is to connect Gallagher Command Centre with Flir CCTV, which is a well-established integration. The CCTV footage will be shown in the Command Centre workspace, keeping all security and access control in one easy to manage place. “The Gallagher system has provided us with everything we need and more,” says Jo. “It sees the most use during renewal times but on a day to day basis the system works happily in the background.”
As a major transportation hub in Northeastern China, Changchun Longjia International Airport processes a huge amount of passengers every year. In response to massive economic growth in the region, the airport – with a total volume of almost 13 million passengers in 2018 – needed an additional terminal. Built over the course of three years, the state-of-the-art Terminal 2 building covers a total area of 55,600 square meters. Since its opening in October 2018, the expansive Terminal 2 building has been serving all domestic flights from 22 airlines including Air China, Shenzhen Airlines and Shandong Airlines while international flights are now concentrated in Terminal 1. Meeting airport security guidelines Bosch received the contract based on a proven track record of large-scale airport security installationsLooking to safeguard this vital new infrastructure, the airport security managers wanted to integrate video security, intrusion detection, public address and access control for staff within one platform while meeting current government security guidelines for airports. Since 2017, these laws include mandatory storage of all video data for a 90-day period, which puts a premium on adequate data storage in a space covered by over 1,000 cameras around the clock. Given the project’s massive scale, managers wanted to work with a one-stop provider to ensure seamless integration of all solutions and delivery according to stringent timelines with end-to-end security intact on opening day. After diligent market research, Bosch received the contract based on a proven track record of large-scale airport security installations and the ability to connect all components – video security, intrusion alarms, access control and public address systems – on the Building Integration System (BIS). Installation of IP dome cameras Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh wintersFor video security, Bosch experts installed nearly 1,500 cameras inside and outside Terminal 2, including moving cameras such as the AUTODOME IP 4000i and IP 5000i and FLEXIDOME IP 6000 VR series. All IP-based cameras are centrally managed on the Bosch Video Management System (BVMS) and support security personnel by detecting threats and triggering automated alerts via built-in Essential Video Analytics. Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh winters. And to maintain a small data footprint while meeting the legal obligation for 90-day data storage, the cameras use efficient H.265 compression technology, thereby reducing bandwidth to a low 2 Mbps and storage space by up to 50 percent compared to other cameras. As a direct result, security managers in Changchun have been able to achieve savings in the number of networked storage units as well as energy consumption and cooling cost for the server room. Unified management of access control “The reduced bandwidth leading to a fewer number of storage cabinets in the server room was a major reason why our client opted for the Bosch solution,” said Mustaine Hu, Technical Support Manager at Bosch Building Technologies. The Building Integration System supports unified management of access control for airport personnel at 350 doorsMeeting another key customer requirement, the Building Integration System (BIS) from Bosch supports unified management of access control for airport personnel at nearly 350 doors. A combination of card reader and video security eliminates the risk of non-employees accessing critical areas with a stolen card and creates a seamless passage for authorised staff without additional screening. Bringing security full circle, the installed public address system allows security personnel to broadcast real-time announcements via more than 1,200 ceiling loudspeakers. The system ensures controlled evacuation in emergency situations and also sounds alarms triggered by connected intrusion sensors to alert personnel. Security for travellers and personnel Fully operative since the grand opening of Terminal 2, the Bosch system now provides end-to-end security for travellers, personnel and property at Changchun Longjia International Airport. As a scalable and IP-based system, it is future-proof to accommodate further expansions and has delivered cost savings on video storage and power consumption since day one. In face of China’s rapid economic growth, about 200 of the country’s 497 airports will require similar expansions over the coming years, making Changchun an important reference for Bosch Building Technologies in the region.
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced it was selected to help protect the security of Independent Express Cargo Ltd. (“Independent Express Cargo”) in Dublin, Ireland. Independent Express Cargo is one of Ireland’s largest pallet delivery operators, serving as a national transport network hub and full third-party logistics supplier with 25 depots across the country and over 1,000 active clients. Avigilon Control Center VMS To improve security throughout its Dublin site, which consists of 180,000 square feet of warehouses on a nine-acre site, Independent Express Cargo worked with integrator Usee.ie to install a complete Avigilon security solution. The new system features Avigilon Control Center (ACC) video management software, which provides security operators with a more efficient way to manage video from a central location. ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities, including Avigilon Appearance Search and Unusual Motion Detection technologies. Additionally, a combination of Avigilon cameras — including the H4 Pro, the H4 Multi-sensor and the H4A Bullet with self-learning video analytics — were deployed to achieve optimal coverage while allowing security operators to leverage the benefits of real-time analytics. Incorporating advanced AI technologies By implementing a complete Avigilon security solution that leverages advanced AI technologies, Independent Express Cargo has seen an increase in operational efficiencies and improved security of its sites, assets and resources. “With complete security solutions from Avigilon, we have been able to increase the speed at which we can detect events across our sites,” said Owen Cooke, director of Independent Express Cargo. “In the fast-paced environment of transportation logistics, this has dramatically increased efficiencies so that we can continue to focus on our number-one priority: our customers.” Intelligent video security system “Avigilon AI and analytics allow our customers to improve operations while maintaining system flexibility and ease of use,” said Bernard Pender, chief executive officer of Usee.ie. “Choosing Avigilon helps us meet our client’s goal of deploying a highly intelligent and user-friendly video security system.”
Senstar, global provider of video management solutions and perimeter intrusion detection systems, has published a case study detailing how its Senstar Symphony video management system (VMS) and video analytics are helping Ferretería Ochoa secure spaces and gather business intelligence. Senstar Symphony VMS Ferretería Ochoa is a hardware and home improvement retail chain that has been operating in the Dominican Republic for over 45 years. Symphony was first installed at one of its retail stores in 2013 and is now being used at six locations, including a storage facility and a manufacturing facility. Ferretería Ochoa also uses several of Senstar’s video analytics to better understand customer and employee behavior. One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control. This not only refers to shoplifting by customers, but also to errors – accidental or intentional – made during shipping and receiving. Employees are aware they are being monitored at all times and understand the system’s ability to capture incidents and provide proof. Central video monitoring “It dissuades deceitful and malicious situations such as shipping more items than ordered or a more expensive item,” said Mr. Gomez. “The deterrence factor Symphony provides is probably the most important result we have achieved.” Symphony has also enabled Ferretería Ochoa to utilise security personnel more efficiently and has reduced costs by having video from all sites managed from one central location. Retail security “Senstar Symphony and analytics are ideal for retailers looking to deter theft, protect staff and customers and improve the overall customer experience,” said Senstar’s Director, North America Business Development Anthony Hackett. “We are happy to be helping Ferretería Ochoa achieve such results.”
Round table discussion
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
Ethical hackers are familiar to the world of cybersecurity. As cybersecurity awareness increases in physical security, they are also playing a larger role to ensure the safety of networked and information technologies used in our market. We asked this week’s Expert Panel Roundtable: What is the role of ‘ethical hackers’ to ensure cybersecurity of networked products in the physical security market?