IP security solutions
Fugue, the company delivering autonomous cloud infrastructure security and compliance, has announced its support for Open Policy Agent (OPA), an open source general-purpose policy engine and language for cloud infrastructure. Fugue is leveraging OPA and Rego, OPA’s declarative policy language, for cloud infrastructure policy-as-code to provide customers with maximum flexibility when implementing their custom enterprise policies. The Cloud Native Computing Foundation (CNCF) accepted OPA as...
Crossword Cybersecurity plc, the technology commercialisation company focusing exclusively on the cyber security sector, is pleased to announce the signing of a two-year contract with a FTSE 250 global chemical manufacturer. The customer will use Rizikon Assurance to issue onboarding assessments to their 250 strategic suppliers, in turn displaying their key risk data in the tool’s ‘Supplier Scorecard’ feature. Rizikon Assurance will automate the supplier management process, re...
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Arteco keeps pursuing its global expansion strategy and, after the USA, South Africa and Mexico, is now aiming for the Southeast Asia and Pacific region by signing a representation agreement with YEM International for the management of the export activities in the Asia Pacific Area. Arteco expands to Southeast Asia region The big economic powers are pushing this growth of the sector with infrastructural projects “It is a wise and far-sighted choice”, affirms Giampaolo Sabbatani,...
The ETSI Industry Specification Group (ISG) for Network Functions Virtualisation (NFV) has started working on its next specification release, known as Release 4. While NFV-based deployments are expanding worldwide and show the benefits of network function virtualisation, new technologies are expected to be leveraged and features are being added in support of 5G and novel fixed access network deployments that are emerging in many countries. Network Functions Virtualisation-based deployments The...
The retail industry is constantly evolving, with a fast-paced environment that requires retailers to quickly respond to changes in the market, while delivering a consistent service that inspires customer loyalty – all in a bid to maintain healthy margins and revenue in what is an increasingly competitive landscape. Helping retailers to drive efficiency and capitalise on new labelling innovations, Checkpoint Systems’ source tagging programme, which celebrates more than 25 years since...
Milestone Systems is committed to protect people and assets and optimise businesses. With the Milestone Community Kickstarter Contest, Milestone invites innovators to help them create technology that will make the world a better place. Milestone Systems has built an open platform for vision-based technology software working with applications that create benefits across areas such as security, transportation, emergency response, traffic optimisation and even in wildlife. The Milestone Community Kickstarter Contest is a unique opportunity for coders, developers, individuals and organisations to discover new applications and capabilities that that can ‘plug in’ to the XProtect® VMS product family. Opportunity to innovate new solutions “Milestone Systems enables an open platform community that drives collaboration and innovation in the development and use of network video technology,” says Bjørn Skou Eilertsen, Chief Technology Officer at Milestone. “We believe that developers will change the world. Our MIP SDK can help them do this. It offers developers the opportunity to innovate new solutions and use our powerful VMS platform as the engine.” The winning concept can be an integration, added functionality, widget or code that extends the use of VMS The winning concept can be an integration, added functionality, widget or code that extends the use of VMS in any useful capacity. Participating developers can create a visual tool, a device trigger, a base for analysing data or to measure information that can be applied in new ways. The two requirements are that the solution is integrated with the Milestone XProtect VMS, (and possibly using the MIP SDK), and that the idea must be the contestant’s own intellectual property. Powerful open platform software “We see technology as a tool. We believe that great things can come from offering our powerful open platform software to a world of innovators to use to make their imaginations tangible. We are open to innovation and are looking for solutions we have yet to imagine that can make the world a better place,” says Community Engagement Manager Jasleen Rehal, Milestone Systems. Three finalists will be given free entry and an exhibitor booth at the annual Milestone Integration Platform Symposium event (MIPS) in 2020 which is happening at the USA and the United Arab Emirates, where the winner will be announced and rewarded with a prize valued at USD 65,000. Innovators may post questions about integration challenges on the Milestone Developer Forum.
