Hikvision, globally renowned supplier of innovative security products and solutions, has announced its ISO 28000:2007 certification, marking a further strengthening of the company’s supply chain security assurance. ISO 28000:2007 certification The ISO 28000 Supply Chain Security Management System standard was developed to satisfy the needs of enterprises for the standardisation of supply chain security management, with the goal of improving overall performance of the supply chain. The st...
At GSX 2019, on booth 251, Hanwha Techwin America, a supplier of IP and analogue video surveillance solutions, will announce its latest multi-sensor cameras. The new cameras feature motorised varifocal lenses for precise control of focal length, angle of view and zoom for each direction. Each sensor supports remote PTRZ (pan, tilt, rotate, zoom) control for efficient installation and easy adjustment. The 2MP PNM-9084RVQZ and 5MP PNM-9085RVQZ feature built-in IR illumination for each sensor whil...
Dahua Technology, manufacturer of video surveillance products, has announced a strategic partnership with Pepper, an IoT platform-as-a-service, to allow the integration of its intelligent solutions into Dahua hardware. Highly secure cloud hosting Pepper’s U.S.-based platform powers connected devices around the world, delivering highly secure and private connected services via enterprise partnerships. Pepper’s platform-as-a-service approach caters to global consumer electronics manu...
Riskline has expanded its collection of City Safety Maps to cover 150 cities worldwide and is on course to reach 200 by the end of 2019. From Los Angeles to Suva in Fiji, Helsinki to Santiago, Port au Prince to Port Moresby, there are maps of cities in every continent, larger and smaller across the circle of the globe, west to east, north to south and many in between. Street-level safety and security City Safety Maps bring unique street-level safety and security information, a first in the tr...
The civil protection sector is facing ever more daunting challenges. In like measure, demand is running high for all the necessary equipment as well as for mind sharing and networking among the players involved. "Civil protection is something that affects us all, and each of us needs to give it the attention and personal commitment it deserves," said Christoph Unger, President of Germany's Federal Office of Civil Protection and Disaster Assistance (BBK), adding: "This also means investing in ne...
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Globally renowned video surveillance, analytics and access control systems firm, Axis Communications has announced AXIS P5655-E PTZ Network Camera, a cost-effective, high-performance network PTZ camera for versatile surveillance applications. It comes with the new generation chip that offers improved imaging, enhanced security features, extended capabilities for video analytics and radically more efficient video compression technology. P5655-E PTZ Network Camera AXIS P5655-E features a light-sensitive sensor and forensic WDR for greater clarity in both dark and light settings AXIS P5655-E features a light-sensitive sensor and forensic WDR for greater clarity even when there are both dark and light areas in the scene. Additionally, incorporated with Axis Lightfinder 2.0 technology, the camera captures low-light images with more saturated colours and sharper images of moving objects. Additionally, electronic image stabilisation minimises the effects of vibration and shaking. Including extended processing power for advanced analytics, the camera also offers a choice of four scene profiles (indoor, outdoor, forensic and traffic). For each profile, the camera automatically optimises exposure time, white balance, aperture, sharpness, contrast, and noise to suit specific scene requirements. Signed firmware Signed firmware and secure boot guarantees that the firmware hasn’t been altered and ensures only authorised firmware is installed. And if needed, secure boot guarantees that the camera is completely free of malware after a factory default. Key features of the AXIS P5655-E PTZ Network Camera include: HDTV 1080p with 32x optical zoom Forensic WDR and Lightfinder 2.0 Signed firmware and secure boot Focus recall and EIS Zipstream with support for H.264 and H.265 Two-way audio function To ensure flexible and seamless installation, the P5655-E PTZ Network Camera comes with two-way audio functionality and four I/O ports. Furthermore, Axis Zipstream technology with support for H.264 and H.265 video compression significantly lowers bandwidth and storage requirements.
