IP security solutions
The Horwitz-Wasserman Holocaust Memorial Plaza, located in the heart of Philadelphia, is a living testament and tribute to the victims of the atrocities of the Holocaust. The goal of the Memorial Plaza is to educate visitors on this shameful time in history and compel them to work towards a world of tolerance and enlightenment wherein nothing like this could ever occur again. The Delaware Valley Intelligence Center (DVIC), weighed in on the needed security measures. Under the institutional umbr...
Managing keys and high value assets can now be used seamlessly within centralised management platforms, following the integration of Maxxess eFusion with Traka from ASSA ABLOY Global Solutions, globally renowned provider of intelligent management solutions for keys and equipment. Traka solutions “With Traka solutions globally deployed in many market sectors such as critical infrastructure, retail, logistics, hospitality and corporate environments - and increasingly integrated with access...
360 Vision Technology, globally renowned UK-based CCTV manufacturer, has announced that they will showcase their latest range of high-performance surveillance cameras on the Nukleas Integrated Security Solutions booth, Sheikh Saeed 2, G35, at Intersec 2020, 19-21 January, Dubai. ‘TX’ video transmission cameras For those looking for a reliable 3G/4G/LTE ‘wireless’ camera video solution, 360 Vision will be showing the ultimate performance Predator, Invictus and lightweigh...
Outdated camera firmware and failing to change default passwords present some of the biggest weaknesses in cyber security defense. As the number of interconnected security devices keeps on growing, keeping pace with the latest updates can be tricky and very time-consuming. According to new research conducted by Genetec Inc. (“Genetec”), a technology provider of unified security, public safety, operations, and business intelligence, as many as 68.4%¬—or almost 7 out of 10&md...
Access Control is always a very critical aspect of an organisation's overall security strategy. Regardless of its size, it is inevitable for any organisation to have a flexible and comprehensive access control solution. To connect separate areas in the single location requires a standalone access control. For small and medium organisation, Matrix has designed a standalone Access Control solution for small organisations, while keeping security and simplicity in mind. This innovative solution work...
VCA Technology, a UK provider of video analytics, announced the release of VCA Server, an AI Deep Learning based video analytics software suite which provides a key upgrade to the company’s flagship VCA Core platform. Offering simple integration with VMS and NVR manufacturers’ technologies, the new release ensures that sophisticated analytics can be set-up and installed within as little as fifteen minutes, allowing end-users to significantly reduce false alarms with minimal disruptio...
Bird Home Automation Group, a provider of IP video intercom technology, announces a partnership with SIP solution provider AV LinkPro. Through this strategic partnership, Bird Home Automation now offers an easily deployed option for its DoorBird product line, specifically its MDU video intercom stations, to make calls to IP, cellular and landline phones. Since its founding in 2014, Bird Home Automation has formed partnerships with many other industry pioneers to meet the demands of its customers. Pairing with AV LinkPro, Bird Home Automation can now deliver an app-based intercom solution that sends alerts, live video and 2-way audio communication via smart devices while also calling up to 5 IP, cellular or traditional landline phone numbers. Dedicated indoor stations This all-in-one solution comes without the need to rewire the building or the hassle of looking for and implementing a new SIP service provider. Thus, door communication becomes easier and more comfortable than ever before in multi-tenant, commercial and single-family residences. What makes this solution the first of its kind is the flexibility and scalability with which it can be deployed" “What makes this solution the first of its kind is the flexibility and scalability with which it can be deployed. In one apartment building, tenants can be communicating with visitors using the DoorBird app, phone calls and our dedicated indoor stations in any combination,” said Andrew Knuesel, Head of Sales, DoorBird US. AV LinkPro provides a unique platform bridge for connecting a combined SIP, IP and TCP/IP integration into a seamless, fully functional solution. Commercial and residential applications AV LinkPro systems were designed and developed to assist installers and integrators with the task of connecting IP intercom systems with VoIP telephony solutions for a variety of commercial and residential applications. The solution is designed to bridge connectivity with a variety of products to create a unified, fully connected communication solution. “We are pleased to partner with DoorBird in order to provide our SIP intercom to telephone bridge allowing a cloud-based point of management for both the building administrator and the individual residents in order to be able to enhance their intercom experience with the addition of telephone communication from the front door,” said Jon Miller, Product Manager, AV LinkPro.