New switches, relays and pressure sensing solutions from Sensata Technologies, global manufacturer of sensors for industrial applications, are helping to ensure the smooth and efficient operation of access control equipment installed in a range of demanding and often remote environments. New devices have been launched to address the three key concerns that design engineers have in creating new access control solutions - space – new designs require smaller components for applications where space is at a premium; performance – components have to work reliably and efficiently, even in extremes of temperature or where vibration or other disturbances can be an issue; and reliability – access control solutions must have a durable life cycle to reduce unnecessary repair and maintenance costs. Solid State Relays Sensata’s switches and relays are used to switch motors or pumps that are key to a range of access control systems Sensata’s latest range of switches and relays are used to switch motors or pumps that are key to a range of access control systems including barriers, roller shutters and rising curbs. The latest Solid State Relays (SSRs) – including the new DRC Series – reduce power consumption and wear and tear on various components within the equipment, therefore improving operational performance and reducing costly downtime and repairs. They are especially designed for high volume operations where reliability is key. Pressure sensors and switches Pressure sensors and switches, including the latest HDC Series, are used in access control applications that use hydraulic systems. They are typically used in the design of the pump station that controls the rising and lowering of the unit (such as a tail lift or disabled ramp). Pressure ranges in these applications typically range from 100- to 260-PSI and require accuracy but must also be cost effective. Sensata’s latest Position sensors are critical to the elements of access control systems that rely on the position of an object. This could be an arm of a gate or a roller of a door. Position sensors The latest Position sensors, including the recently launched ACW/TCW and 9960 Series Hall Effect sensors, are contactless and rugged in construction, making them ideal for access control applications that are exposed to extremes of weather, and where the reduced cost of maintenance is an important concern. The same is also true of the latest range of Motor Protection components (such as the AC Off-Winding Motor Protector) that protect the motor from failing, thus preventing the commensurate disruption to business and increased costs of repairs.
Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, launches two new high performance steel doorsets within its Powershield Security Doorset range. The new SR3 and SR4 steel door ranges, also known as Torr and Titan, have been developed from scratch to offer a product compatible with increased frame and ironmongery options, allowing greater freedom of design for architects and specifiers. Complete doorset solution The doors are suitable for an extensive range of sectors, including banks, power stations, hospitals, safe rooms, MOD buildings, personal security, arenas and stadiums. After listening to customers’ requirements, the Torr and Titan ranges have been redeveloped to replace the Glen and Strangford security doors and are certified under LPS1175 Issue 7 to withstand against sustained, professional burglar and vandal attacks. The Torr and Titan ranges are overall easier to install, handle and lighter to use The launch ensures specifiers, architects and contractors can source a complete doorset solution from one trusted single point of contact. Compatible with a wide range of Kaye Certified locking systems, in single and double configurations, the two new door ranges can also come with or without LPS rated and certified vision panels, in a range of frame styles. With a leaf and frame weight reduction of up to 40% from previous ranges, the Torr and Titan ranges are overall easier to install, handle and lighter to use – making them an ideal choice for a wide range of projects. Highest quality products and services The ranges prioritise both the performance and the aesthetic of the doorsets, completely removing industrial looking features from the outside of the door leaf, and reducing the leaf skin thickness to tighten the folds and create a softer aesthetic. The new high security doorsets now look almost identical to standard commercial doorsets, perfect for those looking for discreet or inconspicuous solutions. Brian Sofley, Managing Director at ASSA ABLOY Door Group, explains: “We are always looking for ways to develop ourselves and our trade, ensuring that we deliver the highest quality products and services on the market. I believe both the Torr and Titan ranges really embody this value. We are confident that the two new ranges will exceed the needs of our customers and specifiers, providing a durable solution which achieves the performance demands required.”
