As the COVID-19 pandemic wanes and sporting venues open-up to full capacity, a new disturbing trend has hit the headlines - poor fan behaviour. Five NBA teams have issued indefinite bans on fans, who crossed the line of unacceptable behaviour, during the NBA playoffs. Major League Baseball stadiums have a recurring problem with divisive political banners being strewn over walls, as part of an organised campaign, requiring fan ejections. There was a brawl between Clippers and Suns fans after Gam...
With a large variety of models designed to fit any building’s needs, the XS4 One electronic escutcheon fits virtually any door, including wooden and PVC doors as well as those with narrow metal frames. Until now, the Dark Bronze finish was only available for the XS4 ANSI models but this attractive contemporary finish has now been extended to the XS4 One family as well. The new Dark Bronze option for the XS4 One product range compliments design trends and blends perfectly with both white a...
HID Global, a globally renowned company in trusted identity solutions, has announced two new additions to its broad family of RFID asset-tracking tags. The HID SlimFlex Ultra technical label is optimised for the strongest durability compared to other labels, and the HID Seal Tag edTamper Aura is designed to securely track and trace highly sensitive materials and digitally detects unauthorised access to sealed containers like boxes or crates. “We continue to solve customer challenges acros...
York company, cards-x, is championing British manufacturing after producing and selling more than 5 million security ID card holders in the last six months alone. The firm is now expanding its team as it launches the world’s first completely biodegradable card holder. cards-x is one of Europe’s suppliers of security products, ID cards, and the specialist print equipment used to create them. The German-based company expanded into the UK last autumn, opening a new base at Malton near...
Whenever you say the word “security” in today’s world of digitalisation and technology, minds immediately jump to online security. Encryption, passwords, and website security are all common areas of concern for today’s security teams – so much so that we often pass over physical security installations entirely. But we shouldn’t, because contrary to popular belief, security doors aren’t just for banks and safes. High-security doors are deployed and used...
Sage Integration, a security integration provider serving enterprise Fortune 100 clients, will deliver its client-centric services to the rapidly-growing eastern Tennessee region through a new office in Knoxville. This is Sage Integration’s fourth office; the others are located in Kent, Ohio, Atlanta, and Dallas. Working to meet client demands John Nemerofsky, Sage Integration’s chief operating officer, said an increased client base and demand for service in the fast-growing Knoxvi...
Iris ID, the globally renowned company in iris recognition technology for over 20 years, will showcase its top products for law enforcement agencies at the National Sheriffs’ Association's (NSA) annual conference and exhibition – NSA 2021 Annual Conference and Exhibition, slated to take place from June 22-24, 2021, at the Phoenix Convention Center. Iris ID will occupy booth #114 at the exhibition. NSA 2021 Annual Conference and Exhibition The annual conference is an opportunity for the members of the nation's more than 3,000 sheriff's departments to learn and share information related to all parts of their mission, including law enforcement, jail operations, prisoner transport and courthouse security. Tim Meyerhoff, Director, North America, Iris ID, said biometric technology plays an increasingly important role in helping sheriff's deputies complete their jobs daily. Tim said, “Rapid and accurate identification of people is a major law enforcement need.” Contactless iris-based biometric systems Tim adds, “There is no room for error when it comes to booking and release of those charged with crimes. And our contactless iris-based biometric systems, the most accurate on the market, are ideal as departments continue battling the COVID-19 virus.” Among its many products, Iris ID will highlight three widely used by law enforcement organisations. iCAM M300 and iCAM R100 access control readers iCAM M300 is a lightweight, handheld device used by law enforcement to enroll and identify people in the field The iCAM M300 is a lightweight, handheld device used by law enforcement to enroll and identify people in the field. The iCAM M300 offers access to the three primary modes of biometric identification – iris, facial and fingerprint – with communication protocols including NFC, Wi-Fi, Bluetooth, GPS, 4G LTE and more. The iCAM 300 also provides magstripe and contactless card support and offers an MRZ reader to verify ePassports. Iris ID iCAM R100 readers replace the need for PINs, access control cards and RFID fobs to enter integrated smart lockers and key management cabinets protecting keys, weapons, evidence and other valuable assets stored by sheriff's departments. Iris ID biometric technology used by US government agencies Law enforcement agencies across the U.S., including the Los Angeles County Sheriff's Department, the York County (Penn.) Sheriff's Office and the U.S. Border Patrol use Iris ID biometric technology. Iris ID iCAM 7S series product is currently included in the Los Angeles sheriff booking stations. It is used to add iris-based identity authentication capabilities, resulting in more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints.
Johnson Controls, a global pioneer in smart, healthy, and sustainable buildings and architect of the Open Blue digital platforms, has released the latest version of Tyco American Dynamics victor and VideoEdge video management systems, offering accelerated deployment, more powerful analytics and optimised video management and control. Robust cybersecurity The powerful victor and Video Edge 5.7 solutions deliver on Johnson Controls' commitment to empowering customers with technology to maintain safe building environments, healthy business operations, and seamless occupant experiences. Offering more powerful camera features, enhanced analytic capabilities, and new configuration tools and workflows for faster deployment and reduced operator fatigue, the victor and VideoEdge 5.7 offer more intuitive camera management, simplified site management, and more robust cybersecurity features in a modernised interface. Victor and VideoEdge 5.7 offer intuitive camera management, simplified site management, and robust cybersecurity Improved video management “Enterprise customers need powerful and purpose-built video management that can be customised to meet the changing dynamics of today’s workplaces, regardless of industry or vertical market,” said Jammy DeSousa, director of Product Management, Video Solutions, Johnson Controls. “This latest version of the victor and VideoEdge platform enhances our current tools for improved user experience and further strengthens our existing cyber resiliency measures that are core to our offerings at Johnson Controls.” Powerful camera support More robust support for powerful camera features, including enhanced object and person detection and H.265+ compression, enable victor and VideoEdge users to leverage additional processing power from the cameras, resulting in deeper analytics with Illustra cameras. Cyber resiliency is also enhanced with encrypted video streaming from Illustra cameras directly into VideoEdge and Illustra Auto Configuration, which automatically configures Illustra camera security settings and adds the settings into the VideoEdge NVRs. Deeper analytics To support health and safety protocols, temperature readings from the Tyco Illustra Pro Thermal EST (elevated skin temperature) cameras can be stored and displayed within victor. If an elevated skin temperature is not detected, a face detection feature will ensure adherence with face-covering policies, triggering a mask missing alarm if no mask is detected. Intuitive controls and a host of productivity enhancements provide operators with simplified and optimised site management tools in victor and/ VideoEdge. With enhanced timeline control, operators can adjust playback speeds and scrub through video playback to more easily find specific sections of recorded video. Deployment times and the operator learning curve is reduced with intuitive wizards and workflows that provide better control of key video operational areas. Key highlights Victor and VideoEdge 5.7 also offer the following features: “Shake n Dry” – allows operators to literally shake off excess water or debris from PTZ cameras Configurable sensitivity settings for Intelligent Search for people on a per camera basis Support for new Illustra Pro Gen 4 cameras