AAEON Atlas helps increase safety, energy efficiency, and cut costs for Smart Cities thanks to the power of Intel Movidius Myriad X. AAEON, globally renowned provider of Smart City solutions, announces AAEON Atlas, a rugged outdoor edge node built to provide cities with flexible solutions for AI and edge computing. Featuring the Intel Movidius Myriad X, AAEON Atlas offers real-time processing for a range of Smart City applications. AAEON NanoCOM-APL board AAEON Atlas is based on the compact AAEON NanoCOM-APL board, featuring the Intel Atom x7 AAEON Atlas is based on the compact AAEON NanoCOM-APL board, featuring the Intel Atom x7, providing efficient computing with low power consumption. Designed with an IP66 rated fanless chassis, it can be installed onto any streetlamp, making it easy to quickly setup and deploy. It also features connectivity with WIFI, Gigabit Ethernet, or even 4G/LTE for flexible communication within an edge network or with a central cloud server. The AAEON Atlas also features built-in cameras and sensors for data collection and analysis. The key feature of AAEON Atlas is the embedded Intel Movidius Myriad X vision processing unit (VPU). The Intel Movidius Myriad X provides a low-power, high-performance solution for on-device AI inference. AAEON Atlas is compatible with the Intel Distribution of OpenVINO toolkit, which includes built-in features such as model optimisation, hardware acceleration and more designed to maximise the capabilities of the Intel Movidius Myriad X VPU. License plate recognition AI inference AAEON Atlas can be deployed in a wide range of edge computing applications. As an edge gateway, AAEON Atlas can connect with up to 200 smart street lights, providing intelligent control. With license plate recognition AI inference, AAEON Atlas can power applications such as Smart Street Parking or detecting traffic violations or accidents. With traffic and congestion monitoring, AAEON Atlas can optimise traffic signals in real time to help improve traffic flow. AAEON Atlas can also anonymously detect pedestrians in crowd control and flow monitoring applications. AAEON Atlas also comes with the full end-to-end support offered by AAEON. From concept to customisation to setup and deployment, AAEON provides customers with full support to ensure their Smart City solution is ready to go from day one. AI analytics “With AAEON quality and expertise, AAEON Atlas is the solution built to carry the weight of Smart City applications,” said Kevin Ting, Senior Product Manager with AAEON’s New Business Development division. “Whether as an IoT/AIoT gateway or providing real time AI analytics, AAEON Atlas uses the latest in Intel Vision Products to provide invaluable edge computing processing for Smart Cities.”
Integrated security systems manufacturer, TDSi will be joining its Vitaprotech Group partner, SORHEA on stand SA-N37 at Intersec 2020 in Dubai, from 19th-21st January 2020, where it will be unveiling and launching an exciting new GARDiS product. TDSi’s Managing Director, John Davies commented, “We are very excited to be launching a new product at Intersec 2020. Vitaprotech’s Acquisition of TDSi has enabled the acceleration of some product development projects in our pipeline. This product had been earmarked for a late 2020/early 2021 release but work on this has been accelerated thanks to additional resources from the Group and we will now be launching 12 months ahead of plan. The main focus of this development has been to ensure time and cost saving for our installer partners in order to enhance their profitability and deliver state of the art access control to their clients.” TDSi range of integrated security solutions The Dubai event in January 2020 will be TDSi’s first shared exhibition stand with a Vitaprotect Group Joining John on Stand SA-N37 in Dubai will be TDSi’s Business Development Manager, Mica Negrilic and TDSi's Senior Export Technical Support Engineer, Kevan Fry. John continued, “Mica, Kevan and I will be on hand to give products, sales and technical advice on the new product and the wider TDSi range of integrated security solutions. We are keen to speak to security installers, systems integrators and end users about their requirements and specific security needs.” The Dubai event in January 2020 will be TDSi’s first shared exhibition stand with a Vitaprotect Group partner since the company announced its acquisition by the Group in June 2019. John added, “We are excited to be appearing at Intersec with SORHEA, whose perimeter intrusion detection systems offer a perfect complementary solution to our integrated access control solutions. We are looking forward to meeting new and existing partners and customers at the event and to introducing the enhanced offering we now provide as Vitaprotech Group members.” Intersec 2020 Intersec is a globally renowned trade fair for security, safety & fire protection, with an influence that has spread not only across the Middle East, Africa and the Indian subcontinent but also attracts visitors and interest from well beyond. Last year’s event drew 34,800 visitors (20% up on the previous year) from 135 countries to meet with more than 1,200 exhibitors. John concluded, “Intersec is always an exciting introduction to a year ahead in security and Dubai is the perfect location for visitors to attend from across the Middle East and beyond. If you are visiting the event, why not come to Stand SA-N37 to meet our friendly team and get an exclusive look at our newest product.”