Umbo Computer Vision, an artificial intelligence company that specialises in autonomous video security, announced that it raised an $8 million post-A round, bringing funding to a total of $17.6 million to date. This round was co-led by Translink Capital and Susquehanna International Group. Shin-Kong Capital and Shin-Kong Security, Asia’s security alarm companies, also joined as strategic investors, with continued participation by earlier investors. Cloud-based security management platform Umbo will use the investment to help accelerate its global sales expansion and improve its portfolio of AI-powered security products - Light, TruePlatform and Umbo AiCameras. Umbo Light is a fast learning AI that recognises human behaviours critical to security such as intrusion, tailgating, occupancy and wall scaling. Umbo’s products are changing the way people around the world think about video security" Customers often use Light together with Umbo TruePlatform, the company’s cloud-based security management platform, to further enhance their security capabilities. They can also choose to use Umbo’s AiCameras to process Light AI. on the edge or apply it to their existing IP cameras through TruePlatform’s integrations. Computer vision technology “Umbo’s products are changing the way people around the world think about video security. Businesses small and large come to us seeking a solution they can trust to keep them safe and secure from suspicious behaviours,” says Shawn Guan, CEO at Umbo. “Our vision is to bring our computer vision technology to new customers worldwide and provide simple, yet powerful protection that anyone can use." Jackie Yang, Co-Founder and Managing Partner of Translink Capital, says, “We are excited to work with a company that is paving the way for AI. and surveillance technology. Combining AiCameras, TruePlatform and Light AI., Umbo is providing a working solution that the surveillance industry has been looking for over a decade.” Umbo’s products have been recognised by some of the largest global system integration partners in the security industry. System integrators love that Umbo AiCameras can be set up seamlessly and with little configuration. Integrated Solutions Engineer George Caballero of Johnson Controls says about Umbo AiCameras: “In all of my 23 years in the industry, Umbo was the easiest install I have ever done.” Improvements to CCTV detection/reliability Umbo recently opened a London office to tap the growing United Kingdom market, earning recognition from the country’s leading alarm monitoring centres. “Since 2017, Umbo and Southern Monitoring have collaborated to deliver substantial improvements to CCTV detection/reliability and to reduce operational costs,” says Christopher Jones, Director of Operations at Southern Monitoring. The company gained over two hundred enterprise and small business customers “Extensive tests with Umbo Light in real world conditions found a drastic reduction in the number of false positives that our operators have to review and handle -- with well over 95 percent suppression of false positives over our current configuration.” Pushing the limits of video security This past year, Umbo has continued to thrive. The company gained over two hundred enterprise and small business customers. Light AI. also received the prestigious Innovation Award at ESX 2019, adding to other honours previously won at the security industry’s biggest conferences including the NPS award at ISC West and the New Product of the Year award at GSX. Since beginning service, Light has processed over 21 billion images and users have logged into the service over 6 million times. With these new resources, Umbo intends to keep on pushing the limits of video security by building towards a safer future.
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0 enables security analysts to tailor the way they visualise incident and indicator flows, allowing security teams to better manage and automate incident response. Key updates to Demisto v5.0 include - Reimagined User Interface - Brand new UI that streamlines global navigation while also enhancing the delivery of information within each incident Enhanced Threat Intelligence - Access rich indicator intelligence from integrated sources and take action in a scalable manner Database Scaling - Install the Demisto app server and databases on separate machines. Multi-tier configurations let you scale your environment and manage resources efficiently SOAR on the fly - Introduction of chat support in the mobile application, letting you update relevant stakeholders on-the-go and ability to manage notifications from the web app, choosing to receive updates on email, Slack, Mattermost, or the mobile app Demisto v5.0 security platform Rishi Bhargava, VP Product Strategy, Demisto, a Palo Alto Networks company comments, “Demisto v5.0 is packed with new features suggested to us by our community of customers, partners, and independent users. We’ve also introduced changes that facilitate improved load management and scaling of resources, ensuring that organisations are secure irrespective of the pace at which they grow”. He adds, “Back in 2015, we recognised that security teams wilt under dual pressures every day: an ever-increasing volume of security alerts, and insufficient resources to address these alerts. Over the past four years, our customers have seen us as the only platform that has combined security orchestration, incident management, and real-time collaboration to make their lives easier”. Security Orchestration and incident management Rishi further stated, “Automating as much as possible hands time back to security teams to investigate, learn and improve, and sometimes just take a deep breath. Since joining forces with Palo Alto Networks, we have accelerated our go-to-market and made inroads into use cases outside of traditional security operations.”