Tavcom Training, part of Linx International Group, is supporting police forces transformation programs, as they work towards the Policing Vision 2025 and adapt to the rise in digital evidence, with its Gathering Video Evidence course. Earlier this year, the CoPaCC National Police ICT User Survey results were published, and topping the list of digital evidence challenges for the 3,500 police professionals in England & Wales that responded were issues relating to CCTV evidence. The main pain points are - the sharing of evidence electronically with prosecutors (52.5%), manually collecting evidence such as CCTV video on site (51.8%) and converting proprietary CCTV video to a playable format (51.2%). Training BTEC Level 3 course The speed with which police officers can obtain video evidence can have a major impact on an investigation" Developed in collaboration with the police and the Home Office, the Gathering Video Evidence BTEC Level 3 course was first launched in 2009 to support the new role of image retrieval officers. "In the past 10 years, CCTV technology and has undergone a transformation, along with the much wider digital evidence revolution," says Andrew Saywell, Sales Manager at Tavcom Training. The three-day classroom-based course blends theory and practice, to help those involved with the retrieval of video evidence to overcome the challenges highlighted in the CoPaCC National Police ICT User Survey. In doing so, it helps to ensure that the police officers have timely access to better quality footage, which can be used for investigation and prosecution. Saywell adds: "The speed with which police officers can obtain video evidence can have a major impact on an investigation, enabling changes to be brought faster." Gathering Video Evidence syllabus: The impact of legislation on the retrieval of CCTV The range of national guidelines associated with image retrieval by law enforcement Customer relations when dealing with CCTV system owners Risk assessment approaches when carrying out their duties Evidence and exhibit management Audit trail Equipment required for the role How CCTV systems work Export methods and media used Practical application of theory using DVRs and NVRs and appropriate paperwork Making a network connection between laptop and NVR to enable image retrieval The Gathering Video Evidence course runs from 25th – 27th November 2019 and 10th – 12th February 2020, at Tavcom's training center in Hampshire. Successful completion of the course will result in the award of a BTEC Level 3 Certificate.
Luxul, globally renowned innovator of IP networking solutions for AV integrators, has announced releasing the next generation to its flagship XWC-1000 wireless controller, the high-tech XWC-2000 wireless controller device. XWC-2000 wireless controller The new controller utilises Luxul's exclusive Roam Assist technology to ensure the active roaming of mobile client devices and simple deployment of up to 32 wireless access points (AP) for large installations. In wireless networks that utilise more than one wireless access point, the XWC-2000's Roam Assist technology ensures that mobile devices are always connected to the best AP for the highest performance. XWC-2000's Roam Assist technology ensures that mobile devices are connected to the best AP for high performance Roam Assist technology This allows users to move freely throughout their home without the frustration of intermittent whole-home audio and slow Wi-Fi speeds. The XWC-2000 delivers twice the capacity of its predecessor with support for up to 32 APs. Newly deployed APs are automatically added for plug-and-play installation, and the controller installs in minutes using a simple, intuitive setup wizard. The XWC-2000 is compatible with these existing AP models: XAP-1610, XAP-1510, XAP-810, XAP-1240, and XAP-1440 — and future Luxul APs (excluding bridging APs) — allowing installers to mix and match to meet the needs of each project. Active roaming "Fast roaming doesn't improve network performance and many people don't even realise that a sticky device problem exists," said Mike Grubb, vice president of marketing at Luxul. He adds, "With the introduction of our next-gen controller, we're educating dealers on the differences in performance between a fast roaming solution and active roaming. With Roam Assist, support for up to 32 APs, and an easy-to-use setup wizard that allows SSIDs to be pushed to all connected APs, the XWC-2000 stands out from the pack, bringing active roaming and installation simplicity to large networks."