Swedish smart home technology specialists, Minut, led by former senior executives at Apple and Google, today announces the availability of its easy to install, all-in-one wireless smart home alarm in the UK. The Minut alarm will be distributed in the UK by smart home specialists Thames Distribution and is available from Minut.com and Amazon UK for £129. Minut believes that every home should feel safe and has executed on the vision to make home security smart, simple and accessible for every home. The Minut smart home alarm has no cameras, no data loopholes, no pricey long term commitments and no complicated and expensive installation. Never listening or watching, Minut will only react when required, ensuring users always know what’s said at home, stays at home. Minut smart home alarm Connecting to the home WiFi, the Minut smart home alarm is wireless and ready to work anywhere in the world Designed to sit discreetly on the ceiling, it may be small but Minut is packed with 5 sensors and a siren, ensuring the home is safe when occupants are out and that it remains a comfortable environment when they are home. Connecting to the home WiFi, the Minut smart home alarm is wireless and ready to work anywhere in the world. Anyone can install Minut themselves -- a mounting plate securely sticks on the ceiling and the sensor clicks right in and can be readily moved to another location as desired. PIR motion sensor The Minut smart home alarm contains a PIR (passive infrared) motion sensor underneath the lens, which detects the heat energy emitted by living things. The device monitors the environment it’s in and keeps track of the number of ‘motion events’ that occur. If the alarm is activated and a motion event occurs, an instant notification will be sent via the app. Even if the alarm is turned off, users can monitor the motion levels around the device. Minut also monitors the sound level of the environment it’s in. The app allows users to set custom thresholds, so if the volume ever goes above a pre-set decibel level they will receive a notification on their phone. Temperature monitoring Minut monitors the temperature in an environment and can alert users to any increases and drops. It is possible to set customised high and low temperature levels, and if the environment goes above or below them a notification is instantly sent. This feature can alert people to potentially dangerous situations such as leaving the oven on, the heating breaking or leaving a window open. The device also monitors a home’s humidity levels. Humidity levels can negatively impact on sleep and overall health and some of the health risks from over exposure to high humidity include dehydration, fatigue and muscle cramps. Built-in alarms for sound recognition The in-built sound recognition in Minut can detect other alarms going off in the home The in-built sound recognition in Minut can detect other alarms going off in the home. If users have a smoke, CO2 or radon alarm installed and it starts to sound, Minut will pick up on this and instantly notify of the potential threat. Through the combination of monitoring the temperature and humidity in the environment overtime, Minut can analyse the risk of mould growing. Users will be alerted in the app and offered suggestions as to how to reduce this risk. Automatic Nightlight The latest feature to Minut, the Nightlight, automatically lights the way when occupants walk under the device at night. The app allows users to choose which hours of the night they would like the feature to be on for, or turn it off entirely. The Minut app allows users to set up and control their Minut Smart Home alarm, to wirelessly monitor and protect the home, anywhere, anytime. It takes just a few minutes to install and connect and the incredibly quick and easy to use app lets users control the alarm, set thresholds, add friends & family to their network and manage instant notifications. Home security and monitoring Using the free Basic plan, users can monitor and protect their home, receive instant notifications of any threats and get insights into their home environment. For just £6.99 per month, the optional Minut Plus plan allows customers to add multiple users, multiple homes and allows users to create a trusted network of friends and family to safeguard their home. If something happens in the home, and you’re not around, Minut will quickly seek assistance from the users network to make sure the property remains