At the end of September 2019, eleven professional application developer companies, primarily from Nordic countries, got together in Stockholm to demonstrate their creations for Airbus’s Tactilon Dabat device. This was the 5th edition of the Critical App Challenge, which has already taken place in Germany, Belgium, Hungary, and the Middle East and North Africa region in order to give local innovative companies from these regions the chance to demonstrate their solutions for public safety and mission-critical use. IoT, data analytics and artificial intelligence The innovative aspect, user experience on behalf of public-safety and mission critical professionals were key evaluation criteria This one-day event in the Swedish capital allowed the companies to present their applications to a jury of seven customers and Tactilon Dabat end-users from various industries and scopes of use. The innovative aspect, as well as the user experience on behalf of public-safety and mission critical professionals, were key evaluation criteria. In short, the participants had to take into account the use of IoT, data analytics, and artificial intelligence in order to propose unique ways to retrieve data, as well as the means of processing and exploiting that same data. “I am extremely satisfied with the outcome of this new Nordic-oriented edition,” explains Rahim Zaknoun, Head of Developer Ecosystem for Secure Land Communications at Airbus. “This concept is a unique way to show our customers that we are actively listening to their needs and are also proposing tailored applications and solutions which take into account technological advances, as well as current and future specific requirements, while finding means to optimise daily missions and tasks for all end users, regardless of which industry they work in. Whether it be in public safety, law enforcement, transport, utility and industry, and even healthcare, amongst others.” Zaknoun adds. 4K and data security The prize winners, selected as the best existing solutions suitable for the Tactilon Dabat presented state-of-the-art mission-critical solutions. The top three were: Mesensei with a decentralised platform for private social media communication and decentralised data ownership, Dottli, a communication solution which collects and shares data on each end-user by using sensors, and Ansur, a secure application which aims to reduce emergency response time for mission-critical interventions by proposing an option that handles visual situational awareness data by processing high-resolution – and even 4K – imagery. All companies have received invitations to participate in two large events in November: Rakel Day, a major Swedish customer event which will take place on the 12th of November, and Slush; the world’s leading start-up event in Finland, from the 21st to the 23rd of November, at the Airbus stand. This will give them a unique chance to demonstrate their apps to both Airbus and end-users alike. Airbus Tactilon Dabat hybrid terminal The Airbus Tactilon Dabat hybrid terminal offers both Tetra and LTE radio technologies in one single device The Airbus Tactilon Dabat hybrid terminal offers both Tetra and LTE radio technologies in one single device. Tactilon Agnet 800 is an app for smart devices such as the Tactilon Dabat. It makes it possible to use features such as push-to-talk, status notifications, text messaging, and emergency calls on the Tactilon Dabat. Group communication with other professional radio carriers or the control room is also possible. Indeed, end-users of Airbus’s Tactilon Dabat can already take advantage of an array of professional applications available in the Airbus SmarTWISP catalogue, which offer features such as biometric, licence plate recognition and geo-positioning. Tactilon Agnet solution In addition to the possibility of installing such applications on the device, Airbus’s very own Tactilon Agnet solution is also available on the device to allow users to share voice, data, image and video information with other individuals or a group of individuals in a secure and reliable way.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Missed part one of our healthcare mini series? Click here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urgent need to lock the facility down quickly. Security professionals and their teams need access control options that allow lockdowns to occur at the touch of a button. Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities The need for mass notification is also growing in the healthcare environment Fire alarm public address system The need for mass notification – another aspect of responding in an emergency – is also growing in the healthcare environment. Various systems can communicate through the fire alarm public address (PA) system to notify people in an emergency, or, alternately, to use email notification, text messaging, pagers, smart phones and/or personal computers (PCs). In lockdown situations, access control systems provide an emergency button with various triggers in the system – a hospital can lockdown specific units or the entire facility. Data capture form to appear here! Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products, points out that the safety of hospital staff, particularly nurses, cannot be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Duress/emergency notification technology Stankevich says one solution is to use duress/emergency notification technology: staff can carry and wear a ‘panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the recent CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. As of Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. Emergency preparedness systems A major challenge in compliance to this rule is balancing patient safety with comfort At its core, the rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary. Effective response to emergencies “Fortunately, hospitals and their security departments are generally well equipped to respond to most emergency situations”, said John M. White, president/CEO of Protection Management, a consultant who works with hospitals to address their security needs. During the Ebola scare in 2014, however, hospitals had to re-examine their plans to ensure they were prepared to meet the challenges specific to rare and deadly disease. “Hospitals are prepared for most things, but Ebola seemed to have caught the whole world off guard, so people responded in different ways,” says White, who previously was security director of two multi-campus medical facilities before becoming a consultant. Hospital security Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients" He adds, “Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients and to protect other patients and staff. It was a new threat that healthcare organisations had not specifically addressed.” A particular concern was the possibility of an infected person walking into an emergency room and infecting other people and/or requiring facility decontamination. One role the hospital security department plays in such an emergency is to control access to the facility and to control visitors’ movements once they are inside the facility, says White. If the Ebola scare had progressed to the point that a hospital would need to screen patients, security would be positioned at the front entrance to help with that screening and, if necessary, to direct patients to a specific area for quarantine. Protective equipment Security might also need to wear protective equipment to handle a patient who is resistant to treatment, for example. There are often interactions between security personnel and the general public, a scenario that becomes more complicated if Ebola or a similar infection is likely. In general, security would be tasked with maintaining order and keeping people where they need to be, freeing up the medical professionals to do their jobs more efficiently, says White. To prepare for the impact of the Ebola scare, hospitals addressed various training and equipment needs and adjusted their disaster/emergency response plans. Read part two of our heathcare mini series here.