Security stakes are high at healthcare premises. Patients expect and deserve privacy and safety. Yet, most medical buildings must remain welcoming spaces, many open around the clock. The protection of drugs and confidential data is critical, and every breach demands thorough investigation. Such needs go way beyond what mechanical security was designed to meet. Real-time control and monitoring Hospitals, for example, are often large and spread out. Their locks may need to integrate with fire detection, CCTV and other building systems. Labs and pharmacies are safer when access is managed with time-limited ‘keys’, which can be revoked. In care homes, security must be matched by convenience for a client group, who may have limited dexterity or learning skills. Here, real-time control and monitoring can help managers to react quickly. Too much is asked of a traditional metal key, if it is expected to do all this. Yet, wired security doors can be an expensive retrofit option. Fortunately, there is a solution: wireless access control. Wireless access control solutions Wireless devices provide the easiest upgrade or replacement for any access control system Wireless devices provide the easiest upgrade or replacement for any access control system, based on mechanical or magnetic locks. Credentials, including RFID smartcards, programmable keys or secure mobile keys stored on a smartphone, replace cumbersome physical keys. Wireless components make it a cost-effective option to add electronic control to many more areas of a building. With online locking systems, facility managers can monitor and manage premises at any time of day or night, even viewing the status of medicine cupboards or server racks from the same administration software interface. Integrating wireless locks Swapping existing locks for battery-powered cylinders or escutcheons can link a door to an access control system. In one recent survey of access control professionals, 95% of respondents judged system integration with other building/security management functions to be ‘somewhat’ or ‘very’ important. To meet this challenge at the Haute Savoie region’s new hospital, managers selected Aperio locking integrated online with an ARD access management system. Because Aperio locks are wireless, the hospital could introduce more layers of security and secure doors without incurring excessive installation or operating costs, including for sensitive offices and drugs stores. Staff no longer carry big bunches or waste time hunting down keys. Individual permissions are all stored on a single, programmable RFID credential. Battery-powered Aperio devices All battery-powered Aperio devices integrate natively with the central system, so wired and wireless access points at Centre Hospitalier Métropole Savoie (CHMS) are managed together, with real-time logs, remote door opening and free time-slot management. “Having just a single badge, and not having to carry around heavy keys, has been a major advantage for us,” said Béatrice Dequidt, Health Executive at Centre Hospitalier Métropole Savoie. “We have implemented internal HR management procedures, creating badges that are automatically integrated into ARD's operating software,” adds Alain Gestin, CHMS’s IT Systems Architect. Powerful, real-time access control Aperio and ARD also maintain compatibility of credentials with the French government’s electronic CPS Aperio and ARD also maintain compatibility of credentials with the French government’s electronic Health Professional Card (CPS), for added staff convenience. Multiple key systems and varied openings, including fire doors, glass doors, offices, pharmacies, car parks and lifts, plus hundreds of workers and contractors needing different, constantly changing permissions. Faced with these challenges, managers at Hospital MAZ, in Zaragoza, knew mechanical keys could not provide the 21st-century security they needed. SMARTair Wireless online access control Hospital MAZ upgraded locks to SMARTair Wireless Online electronic access control, which keeps facility managers updated in real time. A unified access system is controlled by intuitive software, installed at the central server and managed via client servers in different departments. Because the SMARTair Wireless Online system updates via communications hubs in real time, security managers implement all changes via the central system, without needing to waste time walking through the hospital, changing rights one door at a time. Employee convenience is greatly enhanced. Staff and contractors carry a single MIFARE smart card programmed with individual access permissions. Cards are personalised to double as employee IDs, so 625 staff and approximately 100 contractors only carry a single card. "We have achieved all our objectives with the installation of the system,” said Miguel Angel Hernández Jerez at Hospital MAZ. Intelligent keys Programmable electronic key systems put the advantages of access control into a familiar form. They reinvent the key for the 21st century, making it more flexible, powerful and better equipped to handle modern security demands. Lost keys and departed employees are no longer a problem, because their access rights are cancelled with a click. The key’s familiarity is welcome to a user group who are not experts — at least, not in access control. CLIQ electro-mechanical locking system CLIQ offers easy-to-use access control, based on high-security mechanical disc cylinders Managing physical keys can impact nursing care, as pharmacy managers at the UK’s Queen Elizabeth Hospital, Birmingham discovered. An older, mechanical system made it difficult to keep track of who held the right keys. Searching for that person wasted valuable time. They identified a better solution for convenient secure access to controlled medicines: CLIQ electro-mechanical locking. CLIQ offers easy-to-use access control, based on high-security mechanical disc cylinders, combined with encrypted electronic locking and identification. With CLIQ, power to the lock is supplied by a standard battery inside every CLIQ key, so no wires are required — making it an ideal retrofit solution for doors, cabinets and mobile drug trolleys. Each employee carries a single programmable CLIQ key to open any authorised CLIQ lock. No CLIQ device unlocks without the key first being authorised by the software. Remote key management QE Birmingham’s new CLIQ system allows for remote key management. Audit trails for locks and padlocks are available on-demand, so nurse managers can instantly see who has accessed particular cabinets or drug trolleys. “Programmable key solutions really boost medicine safety in hospitals,” said Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA, adding “Nurses at Queen Elizabeth, Birmingham, carry their own key with personalised access rights, so they don’t waste time finding out who has the key to every cupboard. Patients benefit.” “The message from all nursing staff is that patients are getting medicines much easier and in a more timely fashion,” said Inderjit Singh, Chief Pharmacist at QE Birmingham, adding “For us, the key return on investment is the quality of service we’re providing.” Simple, effective door control without software When installing a Code Handle electronic PIN lock, users need never worry again In any busy medical facility, however small, it is easy to leave a door unlocked. With expensive equipment or controlled drugs on the other side, an opening invites opportunist trouble. But, when installing a Code Handle electronic PIN lock, users need never worry again. A Code Handle fits right over an existing cylinder, users can simply swap the current handle for a low-profile Code Handle, and fix it in place with two screws, to instantly add PIN security to a consultation room, medicine store or equipment cupboard. It adds electronic security without a bulky push-button door unit, which disrupts interior aesthetics. Code Handle electronic PIN lock solution In Spain’s Basque Country, Fylab sought this easy solution for their consulting rooms. Requirements were straightforward: secure, keyless access around a facility with a lot of daily traffic from professionals and the public. They needed a device that is easy to retrofit, with a design to chime with Fylab’s contemporary medical workplace. Code Handle added this security to three consulting-room doors, without wires or cables. “I am no artist or handyman, but I managed to fit the handles within 10 minutes,” said Fylab’s Founder, Borja Saldias Retegui. Their Code Handle devices lock both wooden and glass doors, keeping equipment and personal belongings safe. “Code Handle provides the simplest solution for access control in a small facility,” Borja Saldias Retegui adds.