safe. Minut has up to 6 month battery life, dependent on the environment it’s within and the number of alerts it needs to send. Users simply remove the device from its magnetic mounting plate and charge via the included USB-C cable. Fully charging the device takes around 5 hours, after which, users simply pop it back up on the ceiling. Machine learning solution Our aim is to make home security and monitoring accessible to everyone" Minut CEO Nils Mattisson, commented, “Feeling safe shouldn't be a luxury, or come at the cost of privacy. Until recently the most affordable solution for home security and monitoring has been Wi-Fi connected cameras, but people don’t want or trust them in their homes. Our aim is to make home security and monitoring accessible to everyone, without having to compromise the feeling of home.” Mattisson adds, “Through the use of machine-learning the sound recognition is continuously improved by the Minut community, making the system even better over time. To preserve privacy, the design is camera-free and the data processing runs on-device, so no sound ever has to be recorded.” Data privacy and security Minut’s founders reached the conclusion that the only way to truly guarantee the privacy of personal data was to avoid collecting it as much as possible. By combining the inputs of its environmental sensors with powerful machine learning, the alarm is able to process and analyse data on the device itself; ensuring no raw audio from the home is ever recorded or sent to the cloud for storage. A founding premise of Minut is that no one should ever have to choose between security and privacy, hence why it puts privacy first. Everything revolves around protecting what happens in the home. Minut do not listen and don’t send any raw data to the backend. Only when the alarm senses a potentially critical event such as motion detection or a sudden sharp increase in temperature is a ‘fingerprint’ of the potential anomaly generated and sent to the cloud for a ‘second opinion’ of sorts, where it is analysed by even more powerful algorithms before being sent to the user.
Echodyne, globally renowned manufacturer of innovative, high-performance radars for government and commercial markets, has announced that it will be co-exhibiting with Security Radar Integrators (SRI) at the 19th annual American Association of Airport Executives (AAAE) Aviation Security Summit, taking place in Arlington, VA from December 4-5, 2019. Aviation security With ever-increasing drones in the airspace, protecting aircraft and airports from drones has become a major focus for regulators The event brings together senior leadership from the nation’s airports with officials from DHS, TSA, CBP and other key players in security policy to discuss the complex issues surrounding aviation security and to look ahead to challenges on the horizon, including the growing threat from drones. The drone disruption at Gatwick Airport in December 2018 grounded nearly 140,000 passengers and cost airlines more than £50 million. In the second quarter of 2019, the FAA collected reports of 714 sightings of unauthorised drones near airplanes and around airports in the U.S. With the growing number of drones in the airspace, protecting aircraft and airports from drones has become a major focus for regulators and law enforcement around the globe. Ground-based perimeter intrusion detection system Security Radar Integrators (SRI), globally renowned perimeter protection solutions for airports provider, announced the selection of Echodyne radars as the drone detection sensor for its existing ground-based perimeter intrusion detection system (PIDS) in October. The companies are collaborating on security system design and deployment, with SRI announcing its new white paper on comprehensive airport surveillance, ‘Full Coverage: Combining PIDS and UAS Detection for Critical Infrastructure’. The paper highlights Echodyne’s EchoGuard 3D radar and the role that high-performance radar plays in SRI’s Airfield Radar System (ARS). Leaders from both companies will be on hand at the Security Summit to discuss drone security for airports. 3D security solution “SRI has best-in-class technology and tremendous experience in designing and deploying airport perimeter security solutions,” said Dan Flynn, President of SRI. “We are excited to discuss our market-leading 3D security solution with airport executives and security leaders at the AAAE Aviation Security Summit.”