Central to the Italian motor racing scene, Gruppo Peroni Race organises very high level car championships in the Imola, Vallelunga and Monza Italian racing circuits. For thirty years in the sector, the activity of the Peroni Race Group includes various championships and numerous special events such as endurance tests. When they wanted to open up the racing experience to more members of the public, they turned to a solution using Hikvision products. Partnership with Hikvision and Italec s.r.l The company decided to make its free events more accessible to the public The company decided to make its free events more accessible to the public and asked DirectE20, its historical partner in the audio-video industry, to come up with a solution to broadcast the live video-chronicle on YouTube, Facebook and other social events. They worked in close collaboration with Italtec, distributor of professional security solutions specialised in planning and technical assistance. In order for viewers to be able to experience the sheer thrill of the race, they needed cameras that could follow the high speed action. And due to the unpredictability of European weather, the solution needed to provide great images even in adverse weather conditions and other poor light situations. Speed Dome cameras and network video recorders Italtec chose to design the solution using Hikvision video solutions and products. In particular, they chose the company’s renowned 2MP and 4MP Speed Dome Camera solutions and the 96XX and 77XX series network video recorders (NVRs), together with monitor and keyboard to control the cameras. They chose Hikvision for the high performance of its PTZ products, able to obtain extremely interesting rapid-focus and self-tracking. Video management was entrusted to iVMS 4200, the free Hikvision software. All of these products were brought together in a mobile control room which could broadcast high quality images able to follow cars racing at high speed. The flexibility of the system and the adjustable nature of the cameras meant that they could respond immediately to the action, both automatically and on command from the control room. Camera installation and positioning In order to maximise the viewer experience, during the installation of the products installers needed to pay particular attention to camera positioning. It was essential to capture the images of the vehicles in the approach to curves with different viewing angles, both on arrival and departure of the circuit curve. Alessandro Rossi, Sales Manager of Italtec, has said, "We chose Hikvision for its leadership in the field of high-tech video surveillance. Analysing the professional CCTV market, we received lots of positive feedback from those who have been using the brand for years: we therefore decided to carry out tests, following which we definitively decided to go with Hikvision.” Mobile technology solution Enthusiasts can follow live races and the material collected can be used later to make videos" Gruppo Peroni was also impressed. Sergio Peroni, the organisation’s President, stated, "Thanks to the work carried out by DirectE20, that created the mobile technology solution, today we can collect high quality video material that perfectly meets the needs of our audience. He adds, “Enthusiasts can follow live racing competitions on the circuits and the material collected and filed can also be used later to make videos for advertising or repertoire purposes. We are very satisfied with the technical choices made and above all the results obtained.” Hikvision products delivered a result in the form of an innovative system for audio and video distribution of motor racing at its best, thanks to its simplicity and flexibility. This solution could be used to stream all kinds of sports events in the future.
Four networked MxPro 5 fire panels from global systems provider, Advanced, are now protecting one of Serbia’s most prestigious higher education facilities. The project at the University of Belgrade’s School of Electrical Engineering, involved installing a fire system to reliably protect lives and property while respecting the value and authenticity of its 1920s features. This meant overcoming various problems presented by outdated construction methods, inaccessible areas and high ceilings. 4-loop and 1-loop MxPro 5 fire panels Advanced’s partner in Serbia, TVI Ltd, was responsible for the design, installation, commissioning of the project Thanks to their performance, quality and ease of use, a network of three of Advanced’s 4-loop and one of its 1-loop MxPro 5 fire panels, including over 1000 Argus detectors, were chose to protect the entirety of this top educational and scientific institution, including the facilities of Civil Design, Mechanical and Electrical Engineering. Advanced’s local partner in Serbia, TVI Ltd, was responsible for the design, installation and commissioning of the project. Electrical Engineer, Radomir Kerkez, at TVI Ltd, said, “The flexibility of Advanced’s fire panels to adapt to sites both large and small is what makes us choose them time and time again. Advanced products make even the most complex installation challenges straightforward and we can always rely on them to deliver complete protection.” Multiprotocol fire system solution MxPro 5 is a renowned multiprotocol fire system solution and was recently certified to the EN 54 standard by FM (Factory Mutual). It offers customers a choice of two panel ranges, four detector protocols and a completely open installer network, backed up by free training and support. MxPro panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop networks of up to 200 nodes covering huge areas. MxPro’s legendary ease of installation and configuration plus wide peripheral range, make it customisable to almost any application. Building fire safety Our fire systems offer many ways to meet the challenges of protecting a building’s heritage"Vladimir Zrnic, Advanced’s Regional Sales Manager for Southern Europe, said, “Our fire systems offer many ways to meet the challenges of protecting a building’s heritage features while providing robust and reliable fire protection. It is great to see that potential put into practice in yet another successful and prestigious site.” Advanced, owned by FTSE 100 company - Halma PLC, has a long history of protecting some of Europe’s most notable and prestigious buildings, including Athens’ Stavros Niarchos Foundation Cultural Centre, Istanbul’s Hagia Sophia and Sofia’s Sofia University. Intelligent fire systems firm Advanced is a globally renowned company in the development and manufacture of intelligent fire systems. The legendary performance, quality and ease-of-use of its products see Advanced specified in locations all over the world, from single-panel installations to large, multi-site networks. Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging and false alarm management systems.