Matrix will be participating in the Rail India Conference & Expo 2019 to be held at The Lalit in New Delhi on 29th – 30th August 2019. From Telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for 10 video and 100 audio participants enabling police force to collaborate from different locations and solve critical situations at the earliest. At the event, Matrix will exhibit pure IP solution - PRASAR UCS that enables armed forces’ personnel to connect wirelessly from remote locations. Matrix Unified Communication Server – SARVAM UCS will also be highlighted at the event. Biometric attendance system Equipped to support radio ports and in-skin GSM connectivity, the solution enhances connectivity between field personnel, helping them manage emergency situations effectively in less time. Matrix will also showcase its GSM and VoIP Gateways that allows police and defence forces to make an easy switch to the modern network while retaining their existing infrastructure. Matrix will be presenting its other time-attendance and access control solutions at the event Matrix, from the portfolio of people mobility management solutions, will be presenting its Aadhaar enabled biometric attendance system at the event. This device allows secured attendance marking through dual authentication – biometric/RFID card and Aadhaar number. Matrix will also be presenting its other time-attendance and access control solutions at the event. Matrix will showcase its Aadhaar enabled biometric device. It is the only Linux based device available in Indian market with card and finger authentication. Time-attendance solutions The device comes with multiple connectivity options like Wi-Fi, PoE, Ethernet. This Aadhaar based authentication device is purposely designed for marking attendance of government employees and is the only embedded device available in Indian market currently. Matrix will be showcasing enterprise grade access control and time-attendance solutions engineered with features such as auto push events to server, automatic fingerprint distribution, instant notification, 300+ customised reports generation, scheduler services including backup and more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its standalone access control solution with license free environment, whereby a single panel can handle up to 255 doors and 25,000 users. At Rail India, get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RFID card and PIN options at the Expo. Video management system Matrix will also be showcasing an enterprise-grade video management system designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. Matrix will also be showcasing a new range of audio compatible and compact professional series IP cameras powered by Sony STARVIS series sensors with Exmor technology. Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation, video analytics such as intrusion detection, perimeter security, loitering detection and many other features. Furthermore, Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event. Meeting system integrators These NVRs are equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention, TCP notifications for remote locations and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. “We look forward to meeting system integrators and other business associates who can help us expand our business footprints at the event. We aim at using the event as a platform for hosting numerous meetings in the future and get a clear understanding of current market trends and needs”, commented Jatin Desai, Marketing Manager. Visit Matrix at stand number 6, at The Lalit in New Delhi on 29th to 30th August 2019 and learn how its enterprise grade solutions can assist in resolving communication and security issues.
To reduce installation difficulty and extend the effective monitoring range of cameras, Dahua Technology, a video-centric smart IoT solution and service provider, launches mini PT/PTZ series, a small-sized IP cameras with various pan and tilt ranges. Boasting compact design and excellent product performance, the mini PT/PTZ series offers a cost-effective solution for various small- and medium-sized applications such as retails, hotels, casinos, supermarkets, entrances, etc. Effective monitoring range In the past there were mainly two ways to set the monitoring angle during the complicated installation process. Installers could either adjust the camera with the help of tester or one person looks at the screen in the control room, and the other person adjusts the camera accordingly. Thanks to mini PT/PTZ series, neither is required anymore since you can remotely alter the camera angle by yourself at any time via computer, thus saving labour cost. Users can also choose ceiling or wall mount just by adjusting the mounting plate of the machine Users can also choose ceiling or wall mount just by adjusting the mounting plate of the machine, which reduces the cost of purchasing additional accessories. Another competitive advantage brought by mini PT/PTZ series is that the effective monitoring range is expended. Since cameras are no longer at a fixed angle, the monitoring area can be enlarged by rotating the cameras. In other words, users only need to buy fewer cameras for wider monitoring range, and as a result, reducing the cost of purchasing. Enabling safer society Moreover, through mini PT/PTZ system, users can not only adjust the angle but also zoom in at will if they want to see the details more clearly when certain things occur, which function is supported by the excellent performance of Dahua Technology’s IP cameras. It is anticipated that very soon Dahua mini PT/PTZ family will welcome its new member DH-SD1A404XB-GNR that supports people counting and heat map for automatic calculation of the customer flow. In general, Dahua Technology’s new mini PT/PTZ series features powerful optical zoom and accurate pan/tilt performance while saving a great deal of money and labour force in terms of installation and purchasing, which advantage makes it a good choice for users especially from areas where labour cost is high. With a mission of ‘Enabling a Safer Society and Smarter Living’, Dahua Technology will continue to focus on ‘Innovation, Quality, and Service’, to serve partners and customers around the world.