ExtraHop, globally renowned provider of cloud-native network detection and response solutions, has announced a new integration with Amazon Web Services (AWS) that automates the isolation of compromised Amazon Elastic Compute Cloud (EC2) instances and empowers security operations teams to create a wide range of customisable response automations, from quarantining and blocking to ticketing and tagging. ExtraHop Reveal(x) Cloud Alongside the new automation capability, ExtraHop Reveal(x) Cloud offers continuous packet capture in AWS Alongside the new automation capability, ExtraHop Reveal(x) Cloud now offers continuous packet capture in AWS. That reduces the amount of time, effort, and money required to perform packet-level analysis while providing security teams with the forensic detail they need to get to root cause or to fulfill chain-of-custody requirements. Response automation is considered the Holy Grail for many security operations, allowing teams to snuff out threats before they further infiltrate or damage the organisation. But when done at a tool level instead of a system level, response automation too often results in devices being quarantined or systems being shut down based on unreliable data or incomplete information. ExtraHop integration with AWS Lengthy investigation time compounds the challenge, leaving critical systems idle until the threat can be remediated, and potentially resulting in business downtime and lost revenue. The latest ExtraHop integration with AWS brings precision to both response automation and investigation workflows in the cloud. The AWS quarantine integration combines high-fidelity detections from Reveal(x) Cloud with AWS security group policies to automatically quarantine compromised EC2 instances, enabling timely and targeted response. Streamline investigations in cloud and hybrid environments Security teams can also modify the trigger, or write a new trigger, to take different actions when detection violates policies. With right-sized continuous packet capture, Reveal(x) Cloud takes an analytics-first approach to investigation, allowing security operations teams to go from detection to associated packets in a matter of clicks, keeping investigations fast and focused. Reveal(x) Cloud also includes new features that streamline investigation in cloud and hybrid environments, enabling analysts to rapidly identify and respond to the highest priority threats. 1G, 5G, and 10G SaaS offerings with Continuous Packet Capture within AWS environments support streamlined and guided investigation for any incident. Customers can begin purchasing the Reveal(x) Cloud PCAP for AWS offering in early 2020. Related Detections reduce response time by automatically surfacing similar threats across architectures in a Reveal(x) Cloud investigation workflow. This provides SecOps teams with a unified view of attack patterns happening in the environment. Enhanced reporting capability provides executive-level overviews of security posture at the touch of a button. Reports zero in on critical threats while also delivering high-level insight into compliance across hybrid and cloud environments. Advanced visibility and detection “Though AWS supports strong controls, companies are responsible for securing their own workloads, which is a daunting task with the current cyber security skills shortage and nascent cloud security market,” said Jesse Rothstein, CTO and co-founder, ExtraHop. Jesse adds, “Our Reveal(x) solution provides SecOps teams with advanced visibility, detection, and response for hybrid environments. We are constantly working to expand our capabilities, and this integration with AWS is another step towards winning the arms race in enterprise security.”
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centres on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximising benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximising the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertise,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realising wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialised services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the programme, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertise”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cyber security, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analogue cameras. A higher percentage of commercial customers use mobile applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
Use of iTrak solution by casino operators in both Macau and Las Vegas for reporting, security and loss prevention expands Omnigo’s global footprint. Omnigo’s security system “One of the major benefits of penetrating a market like Macau with Omnigo’s security system is that casinos can draw from a shared database of banned patrons, advantaged players, and VIP guests from Day One of implementation,” said Mark Kornegay, CRO of Omnigo Software. He adds, “Sharing data across properties enhances security and surveillance for everyone by allowing casino operators to exchange critical information with each other and with law enforcement.” Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting iTrak security solution Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting and data analysis. Casinos can function more efficiently using iTrak thanks to its simplified reporting and notification process. The system also empowers casino employees to leverage data-driven security intelligence to address incidents in real-time, track persons of interest and mitigate risk and exposure to liability. Various modules within iTrak include Facial Recognition, Visitor Management, Lost and Found and more. Security and risk management system In addition to the Macau expansion, Omnigo’s casino portfolio also includes 100% of the Las Vegas Strip casinos and 65% of the Canadian gaming market. Each casino uses iTrak, Omnigo’s security and risk management system for incident reporting, property surveillance and security and loss prevention. “It’s a true testimony that these casino operators have put their full confidence into Omnigo’s offerings to keep their properties safe. With that level of trust, we’re able to prioritise innovation and bring the latest technology like facial recognition software and advanced data analytics to market faster for our customers, both large and small,” Kornegay added.