For one installer, Hikvision’s range of Turbo HD PIR-equipped cameras has had a dramatic impact on his business, allowing him to more efficiently monitor and secure construction sites and other valuable locations during vulnerable out of hours periods. Paul Hookings, Managing Director of Hampshire-based security installation firm Forward Securities, had a problem. His company had built a solid reputation for, amongst a variety of other services, securing building sites, notably the important materials and equipment left overnight and unattended in the site compound. Building site compounds, Hookings explains, can include any number of super-valuable and enticing materials for potential thieves. “Diesel, copper, tools, cabling, right down to bricks, breeze blocks, agricultural fuel, road diesel, even the metal gates,” he says. “Thousands and thousands of pounds worth of stuff is stored there overnight.” Forward Securities would use traditional PIRs – passive infrared detectors – to raise an alert Intrusion detection To monitor these compounds for intruders, Forward Securities would use traditional PIRs – passive infrared detectors – to raise an alert when the compound perimeter was breached. The problem had to do with the PIRs, Hookings explains. “On critical sites like these, where there’s a lot of activity during working hours, people are able to move those PIRs in the daytime when they’re off,” he says. “And come night-time, they’re then able to return and rob the place without being picked up by the detectors, and then move the PIR back to where it was previously. Then it’s down to the security company, who end up scratching their heads, thinking: why didn’t that go off?” Passive infrared detectors As a result, Hookings was on the lookout for a solution, something which would counter that potential for tampering and provide a more effective deterrent to potential thieves. Then he noticed that Hikvision had released a new range of Turbo HD PIR cameras. “These are lovely little products,” Hookings said. “When Hikvision brought them out, I binned our separate PIRs. With a PIR camera, during the armed period, if someone moves into its field of view, there’s an alarm. If someone covers it up, it goes into alarm. If someone moves it into another direction, it goes into alarm. So I’ve binned the products we were using previously and now I exclusively use Hikvision.” Turbo HD PIR cameras The Turbo HD PIR camera range uses advanced video surveillance technologies to improve alarm accuracy and prevent intrusions. Video verification of alarms means a rapid response from a manned guarding service can be achieved. The camera’s built-in PIR detector captures infrared light given off by human bodies and distinguishes it from other visual ‘noise’. It can be ‘double knocked’ with Hikvision’s Turbo HD K series DVR’s motion detection to reduce false alarms caused by moving targets without human body IR emission. This way, filtering false alarms reduces storage space and costs, and it also means more efficient post-event footage search. Supplemental lighting The camera also produces a flashing white strobe light that serves as a warning signal to stop intruders The camera also produces a flashing white strobe light that serves as a warning signal to stop intruders. And the white light serves as supplemental lighting, enabling the camera to capture clear images of suspects as evidence when the alarm is triggered, even in extremely dark environments – such as the construction site compounds. “When we have an alarm triggered on one of our sites, we basically get a guaranteed guarding response,” Hookings says. “Because the combination of PIR detection and video serves as proof that the assailants are there. It’s a confirmed signal going to the monitoring station, and as a result we always get people apprehended.” PIRL bullet cameras The model Forward Securities prefers to use is the DS-2CE12H0T-PIRL, a 5MP bullet PIR bullet camera referred to as the ‘PIRL’. They offer 2560 x 1944 pixel resolution, smart infrared illumination up to 20m, and Hikvision’s own ‘up the coax’ technology, which allows cameras to be controlled over a coaxial cable from the DVR and also to transmit the alarm signal to DVR. They’re also IP67-rated for external use, so they’re tough and suitable for the sorts of environments, like construction sites, where they’re most needed. As an example of how he uses the Hikvision PIRL cameras, Hookings points to the example of one specific construction site currently being protected by Forward Securities. Hikvision 4K cameras and hybrid DVRs We use six PIRL cameras, as well as additional 4K Hikvision cameras running analytics and thermal cameras" “We’re securing the main compound, along with any remote sites,” he says. “We use six PIRL cameras, as well as additional 