3DX-Ray have announced a contract for the sale of thirty ThreatScan- LS1 X-Ray scanner systems to an undisclosed law enforcement agency in southeast Asia. About ThreatScan-LS1 The ThreatScan-LS1 flat-screen scanner is a highly portable, flexible and powerful tool that allows law enforcement officers to rapidly examine and assess threats in situ, such as travel bags, laptops, packages as well as vehicle tyres, fuel tanks and doors. They can be used in a conventional EOD role, examining items for hidden Improvised Explosive Devices (IEDs). Or in a border security role, locating hidden weapons or contraband such as drugs. Each system consists of a portable X-Ray generator, a detection panel and an operator’s workstation running 3DX-Ray’s pioneering image processing software. Design and functions ThreatScan is lightweight, incredibly thin, and has a large imaging area of 600 x 460mm, enabling bags and objects to be scanned in one scan. This system can penetrate up to 34mm steel at 120kV while producing high-quality, sub-millimetre resolution images. ThreatScan can be used to inspect suspect bags and packages in mass transit areas, such as rail and bus stations, border crossings, airports, shopping malls, stadiums and sports arenas. Authority comments 3DX-RAY LTD, Sales and Marketing Director, Vincent Deery said, “We are extremely pleased to have been chosen by this customer in the face of stiff competition from other systems. The customer has been operating our systems for some time, so this new order is an affirmation of their faith in the system.”
In the past, security managers were primarily concerned with global terrorism. That has changed with the COVID-19 pandemic threatening the health of passengers at airports. Even if the number of passengers remains at a low level in many airports, surveillance won’t become any less complex. In fact, the opposite is true. Hygiene regulations raise new requirements for passenger processing and control. Reason enough for security managers to rethink airport security methods and evaluate how smart surveillance technologies can help meet new (and old) challenges better and more efficiently. Smart Airport Surveillance Smart Airport Surveillance combining IoT security cameras and AI video analytics help airport security managers to systematically monitor and understand passenger behaviour, gain valuable insights from video data and improve security and operations, automatically and in real time. CCTV camera systems are already in use at all airports worldwide. Why not use existing infrastructure to get more out of video data? For example, smart cameras can ensure social distance according to hygiene regulations or improve the visitor experience, by reducing waiting times at security checkpoints. IoT cameras with AI video analytics IoT cameras equipped with AI video analytics can do much more than just video IoT cameras equipped with AI video analytics can do much more than just video. Ajay Kattige, Solutions Consultant at Security & Safety Things, said “We at Security & Safety Things aim to bring the latest AI technology to IoT cameras, enabling them to perform more and sophisticated tasks in airport security measures.” He adds, “We make adding powerful features to surveillance cameras as easy as installing apps on smartphone.” Airport security management Despite the threat of COVID-19, the fight against terrorism remains a key objective in airport security management. Where thousands of people gather, signals indicating terrorist activity are easily overlooked. When it comes to reliably detecting unattended luggage or people with weapons in crowds, video surveillance involving human operators reaches its limits. Smart video cameras can support humans in recognising threats early and even perform tasks autonomously. AI-Lost camera app AI-Lost is an AI camera app designed to detect lost objects abandoned in specific areas, such as airports, stations and public spaces. AI video analytics integrated in the app enables airport security cameras to detect objects, such as suitcases and bags, not moved for a period of time (therefore, suspected of containing explosives) and notify security personnel. The video below shows how human behaviour that deviates from ‘normal’ patterns can be detected by security cameras in real time, ranging from minor disputes between people to vandalism. Similarly, aggressive or violent behaviour in airports can be detected early. AI-Loitering app to detect suspicious behaviour AI video analytics help detect even inconspicuous individuals based on specific behaviour patterns Terrorist attacks often have a prelude, people stay in one place for a period of time to scout the situation without being noticed by security staff. AI video analytics help detect even inconspicuous individuals based on specific behaviour patterns. AI-Loitering is a camera app that detects odd behaviour of people lingering around certain areas for a long period of time. Gun Detection Real App for weapons detection Gun Detection Real App for security cameras recognise in real time, if someone holds a gun and automatically triggers alarm. AI video analytics integrated in the camera app is able to distinguish weapons from harmless objects, such as smartphones, keys, pens or umbrellas. In very complex buildings, such as airports, it’s an ongoing challenge to keep restricted areas free from unauthorised people. Each security gate that is opened unintentionally triggers alarms leading to security routines shutting down airport operations for a period of time. Smart video surveillance combined with passenger information systems can help prevent these types of incidents. AM Line Crossing For instance, AM Line Crossing solution allows airport security managers to set up security zones in public areas where, for example, passengers are automatically notified, when approaching restricted areas. Connected to digital information systems, smart cameras not only recognise people entering defined areas, but also automatically guide them to their destination. In tall airport buildings, conventional smoke and fire sensors mounted under the ceiling are limited because they detect and report threats too late. Optical sensors, such as security cameras equipped with AI video analysis, can detect smoke and fire from long distances and automatically take timely action. AI-Fire and AI Smoke apps for flame and heat detection AI-Fire detects flames at significant distances in areas unsuitable for traditional fire alarms For example, AI-Fire detects flames at significant distances in areas unsuitable for traditional fire alarms, such as huge indoor areas in airports or stations. Combined with AI Smoke, another AI app for security cameras, airport security managers get a powerful early warning system that reliably detects and analyses all stages of fire progression. Waiting in long queues at boarding and security checkpoints challenges passengers' patience and can seriously damage travel experience. Airport staff has to take the rap, when negative passenger emotions are released. AI video technology to avoid long queues AI video technology can help avoid waiting lines and hassle. If queues get too long, smart surveillance systems automatically give instructions to staff or inform visitors via digital displays in the waiting area. At Budapest Airport, for example, visitor management works with an existing camera system equipped with smart software applications. Video data is analysed in real time, so that waiting times can be predicted with 96 percent accuracy. These numbers are communicated via displays, for example, to direct visitors to other checkpoints. Protect passengers & airport staff against COVID-19 Social distancing is the key to preventing or at least slowing down the transmission of COVID-19 from person to person. Where many people come together, surveillance is needed to ensure appropriate behaviour. The same applies to make sure that people wear masks wherever mandatory. IoT cameras, equipped with the latest technology and AI, can help detect behaviour and characteristics that do not comply with regulations. Security & Safety Things and partners offer easy-to-install AI solutions to help flatten the curve of COVID-19 virus transmission.