With the opening of the new Thomson Nature Park, Singapore, the National Parks Board (NParks) recently unveiled a new system to help detect wildlife crossing the roads between forests and provide real-time warning messages for approaching vehicles, so that the vehicles can slow down and let the animals safely walk onto the other side (The Strait Times). IronYun AI NVR Animal Detection solution IronYun AI NVR Animal Detection is the solution that NParks has selected to realise the system IronYun AI NVR Animal Detection is the solution that NParks has selected to realise the system. On one hand, AI NVR uses deep learning AI models to accurately recognise animals versus vehicles and people via camera feeds on the roadside. On the other hand, AI NVR integrates with signage systems to trigger the appropriate alerts when such animals are detected. Wildlife protection program: “Thomson Nature Park (TNP) is a 50-hectar (124-acre) green space to buffer between the eastern forests of the Central Catchment Nature Reserve and the new infrastructure developments. TNP is separated from the Nature Reserve by a 3-km-long Old Upper Thomson Road, on which visitor cars frequently travel. Animals, however, do not recognise manmade geographical boundaries”, said NParks Director for Conservation, Sharon Chan, and thus often walk across the road from the forest into TNP and vice versa to forage for foods and find mates. Animal-vehicle collisions have occurred because the cars and motorcycles cannot see the animals and stop in time. Meanwhile, biodiversity surveys have indicated that many native animals, including critically endangered species such as the Raffles' banded langur and the Sunda pangolin often cross this road. Several measures have been implemented to protect the animals, including: Aerial crossing: a rope ladder and a single rope crossing along the Old Upper Thomson Road to help canopy-dwelling animals crossing overhead Culverts: five culverts to help ground-dwelling mammals crossing underground Reducing traffic: turning Old Upper Thomson Road from a dual-lane road to a single-lane road in June 2018; plans to close the road to vehicles between 7:30 pm – 6 am daily in the future Roadway animal detection system: a combination of IronYun AI NVR, cameras, and signage to alert vehicles to slow down from afar when an animal crosses the road In particular, the roadway animal detection system is co-funded by NParks and the Land Transport Authority (LTA) to reduce animal-vehicle accidents. At the heart of the system is IronYun AI NVR. AI technology for wildlife protection The system is guaranteed to recognize a human versus an animal versus a vehicle AI NVR is a deep learning video analytics solution, which can distinguish several types of objects, including vehicles (car, bus, motorcycle, etc.), people, manmade objects (backpack, suitcase, etc.), and animals. IronYun engineering teams train the AI models using thousands of hours of video data to ensure high accuracy, so the benefits are two-fold: No false alarms: the system is guaranteed to recognise a human versus an animal versus a vehicle. As an improvement compared to legacy sensor-based systems, motions caused by tree branches swaying, people walking/biking, cars driving by, etc. do not trigger any alarm. In this case, only an animal crossing the road would trigger an alarm. Easy to use: no calibration to the environment is required. The model is pre-trained and ready to use from day 1. AI Network Video Recorders (NVRs) The LTA and NParks users set the alert rule so that when an animal appears, AI NVR recognises, records the metadata and triggers lights to flash under a sign that reads ‘Animals Ahead’, all within 3 seconds. The car sees the flashing light and slows down, allowing the animals to reach safety. The unintrusive monitoring and alert system AI NVR has proven useful The current system supports 5 cameras along Old Upper Thomson Road. The system was announced on October 11, 2019, and is a year-long pilot project in the joint effort of LTA and NParks to protect wildlife in Singapore national parks. Unobtrusive and alert video system While the rope crossing and culverts help providing the animals safe alternative travel routes, Dr. Andie Ang, a primate scientist and chair of the Raffles’ Banded Langur Working Group, has commented that it would take time for animals like the Langurs to get used to artificial structures, so long-term monitoring is necessary. Therefore, the unintrusive monitoring and alert system AI NVR has proven useful. According to LTA Chief Executive, Ngien Hoon Ping, “Joint efforts, such as the one on the roadway animal detection system, help us understand how technology could be deployed to achieve our aims.”