4K Hikvision cameras running analytics and thermal cameras, and they all sit on the same server, recording to a Hikvision Hybrid DVR, with alarms and images sent to our monitoring station.” Other site setups can include an audio warning system, particularly for very high value equipment. “That’s another place we’d use a PIRL,” Hookings says. “If someone, out of hours, walks up or even climbs the fence of the compound, the monitoring station is alerted to that by the PIRL camera, and they can immediately broadcast an audio warning, real time and live. That’s transmitted through the Hikvision DVR, to an amplifier and speakers.” Crime prevention and effective video surveillance “If the intruders persist despite the warning, we then get a guarding response. It’s not just big construction sites where the Turbo HD PIR cameras are effective, I do use them on other high value projects as well.” “Ultimately, the Turbo HD PIRL cameras are incredibly effective,” Hookings says. “They pick up suspicious activity, including thefts and attempted thefts, three to four times a week across all of our sites. That means they’re actively helping to prevent the thefts of materials worth hundreds of thousands, sometimes millions of pounds.”
The sensor solutions provider HENSOLDT will equip the Royal Thai Police with its Single Mast Solution (SMS) consisting of the Spexer 360 radar integrated with an electro-optics system and the CxEye Software. After passing acceptance trials without issue, the SMS was delivered. SPEXER 360 X-band radar “Our Single Mast Solution is an extremely reliable radar, particularly suited for situational awareness”, said Nathan Manzi, Head of Asia Pacific for HENSOLDT. “CxEye assists the users, in real time, to easily and quickly evaluate and coordinate a response to threats.” SPEXER 360 is a lightweight, low power, X-band radar, designed to be deployed on a variety of platforms. SPEXER 360 can be easily integrated with additional sensors through a highly flexible C2 system. Designed for both military and civil applications SPEXER 360 offers a highly capable and affordable surveillance capability. HENSOLDT’s CxEye, command, control and display software, provides powerful integration for sensors, such as radars and cameras, within a single, simple, easy to use display package.
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilising outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilise BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending based on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic or often referred to as white-box solutions are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support all because of short-term savings. White-box solutions are not the only option. Security Integrators should utilise BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances offer a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties request that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-critical configurations Choose from a portfolio of products from entry level to enterprise to mission-critical configurations as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issue. With post-sale support, save time and resources by not having to call multiple manufacturers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime tech & global on-site support warranty, in addition to a guaranteed response.
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
An aging employee population and the influx of a new generation of workers and customers is driving change in the physical security industry. Millennials – those born in the 1980s and mid-1990s – are especially impacting how the industry operates, the technologies it produces, and the customers it serves. This tech-savvy generation grew up with the Internet at their fingertips. They embrace innovation in all its glory and expect it to play a seamless role in their lives – and work. We asked this week’s Expert Panel Roundtable: How are millennials changing how security systems are designed, installed and/or operated?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
IP security solutions: Manufacturers & Suppliers
- Dahua Technology IP security solutions
- Arecont Vision IP security solutions
- Hikvision IP security solutions
- Pelco IP security solutions
- LILIN IP security solutions
- IDIS IP security solutions
- VIVOTEK IP security solutions
- Vicon IP security solutions
- Avigilon IP security solutions
- Messoa IP security solutions
- Illustra IP security solutions
- MobileView IP security solutions
- Bosch IP security solutions
- MOBOTIX IP security solutions
- FLIR Systems IP security solutions
- Hanwha Techwin America IP security solutions
- Teleste IP security solutions
- DRS IP security solutions
- Oncam IP security solutions
- BCDVideo IP security solutions