Installing effective security infrastructure on a property involves a thorough risk assessment and deploying a comprehensive solution that takes all possible threats into consideration. For example, if the security solution only addresses the threat of vehicular attack and disregards the risk associated with pedestrian trespassers, one may be leaving themselves unnecessarily vulnerable to breaches by unauthorised personnel on foot. Delta Scientific understands the risks that trespasses by pedestrians can pose to a facility, especially one where sensitive operations take place. That’s why; the company is pleased to introduce a new product, the anti-climb pedestrian door. Standard security features The anti-climb door comes equipped with an electronic keypad door handle, as well as a manual to guide through the programming process. One can specify whether they want a weather-proof keypad for an outdoor installation or a standard one for indoors. In addition to the electronic keypad, there is also a latch to secure the door further with a padlock if desired. The latch is standard, but a padlock is not included. No matter the weight of the door, the standard heavy-duty hinges allow for ease of opening and closing. The door can easily be installed by drilling into an existing fence post and using the tamper-resistant lock nuts and carriage bolts to connect it to the frame. These connections are on the secure side of the fence, making them even more difficult to compromise. A standard anti-climb screen fence consists of 14-gauge wire in a 5/8 mini-mesh. Customisation options Regardless of the size of the opening one needs to protect, the door will be built to fit it. While fence meshing is standard, one may choose from several other materials for the door: Glass (tinted or non-tinted Pickets Solid panels Expanded metal All of these options are designed to prevent climbing by pedestrians, just as the standard fence meshing is. Additionally, one may choose from either the standard door closers or automatic door closers. If one wishes to improve ease of egress, they may have a push bar installed for exiting quickly through the door from the secure side. This will not affect the functioning of the features on the outside. If one requires a gun port for the door, this is an option as well. Electric door latches are also available, and one may choose from hard-wired or battery-powered options. Some applications The anti-climb pedestrian door would be suitable for a facility with restricted access due to sensitive operations, such as a military installation or research facility. Not only would it deter bad actors trying to breach the property with malicious intent, but it would also discourage casual trespassers with no specific objective other than to go where they are not supposed to. A breach by any unauthorised personnel represents a security risk, even if it was carried out with no specific criminal intent. A hardened anti-climb pedestrian door is a component of a comprehensive security solution for the property.
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorised access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organisation secure.
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulnerable to threats. Physical security solutions Terrorists and other malefactors have known for centuries that any large gathering of people has inherent vulnerabilities on which they can prey: Crowds make it hard for security to keep track of any single person or spot unusual behavior, and the number of people congregated in one space amplifies the impact of any attack. In recent years, organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands, and deploying K9 and police units to patrol the lines to enter security. But these current methods share a universal flaw: to be caught, evil-doers have to be on the verge of actually entering the venue with hundreds of other people, which means they can still cause a massive amount of destruction. In a survey conducted by Brivo, 50 percent of business security leaders felt they lack adequate budget and financial resources to invest in physical security solutions. Augmented security measures Organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands Security professionals and event organisers are constantly on the verge of finding new methods to implement in order to add an extra layer of security at venues and large facilities. For example, at this year’s Coachella Music Festival in Indio, California, which attracts over 100,000 attendees each year, organisers boosted their security initiatives by adding drones, armed guards, magnetometers and dog patrols. Unfortunately, large entertainment festivals have been a target for ill-intended individuals. Last year, the 91 Route Festival in Las Vegas, Nevada took the lives of more than 50 people and injured over 500. In the United Kingdom, 22 people lost their lives to a suicide bomber at an Arianna Grande concert in the Manchester Arena. Yet, concerts aren’t the only place new security initiatives and technology need to be implemented in, but also sports arena and large facilities. Metrasens partnered with Villa Park, the football grounds for Aston Villa Football Club in the UK, to conduct a trial using FMDS technology, Proscreen 900, to screen fans Current screening methods Conventional walk-through metal detectors are a compromise between effective screening and high throughput, as they successfully detect metal objects, but only can screen about five or six people each minute. They are generally placed 10 to 20 yards from a venue’s front façade, either just outside or just inside, to screen people as they enter the facility. Hand wands are used for anyone that sets off the walk-through detector as a secondary screening method for confirmation. Many facilities also use observational methods to screen, such as drones, CCTV, security officers or police walking the crowd and looking for suspicious behavior, or explosives-sniffing K9 units patrolling the area. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue Security method limitations Each of these methods has intrinsic limitations. Observational security methods are just that – observation-based, not detection-based. They rely much more heavily on human factors that introduce greater degrees of error and chance, and positive visual identification of a suspicious threat requires a relatively close proximity to observe the threat. They’re also slow and laborious. Walk-through detectors and wands will catch someone trying to enter a facility with a weapon, but by the time they do, it may be too late – a terrorist will already be well within proximity to do a lot of damage. Bad guys don’t need to actually enter the venue; they just need to get close enough to injure or kill a large number of people. That can happen – and has happened, such as with Manchester Arena bombing in 2017 – right at the security point, where a terrorist will be surrounded by dozens or hundreds of people and 10 to 20 yards away from the critical asset: the interior of the venue. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue. What they haven’t had until recently is a way to screen mass amounts of people for weapons of mass casualty as far away from the critical asset as they can, and as far away from densely populated areas as they can, all while not impeding throughput resulting from the requirement for patrons to divest their possessions. Expanding security reach with FMDS The far perimeter of a venue is an ideal place to screen for weapons of mass casualty. Most of the time, a terrorist is trying to get closer to the immediate perimeter of the venue, to inflict the most damage to large groups of people waiting to get in; farther away, event attendees are walking toward the entrance and thus are more dispersed, not standing in clusters or lines. This advance screening is possible using ferromagnetic detection systems (FMDS). The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium Metrasens recently partnered with a football stadium in Birmingham, UK to conduct a trial using FMDS technology to screen fans. The trial took place in March at Villa Park, the football grounds for Aston Villa Football Club. The stadium can hold over 42,000 people. The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium, adding an extra layer of security. FMDS is highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Everything else is invisible to it; it doesn’t see people, clothing, backpacks, purses, etc. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects a magnetic signature, down to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find (e.g., a weapon). Although it is a passive technology, it is more effective and reliable than using observational security methods to screen a perimeter, because the technology will never miss something the way a human would. Recognising moving magnetic signatures An important point is that the system only works on moving objects. This makes it immune to environmental conflicts such as rebar that would trip up conventional metal detectors and allowing people to be screened quickly and unobtrusively without stopping to divest their possessions as they walk toward a venue – up to 50 or 60 people a minute. FMDS does not need people to be organised into lines or groups; it simply detects a magnetic signature on anything that passes. It runs on batteries – there is no need for an electricity source, as with a walk-through detector – and can be placed on just about any form factor (a pole, a stand, etc.). This gives security personnel flexibility when deploying FMDS, allowing them to create a wide perimeter around a venue without worrying about portability or a power source. Screening can be as obvious or as concealed as personnel prefer for a particular situation, based on the form factor they select. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution All of these combine into a solution that creates a way to close a gap in mass screenings at large events, by expanding the secure perimeter and creating a highly accurate way to detect weapons of mass casualty farther away from a critical asset and large crowds. It does not replace screening for smaller items necessarily, and all large venues should use a layered security solution that also deploys tactics like roving security guards, walk-through metal detectors and hand wands. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution. Effective mass screening solution Pessimists sometimes muse the world is getting more dangerous with each passing year, and that technology is at least partially responsible for both the breadth and depth of the increasingly creative ways bad guys harm people. But some technologies also are responsible for helping to fight against those threats and make the world safer, and FMDS is one of those. By providing a foolproof method of detecting weapons of mass casualty before terrorists get too close to an event venue, FMDS gives event security personnel a way to better protect large events, making them less dangerous and keeping people safe. Images source: Metrasens
A force of 85,000 police and military will patrol the Olympic grounds and environs to provide security A week before the Rio Olympics were slated to begin, Brazil fired the private security firm assigned to hire personnel to screen people entering the various Olympic venues located around Rio De Janeiro. The security plan called for 3,400 screeners. The security firm had only found 500. What happened? Today, prospective security officers must undergo background checks that do not raise red flags. Observers noted that unsatisfactory background checks and drug tests probably explain why it has been so difficult to find and hire the large numbers of security people needed in the short period of time allotted. That problem aside, a force of 85,000 police and military will patrol the Olympic grounds and environs to provide security. “Security officers and soldiers have different ways of thinking,” says Ron Lander, a principal with Norco, California-based Ultrasafe Security Specialists. “Soldiers may be more aggressive than security officers. That may be appropriate for an event like the Rio Olympics.” “Then again, security officers are trained to de-escalate aggressive behavior and calm unruly customers so that everyone walks away with a handshake,” says Lander. “The army may not have had that kind of training.” Olympic security technology Olympic size events make liberal use of technology. The Olympic grounds in Rio have surveillance cameras as well as access control points. In addition, there are cameras connected to facial recognition systems. “Facial recognition is getting better and better,” says Lander. “Camera placement is an important key. There are mullion cameras placed in doors that take head on video that is required for reliable facial recognition. As the camera system clears people, the access control system checks them in.” Checkpoint technologies also include magnetometers that check for metal weapons. It is recommended to create two or more concentric security circles around the perimeter of an event, with attendees passing through access points in the circles Concentric security circles Lander recommends creating two or more concentric security circles around the perimeter of an event. Physical barriers and ropes can create the barriers and funnel people to checkpoints that also provide access. Why concentric circles? “It is a security technique called progressive redundancy,” Lander says. “There could be many steps. In a security facility, for instance, you lock the door, place an alarm at the perimeter, put up a fence and assign a patrolling guard.” So security at an Olympic-style event will feature two concentric security circles around the location of the event. Attendees will pass through access points in the circles. At one checkpoint, they may pass through a magnetometer. At the second, two officers will check purses and bags, while a third officer looks for telltale behavioral recognition signs — individuals who are nervous and sweating, wearing a heavy coat on a warm day or exhibiting behavior that is unusual in some way. Video analytics “Today, some organisations are moving toward video analytics,” Lander says. “There are cameras with analytics software and network video recorders with analytics inside the engine. I prefer analytics on the front end.” Users can program video analytics cameras to look for and alarm on certain kinds of video. For instance, analytics can be set to alarm when people run through a camera’s field of view. Analytics can look for motion in a place and at a time when nothing should be moving. The technology can identify abandoned packages and alert security to investigate. There are a number of security scenarios that video analytics can stand in for human beings, who often get tired. Video analytics don’t tire out and fall asleep. In the end, the role of security technology is to support security officers, and their role is to remain alert, aware and responsive to alarms. Save
Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionising radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method. AI algorithms Other innovations include an automatic screening lane, centralised image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI. CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021. Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travellers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitiser container of up to 12 ounces, one per passenger in a carry-on bag. A paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimise the death toll)? In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effectiveness of preventative measures as they relate to school shootings. Scarce resources on preventative measures The dearth of knowledge on the subject leaves schools at risk of spending scarce resources on measures that don’t have any real impact, or worse, that have a negative effect on education environments. The natural impulse following a school shooting is to do something – anything – to prevent the tragedy from happening again at any school, but especially at my school. But how is money best spent?Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything Congress has passed the Stop School Violence Act of 2018 to provide $50 million per year to develop programs to train students, teachers and law enforcement to prevent violence, and to create anonymous reporting systems, such as hot lines, for school violence threats. The bill authorises another $25 million for improvements to school’s physical security infrastructures. Congress also provides $1.1 billion in Title IV block grants, which districts can use to pay for diverse needs such as security systems. Several states are providing additional funding for physical safety measures and campus police, and local districts are also stretching their budgets to address security concerns. But is that money being targeted to measures that will help the situation? What is the role of technology in preventing school violence, and are we as an industry at risk of over-selling our preventative capabilities and diverting money from other measures that might have more impact? Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything. More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process Studies on school safety and protection Researchers, advocates and educators gathered this fall at American University to consider the need for better research to inform decision-making on safety, reported Education Week.The field is in desperate need of more evidence on what works, and schools want this information presented to them" A 2016 study by the Rand Corp. points to the problem: Lack of data and research on what works and what doesn’t. “Despite growth in the school safety-technology sector, rigorous research about the effectiveness of these technologies is virtually non-existent,” according to Rand. “The field is in desperate need of more evidence on what works, and schools want this information presented to them in vetted, digestible ways to help them with procurement.” Jeremy Finn, a professor of education at the University of Buffalo, has pointed out the difficulty of assessing the effectiveness of measures designed to deter events that likely won’t occur anyway. “How do you know when you have deterred a school shooting?” he asks. “It didn’t happen.” The effects on our students Might technologies aimed at making schools more secure have an adverse effect on the learning environment? More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process. The physical security industry should freely acknowledge that the technologies we offer are only part of the solution to school violence Do security measures aimed at preventing active shooting incidents absorb resources that might better be used to address a more general and/or likely security threat such as vandalism or student discipline? Theoretically, security measures in general should help to prevent the probability of an active shooter at the same time they are addressing a wider range of concerns and threats. But do they? At the very least, we in the physical security market should be aware, and should freely acknowledge, that the technologies we offer are only part of the solution to school violence. Schools should take the broadest possible approach to the range of security challenges, and technology should be one tool among many. Furthermore, better data to measure what works is sorely needed to illuminate the best path forward.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
GNP (Grupo Nacional Provincial) is one of the largest insurance providers in Mexico. The company has several offices throughout the country and primarily provides insurance policies for life, medical, automobile, home, and business. The organisation was relying on analog CCTV technology that was unreliable and outdated. GNP wanted to modernise from its outdated system and deploy a new IP surveillance solution to improve security and take advantage of enhanced features. Network barriers Several network barriers needed to be addressed before the organisation could deploy the new IP security solution. A Coax infrastructure supported the existing CCTV system in each of the company’s locations. A Coax infrastructure supported the existing CCTV system in each of the company’s locations The customer had initially thought about ripping out the existing Coax-based infrastructure in each location and using fiber-optic cabling to extend connectivity beyond the 328ft (100m) reach limitation of standard Ethernet switches. However, this strategy would be extremely costly, disruptive, and time-consuming. GNP was also concerned with the potential business disruption and negative operational impacts as a result of the construction work needed to overhaul the network. The organisation required an innovative solution to achieve its digital transformation objectives. NVT Phybridge EoC Given the customer’s modernisation challenges, Logen, the reseller partner, recommended NVT Phybridge EoC (Ethernet over Coax) innovations. Logen had used NVT Phybridge products in the past for many other projects and was confident in the technology. GNP was excited about the potential solution and organized a proof-of-concept to test the technology in one of its locations. CLEER24 switch After a few simple setup steps, the NVT Phybridge CLEER24 switch transformed the customer’s existing and proven Coax-based infrastructure into a power-packed IP backbone. The CLEER24 switch delivers power and data over a single Coax cable up to 6,000ft (1,830m), which’s 18-times farther than a standard Power over Ethernet (PoE) switch. GNP was impressed with the results and decided to move forward with the project using the CLEER24 switch. The customer avoided traditional rip-and-replace strategy, leveraging the existing Coax infrastructure to achieve results Simple and quick installations GNP was delighted with the entire experience, using the CLEER24 switch to deploy more than 250 IP cameras across several locations. “Installing the CLEER24 switch was simple, quick, and did not require any special tools,” said Mario Gomez Alvarez. “The NVT Phybridge team provided excellent technical support and training materials.” The customer was able to avoid the traditional rip-and-replace strategy, leveraging the existing and proven Coax infrastructure to achieve incredible results. Simplify and accelerate the deployment by 40% Reduce total infrastructure costs by 50% Prevent service outages and operational disruption during the upgrade Eliminate IDF closet requirements Maintain a physically separate network for the new IP security devices Allocate infrastructure cost savings towards more IP devices and applications GNP took full advantage of the CLEER24’s feature set. The switches are stacked and configured for power redundancy. Unused ports are locked for enhanced security. All equipment is centralised in one location for better system control.
As part of a wider regeneration of Plymouth, Teats Hill, known as the ‘unforgotten corner’ recently underwent a much-needed transformation. The residents’ call for change instigated Plymouth City Council, partnering with several local organisations including Plymouth and Exeter Universities, Blue Health, and the National Marine Aquarium. Together, they selected five sites across the city to benefit, to improve the quality of life for the local community. Current building regulations In Teats Hill, an existing play area was restored. It now boasts brand new equipment to reflect its marine location and heritage. An amphitheatre was also constructed to host educational activities, public events, and performances. Alongside the development, Teats Hill flats, built in the late 1930s, were renovated by Mi-space Construction. The flats offer unrivalled sea views and are situated in a prized location near the National Marine Aquarium. The demarcation wall surrounding the flats was over this height and therefore needed securing Despite this, the building had been neglected for many years and consequently had fallen into disrepair. The flats were also not compliant with current building regulations, as it is a legal requirement for any wall over 600mm high to have a handrail of at least 1100mm high, to protect people from falling. The demarcation wall surrounding the flats was over this height and therefore needed securing with adequate fencing. Polyester powder coating Jackson Fencing’s Sentry® Residential railings were specified for the project. These were installed on top of the wall by Chiffi Group Ltd, Constructionline Gold Member fence contractors. The tubular construction and welded stopped pale-through-rail design meant these railings provided a strong but lightweight safety fencing solution. The building’s original features needed to be carefully considered and preserved during the renovation. This made these metal railings the ideal solution, designed specifically to offer a more fitting, modern alternative to traditional wrought iron railings, while providing the same elegant appearance. The railings are hot-dipped galvanised inside and out, to ensure long-lasting protection against rust and corrosion. Finally, a black polyester powder coating was added to provide a durable and attractive solution that would match the renewed aesthetic of the building. Robust fencing option The Sentry residential railings are manufactured carefully to ensure long-lasting protection" Crucially, the pale spacing of the railings conforms to building regulations, which state that a 100mm sphere should not be able to pass between pales, to prevent a trap hazard, which is particularly essential in areas where children are present. Peter Jackson, Jacksons Fencing Managing Director, comments: “As the UK and its urban centres continue to grow, making residents feel safe and secure in their local area is essential. It’s encouraging to see this community was supported by government at the local level, as councils work to improve the lives of their communities.” “We were pleased to be a part of this regeneration project, providing a robust fencing option that was also in keeping with the desired aesthetic. As with all our steel products, the Sentry residential railings are manufactured carefully to ensure long-lasting protection so they withstand the test of time. Moreover, we know from experience that these manufacturing techniques will also help to significantly reduce the long-term costs for repairs and replacements, leaving maintenance budgets for the local area available for other necessities.”