Security companies provide a type of service that tends to go unnoticed except when it’s missed. Small cities and towns are increasingly growing every day mostly due to internal migration and the high prices of rent in Los Angeles county USA. Veteran Los Angeles security services company, Hillquest Security & Patrol plans to meet this growth head-on. For that reason, Hillquest has decided to expand their already wide range of action (which included more than 60 cities by 2018) to all the Orange and Riverside counties. Hillquest’s security mobile patrols Hillquest Security started to provide security guard services in Orange County and Riverside since early 2019 Hillquest Security started to provide security guard services in Orange County and Riverside since early 2019. What was initially a test venture that turned out to be really successful for the company has now became a full-service activity. Furthermore, Hillquest started to offer its full range of security options for businesses and individuals in those areas. Businesses and other entities in the OC and Riverside can now hire Hillquest’s security mobile patrols, bodyguards, security systems, loss prevention and other security services for banks, construction areas, healthcare facilities, hotels, apartment complexes, movie sets, parking lots, schools and event venues. Manned Guarding and security services "We provide security services that are perfectly tailored for our clientele," said John Bouzy, Hillquest Security owner. "Our trained, licensed expert security officers can handle any and all of our customers’ security needs. Moreover, we can do that any time of day as well." According to Hillquest Security & Patrol’s corporate website, the company is insured with a US$ 5 million policy and its officers "meet the standards set by the bureau of security and investigative services."
The experience of high-quality, high-performance automotive engineering and the sleek lines and signature beauty of luxury auto brands like Porsche, BMW, Mercedes, and more are investments worth protecting. When damage to these vehicles occurs and body work is required, only the work of attentive, highly trained, and craftsman technicians owners can trust, will do. Phoenix-area Autobahn Collision serves the region’s owners of luxury European automobiles with precisely such expertise they can trust, and when the time came to upgrade the premier body shop’s security infrastructure, they looked for a surveillance solution able to meet the same high standards of performance they meet every day. Seamless Integration Autobahn Collision provides customers with a service and repair experience, well-crafted to be as high-end, responsive, and trustworthy as the luxury vehicles they work on. The body shop’s expectations were no less for their surveillance solution, which needed to seamlessly integrate new and existing technologies in a way that was both easy to use and maintain, allowing for monitoring and documentation, as needed, without distracting from the team members core priority: optimising customer experiences and quality body work for their customers. Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution DirectIP NVR Surveillance Solution Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution with IDIS DirectIP network video recorders (NVRs) at the heart, addressing all issues of compatibility and operational concerns. IDIS NVRs, specifically designed to reduce (if not eliminate) compatibility issues, support multiple industry standards and 3rd party protocols. At Autobahn Collision, SARC integrated multiple IDIS DR-8364(F) NVRs in designing a user-friendly surveillance solution that enhanced and fully supporting the shop’s existing IP camera infrastructure. IDIS DR-8364(F) series of NVRs The IDIS DR-8364(F) series of NVRs have multiple features that enhance the overall ease-of-use and maintainability. The DR-8364(F) supports 64 IP channels of 4K UHD with a maximum incoming throughput of 900Mbps, which means fewer NVRs are needed to support a large installation of cameras. Fewer devices reduce the overall complexity of any solution, by definition, and mean less time spent on installation and maintenance. The intuitive DR-8364(F) NVR interface, common to all IDIS products, also means that training and transition investment is minimised. IDIS’s license free software model, which also includes free software updates, further minimises the cost and complexity of owning and maintaining an IDIS solution. Enhanced protection for luxury vehicles The upgraded solution allows Autobahn Collision and a team of remote monitors to keep the premises—and the concentration of luxury vehicles, parts, and accessories—secure 24 hours a day / 7 days a week, enabled by the enhanced recording, storage, and failover benefits of the IDIS DirectIP NVRs and IDIS’s modular IDIS Solution Suite VMS. Data can be transferred on existing cabling and saved in existing storage space The IDIS DirectIP DR-8364 NVR’s support for H.265 with IDIS Intelligent Codec and Motion Adaptive Transmission (MAT) reduces the need for additional bandwidth and storage upgrades, providing up to a 90% reduction in both bandwidth and storage utilisation. IDIS SmartFailover Additional data can be transferred on existing cabling and saved in existing storage space. Multi-layered data protection through IDIS SmartFailover features include RAID 5 storage redundancy, dual power supply redundancy, and NVR failover, which provides support for a standby NVR that continually monitors the primary NVR (taking over recording if the primary hardware fails). IDIS SmartFailover ensures that data integrity and system operation are automatically monitored and maintained, simplifying system support and maintenance tasks. Real-time monitoring, playback and review, high-quality imagery for reference and documentation purposes, and more are now seamlessly empowered by the new system, allowing Autobahn to continue doing what it does best of all, meeting and exceeding the needs of the region’s most discerning vehicle owners.
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honoured to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Comelit has worked closely with its Gold Partner, MRFS Group at Inspired Living’s flagship Impact House development, to ensure residents in upgraded apartments can experience seamless smart home automation in one all-encompassing solution. Set in Croydon London, Impact House has undergone an extensive programme of redevelopment from a largely vacant office building to create 197 contemporary one and two-bedroom micro-flats and 39 larger one, two and three-bedroom apartments, including four exclusive, larger duplex layouts. Comelit smart home automation solutions Comelit’s specialist SimpleHome system incorporates home automation, without compromising style Designed for modern, luxurious urban living, MRFS Group, who has worked closely with award winning Inspired Living on a number of projects from a security perspective, introduced Comelit’s specialist SimpleHome system to the top level apartments at Impact House to incorporate home automation, without compromising style. Adam Tokarski of Inspired Living, said “Impact House has been transformed into a light filled landmark setting for contemporary apartment living. Finished with high specifications throughout, we were keen to ensure the ground-breaking larger and duplex apartments offered the height of luxury.” Smart security Adam adds, “We turned to MRFS Group to advice on an integrated design to present new residents with smart security and home automation. On recommending Comelit’s SimpleHome we initially saw for ourselves its ability to control heating and lighting via the stylish door entry system and supporting app capability. Its flexible design allowed us to work with MRFS to create a bespoke solution for Impact House that was simple to use and finished in a sleek design.” Simplehome smart home automation system Simplehome is Comelit’s smart home automation system, which operates with door entry in one user-friendly integrated solution, providing homeowners with full control of their lighting, heating and ventilation. With an ability to programme schedules for up to seven days, Simplehome can be operated remotely using Comelit’s dedicated app, available via smartphone or tablet and connecting to a home router. Ross Wilkins, MRFS Group Director of Projects and Integration added, “When it came to door entry and incorporation of home automation to the 39 top-end apartments, systems had to be considered in line with the change of purpose to the building and how to coordinate installation with minimal cabling requirements." Door entry monitor Using the door entry monitor as a master control unit for Simplehome reduces the wall clutter within each apartment" He adds, “Using the door entry monitor as a master control unit for Simplehome significantly reduced the wall clutter within each apartment. This combined with Simplehome’s control equipment being din rail mountable and very space efficient appealed to Inspired Living, as it allowed maximum footprint to each apartment.” Chris Carroll, Comelit Business Development Manager concluded “Technology continues to play a significant role in our daily life and increasingly driving the demand towards home automation. This is where inspirational developers such as Inspired Living, with the support of our Gold Partner, MRFS Group, are leading the way by integrating facilities such as SimpleHome in apartment offerings." Easy installation He adds, “The professional installation, especially in redevelopment programmes such as Impact House, ensures homes can instantly benefit from the convenience and home control factors, without compromising on security or finishing design.”
Round table discussion
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasising systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
IP security solutions: Manufacturers & Suppliers
- Dahua Technology IP security solutions
- Arecont Vision IP security solutions
- Hikvision IP security solutions
- Pelco IP security solutions
- LILIN IP security solutions
- IDIS IP security solutions
- VIVOTEK IP security solutions
- Vicon IP security solutions
- BCDVideo IP security solutions
- Avigilon IP security solutions
- Messoa IP security solutions
- Illustra IP security solutions
- MobileView IP security solutions
- Bosch IP security solutions
- MOBOTIX IP security solutions
- FLIR Systems IP security solutions
- Hanwha Techwin IP security solutions
- Teleste IP security solutions
- DRS IP security solutions
- Oncam IP security solutions