In the spring of 2021, the Vernadsky Research Base, a Ukrainian Antarctic Station, was equipped with an Ajax security system featuring FireProtect and FireProtect Plus fire detectors. The Ajax equipment was delivered at a distance of 16 thousand kilometers that protects the scientific base in Antarctica. From this article, one will learn how to install a fire alarm system at a facility if that facility is a polar station. Presence of previous fire alarm There was, but no one upgraded it for 36 years (since 1985). For the first 10 years, the base was used by British polar explorers. At the time, the base was called “Faraday” and belonged to the United Kingdom. Since then, it changed its name, flag, and country, but not its fire detection equipment. The old system malfunctioned and caused false alarms. Some detectors were inoperable. But finding spare parts for them (and bringing them to Antarctica) was becoming more difficult. What happens if there is a fire? Antarctica is the windiest place on earth, where hurricane-force winds blow most of the time. Even a tiny flame can quickly turn into a large blaze. A fire alarm is chosen based on its communication reliability, maintenance, fire alert, and climate impact Most of the buildings at Antarctic stations were built decades ago. These are often small wooden houses with metal panels insulated with foam. When the foam burns, it releases the deadly phosgene gas. In 2020, there was a short circuit at the Russian “Mirny” station. The fire burned down laboratories, the radio room, and other buildings. Criteria to choose an alarm system A polar station is an unusual facility. The following is considered while choosing an alarm system: Communication reliability: The station is a complex of buildings, so it is important to cover them with one system. For this, the most reliable radio communication with a long-range is required. Maintenance: One can’t invite a professional installer to a station in Antarctica; the station engineers maintain the system themselves. It mustn’t require a lot of attention. Devices must operate from batteries for years, and instantly alert if something goes wrong. For example, if a detector loses connection or if batteries need to be replaced in a couple of months. Fire alert: There is a person at the station who monitors the system. You need a system with a handy alarm-monitoring app for PCs as well as loud sirens to alert people to danger. Сlimate impact: During the cold season, the temperature outside drops to -27°C. In residential premises, it is kept at +16-18°C, and in non-residential ones, it is kept with a slight “plus”. The specifications of the detectors must correspond to these conditions. Why Ajax? “The policy of the Antarctic Center is to buy Ukrainian. And only buy the best you can’t economize on Antarctica. The price of failure is very high, and shipping costs a lot of money. A marker was triggered: if a security system then Ajax. And we were not mistaken with the choice,” said Viacheslav Marchenko, Deputy Director of the National Antarctic Scientific Center (NASC) In addition to the hub (the security system control panel) and two sirens, ten Ajax fire detectors were delivered to Galindez Island in West Antarctica. They protect against fire, detect smoke and rapid temperature swings, and prevent carbon monoxide poisoning. Secure radio protocol When connected to the Ajax security system via the secure Jeweller radio protocol, the detectors can operate at distances of up to 1,300 meters from the hub. Works without internet Ajax fire detectors will do the job even if the station loses access to the Internet or there is no one to monitor alarms. The devices can operate independently from the system control panel. Even if there will be no connection with the hub, detectors will recognize the threat, and the built-in sirens will alert the danger. The siren volume is 85 dB to wake up even those who fast asleep. Works at varying temperatures Ajax will also handle it when the temperature in the station premises drops to +11-12°C (happens when there are strong winds). The detector’s operating temperature ranges from 0°C to +65°C. Operation period Finally, there is no need to worry about how frequently one has to send new batteries to the station. The autonomous operation period of the detectors is up to 4 years. Bring equipment to Antarctica All Ajax devices were bought in Ukraine. It took three planes, one ship, and about seven days to get them to Antarctica. Five of those were spent traveling by ship, which crossed the stormiest place on the planet, the Drake Passage. Each polar explorer brings three bags: two with their own stuff and one shared. Ajax was delivered in such a bag. Installation and setup Ajax devices work out of the box; they connect to a hub in one tap in the apps and mount in a few minutes Ajax devices work out of the box; the battery is already pre-installed, and the detectors don’t need to be disassembled. They connect to a hub in one tap in the apps and mount in a few minutes on a SmartBracket. Any questions can always be resolved by contacting the Ajax support team, which is available 24/7 and helps users from all over the world in six languages. Working of station alarm monitoring The station uses the computer with the PRO Desktop app installed. A screen with all the indicators is placed in the lobby of the main building. Another computer in the on-duty person’s office is used as an alarm monitoring station. To manage the system on the go, station engineers have Ajax apps on their smartphones. The station has Internet, but it became unlimited only this spring after installing a satellite antenna. During the two months of operation, there were two alarms at the station: in the kitchen, when the polar explorers were grilling steaks, and in the carpentry shop, where welding work was taking place. In both cases, the equipment responded to the smoke. Further plans The plan is to install 20 more fire detectors at the station as well as to supplement the Ajax system with the ReX radio signal range extender. The polar station consists of 12 buildings (including living quarters, a carpentry workshop, and a boathouse), located at a distance from each other. The buildings are covered with profiled iron, which can interfere with the radio signal. The range extender will increase the reach of the devices and become a reliable link between the detectors and the hub.
One of the largest department store groups in Europe was relying on outdated analog security cameras and needed to strengthen its physical security measures. The retailer decided to modernise to an IP-based surveillance system in each of its retail locations to deter theft and provide better recognition capabilities. Modernisation phases Given the number and immense size of each store, the project was going to be massive. The organisation decided to modernise its security system in two phases. The first phase would involve upgrading the existing analog devices with IP cameras at each location. Phase two would include expanding the security system with additional IP cameras to provide complete surveillance coverage. The organisation was specifically interested in having IP cameras at each check-out terminal to ensure the safety of its employees. To successfully achieve the project’s objectives, the organisation determined it would need to deploy and support over 90,000 IP cameras across the organization’s retail facilities. Setting up an IP infrastructure The organisation was uncertain about how to proceed and searched for a solution that would allow for modernisation of IP Before the retailer could move forward with the project, it needed to establish the necessary infrastructure to support the new IP solution. A Coax-based infrastructure was supporting the existing analog cameras, and the organisation was not interested in the traditional rip-and-replace upgrade method, as they were concerned with: Extremely high costs and time requirements to retrofit hundreds of locations with new cabling and equipment Loss of revenue and a poor customer experience due to the business disruption caused by the renovations Losing valuable retail floor space from the IDF closets required to connect the IP cameras exactly where they were needed Ensuring a smooth and efficient modernization across every location The organisation was uncertain about how to proceed and searched for a solution that would allow for a more graceful modernisation of IP. Power over Ethernet technology The Spanish retailer discovered NVT Phybridge and engaged with a digital transformation specialist to learn more. NVT Phybridge worked closely with the customer to understand their objectives and challenges and recommended Modern LAN design and the CLEER24 (Ethernet over Coax) managed switch solution. CLEER24 switch CLEER24 switch transformed the existing Coax-based infrastructure into a robust and secure IP backbone The award-winning CLEER24 switch delivers power and data over any new or existing Coax-based infrastructure with reach capabilities up to 6,000ft (1,830m) – that’s 18 times farther than standard Ethernet switches. The customer was impressed with the proposal and wanted to see the solution in action. A no-obligation proof of concept was arranged at one of the retail locations to test the technology in the customer’s environment. In just a few simple setup steps, the enterprise-grade CLEER24 switch transformed the existing Coax-based infrastructure into a robust and secure IP backbone. Due to the success of the proof of concept, the retailer was completely confident in the CLEER24 solution and was finally able to move forward with its IP modernisation initiative. Scalable surveillance system By leveraging Modern LAN Principles and the CLEER24 innovation, the retailer was able to deploy over 90,000 IP cameras across the organisation. The Ethernet over Coax innovation allowed the customer to reuse its existing Coax-based infrastructure; eliminating the high cost, risk, complexity, and disruption that would have been caused by the traditional rip-and-replace model. Additionally, the NVT Phybridge EC4 Adaptor was used to easily expand the surveillance system, providing the freedom to connect up to 4 IP cameras using a single long-run Coax cable. IP modernisation objectives The customer took a proactive approach to find new and better ways to support its IP modernisation objectives in a financially and socially responsible manner. The organisation changed the conversation to improve their outcome; using Modern LAN Principles and Power over Ethernet innovations to: Reduce infrastructure costs by more than $20 million; allowing more budget to be allocated to applications and better application adoption Simplify network requirements and significantly reduce the total deployment time Eliminate business disruption to maintain optimal customer experience and avoid loss-of-revenue Maintain a physically separate network path for the security devices and applications to ensure the security and performance of the overall business network Increase safety and security by increasing the number of cameras deployed in a single location using the EC4 Adaptor Save precious retail space by eliminating the need to install additional IDF closets Prevent over 3,000 tons of cabling e-waste from ending up in a landfill The rackmount capabilities helped the customer stack and configure the switches in multiple configurations to fit their unique needs. The CLEER24 switch comes standard with PowerWISE® technology, allowing four switches to be stacked together for power-sharing, load balancing, and power redundancy.
Rohde & Schwarz has installed Ireland’s first Quick Personnel Security (QPS) scanner at Kerry Airport, Farranfore, Ireland, delivering state-of-the-art technology that enables a high throughput, enhanced security, and increased safety for airport customers and staff. The airport has chosen the latest model, the latest generation R&S QPS201 launched earlier in 2020, becoming the first Rohde & Schwarz security scanner installation in Ireland. R&S QPS201 security scanner The R&S QPS201 security scanner by Rohde & Schwarz features enhanced second-generation algorithms that increase sensitivity to further boost threat detection while minimising false alarms and reducing processing time. In addition to strengthening security, these performance gains reduce post-alarm manual checks and so help avoid physical contact to ensure social distancing. Moreover, a more efficient scanning time with R&S QPS201 balances the effects of incoming new X-ray inspection systems, which scan items inside baggage that previously had to be removed, such as laptops. The security scanner restores parity to baggage- and personnel-scanning times, helping security staff manage throughput at checkpoints and avoid excessive queueing. Rohde & Schwarz QPS scanners The Rohde & Schwarz QPS scanners are highly regarded by the air travel industry worldwide" “The Rohde & Schwarz QPS scanners are highly regarded by the air travel industry worldwide and the latest technology takes performance to an even higher level,” said Gary Walker of Rohde & Schwarz, adding “I am confident that Kerry Airport and its customers will appreciate the enhancements to service, security, and safety, and that others in Ireland will follow their lead.” Tom O’Driscoll, Chief Security Officer of Kerry Airport, commented “Now is the right time for this investment in the future of Kerry Airport, to meet the heightened expectations for safety and security within our industry. Having recently installed explosives detection systems for cabin baggage (EDS CB), we are proud to now also adopt this state-of-the-art technology in Ireland, which will set new standards for service and well-being.” R&S QPS201 was installed and setup at Kerry Airport with minimal disruption to daily activities. The system is designed to be easy to use, with intuitive graphical displays that require minimal training and let operators quickly achieve full proficiency. Integrated with millimeter-wave technology Leveraging Rohde & Schwarz expertise in millimeter-wave technology and utilising machine-trained software algorithms, R&S QPS201 detects all types of potentially dangerous objects whether metal, ceramic, plastic, or liquid. The harmless low-energy millimeter-waves enable personal privacy to be maintained while capturing high-resolution data that enhances threat detection. The system allows an easy, hands-down posture for scanning, which is comfortable while at the same time ensuring effective screening for safety and security.
Leonardo delivered the first two M-345 jet trainer aircraft to the Italian Air Force, which to-date has ordered 18 units from a total requirement for up to 45 aircraft. The new type of jet trainer aircraft, designated T-345A by the Italian Air Force, will gradually replace the 137 MB-339s which have been in service since 1982. M-345 jet trainer aircraft Marco Zoff, Leonardo Aircraft Managing Director, said “Building on our heritage and expertise in jet trainers, the M-345 will allow our customers to achieve a significant improvement in training effectiveness while at the same time reducing operating costs. This first delivery to the Italian Air Force is a key milestone, the result of a longstanding and productive team working closely together with the operator.” The new M-345 jet trainer aircraft, designed to meet basic and basic-advanced training requirements, will complement the in-service M-346, which is used for advanced pilot training. Integrated training system Leonardo’s integrated training system developed around the M-345 platform is representative of the company’s technological leadership in training pilots to fly current and future generation aircraft. The system benefits from experience with, and technology developed for, the M-346, which includes a ‘Live Virtual Constructive’ capability. This allows aircraft which are flying live training missions to incorporate simulated ‘friend’ or ‘foe’ elements into scenarios, allowing the pilot to be exposed to the full range of possible operational situations. M-345 HET (High Efficiency Trainer) The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots The M-345 is a high-performance aircraft which supports a pilot’s transition from basic trainers to latest-generation fighters. The Italian Air Force’s acquisition of the new aircraft is an important step forward in the modernisation of its fleet, with the M-345 replacing the MB-339A in Air Force’s second and third military pilot training phases. The M-345 has also been chosen as the new aircraft of the Italian Air Force’s acrobatic team, the ‘Frecce Tricolori’. The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots. It also gives trainees the chance to fly an aircraft that features higher performance characteristics than other basic/advanced trainer aircraft currently in service around the world. Delivering high quality training at low cost The performance of the M-345 allows it to carry out the most demanding mission types found in a training syllabus, delivering high quality training at significantly lower cost. The M-345 cockpit architecture is the same as that of frontline fighters. The aircraft is also able to perform operational roles, thanks to an extended flight envelope, with a high-speed maneuvering capability even at high altitudes, modern avionics systems, high load capacity and performance. Health and Monitoring Usage System The M-345 is designed with a long life-cycle and a two-level approach to maintenance The M-345 is designed with a long life-cycle and a two-level approach to maintenance, eliminating the need for expensive general overhauls. The aircraft’s Health and Monitoring Usage System (HUMS) also contributes to a lower cost of ownership. A sophisticated on-board training simulator confers a number of benefits. For instance, M-345 pilots are able to plan maneuvers before live training, allowing for higher efficiency during flight. Mission Planning and Debriefing Station Trainees are also able to fly in formation with other pilots in the air and those training on the ground in simulators, via a real-time data-link. The aircraft’s Mission Planning and Debriefing Station (MPDS) allow trainees to analyse the missions they have just flown. The M-345’s engine is a Williams FJ44-4M-34 turbo fan optimised for military and aerobatic use. The cockpit is based on HOTAS (Hands-On-Throttle-And-Stick) controls and features a glass cockpit with a three-colour MFD (Multi-function Display) touch screen. The aircraft’s heads-up display is mirrored on a fourth screen in the rear seat.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Metal detectors: Manufacturers & Suppliers
Simplified security for utilities & critical infrastructureDownload
Best practices for migrating to an IP-based access control systemDownload
Access control: Bringing efficiency to your lifts' automatic destination systemDownload
Webcast: Save time and money with Wireless Access ControlDownload