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasising the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official turnstile sponsor of the show. Appropriate entrance solution Security entrances coupled with access technologies provide a complete solution Access technologies, such as card readers and biometric devices, are critical for controlling entry to secure areas within a building. However, these solutions are only effective at mitigating tailgating when coupled with the appropriate entrance solution. Swinging doors do not stop one authorised person from opening the door and then holding it open for a number of others. Security entrances coupled with access technologies provide a complete solution that ensures only one person can enter per valid authorisation. The following solutions will be on display in Boon Edam’s booth: Lifeline Speedlane Swing Optical Turnstile: The industry’s slimmest optical turnstile will feature a custom, integrated pedestal that incorporates the MorphoWave™ touchless fingerprint technology from IDEMIA. This solution enables high throughput with the enhanced security of rapid biometric identification, all in a stylish, cohesive design. New! Lifeline Boost Access Control Pedestal: The Boost is a brand new, stylish access control pedestal designed by Boon Edam to complement the popular Lifeline optical turnstile series. The Boost will include the latest version of Essex’s credential card reader, now with optical Bluetooth and OSDP capability, the iRox-T with BLE expands for HID Global’s Mobile Access solutions. Tourlock 180+90 Security Revolving Door: The entrance of choice for the Fortune 500, the Tourlock will feature an AMAG Symmetry card reader to demonstrate access control integration paired with the door’s uniquely high, bi-directional throughput and its ability to prevent tailgating and piggybacking without manned supervision. Circlelock Mantrap Portal: Offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centers. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorisation, while facial recognition provides instant authentication inside the portal. The secure, edge-based facial recognition access control device by Alcatraz, called the Rock, can also be experienced at their booth (GSX booth #1047). BoonConnect Software: An IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can remotely access door operations and events using devices such as a tablet, laptop or smartphone via a secured corporate network. Upcoming tailgating season Boon Edam is celebrating its position as the market pioneer for security entrances, according to a report by IHS Markit®, with a tailgating-themed prize giveaway. All visitors to GSX are invited to participate by visiting booth #1103 during show hours. Participants will have the opportunity to win a variety of prizes that will help them make the most of the upcoming tailgating season: the Big Green Egg® grill, a YETI® cooler and more. Winners will be selected at random after the exhibition, and an announcement will be made to all participants via email by Friday, September 27.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promises to 'elevate the event experience with modern education learning experiences, revitalised networking opportunities, and a reimagined trade show floor.' More than 550 exhibitors will be featured in the expo hall (open Sept. 10-12), according to ASIS International. Chicago is a great location for GSX, as evidenced by the successful 2013 ASIS show. Cutting-edge solutions X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding GSX seeks to attract more attendees to the exhibition hall with education events positioned alongside the industry’s latest-and-greatest equipment and technology exhibits. On the expo floor, the GSX: Disruption District will include new and enhanced programs such as the X Learning stages, the D3 (drones, droids, defence) Learning Theater, the Pitch Competition and the Innovative Product Awards. X Learning is a series of experiential sessions. X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding of new technology. GSX: Startup Sector highlights new companies with emerging technologies; and GSX: Pitch Competition brings together entrepreneurs, investors and industry leaders to feature early-stage startup pitches. Career HQ will provide free resume reviews, career coaching, professional development and networking opportunities. A Sharpshooter Contest sponsored by Smart Simulators and SB Tactical will allow contestants donating $20 to compete for $500 in prizes each day. Pre-conference certification courses More than 300 security courses, plus pre-conference certification courses, will provide security professionals expertise to enhance their career development. Programming will be led by ASIS and InfraGard subject matter experts. (InfraGard is a non-profit organisation serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation.) Seventeen education tracks will serve the needs of security professionals interested in topics from business continuity to crime/loss prevention, law and ethics to national security, information security to physical and operational security. The show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers 'Game Changer' sessions will address hot and controversial topics, including 'The Ever-Changing Drone Landscape: What You Need to Know' and 'Accelerating Digital Transformation: Insights and Applications.' Ian Bremmer of Eurasia Group will speak on navigating the geopolitical landscape; Steve Demetriou and Joe Olivarez of Jacobs, a global professional services company, will speak about harnessing technology and big data to make strategic decisions. Providing new opportunities Wednesday morning, General John F. Kelly of the U.S. Marine Corps (Ret), will provide insight into the evolving geopolitical landscape around the world. His keynote presentation on Sept. 11 will kick off Military and Law Enforcement Appreciation Day. Tarah Wheeler, cyber security researcher, will speak on protecting assets in the age of cybersecurity leaks and scandals. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry Although the attendee emphasis is on security end-users, the show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry, according to ASIS International. Networking events will include an ASIS Town Hall Meeting on the afternoon of Sept. 8, aimed at opening communication between ASIS staff and membership. There will be an Opening Night Celebration Sept. 8 centred on the theme 'Chicago on the Silver Screen' at Revel Motor Row, a popular Chicago landmark originally home to the Illinois Auto Club. Emphasis on education On Monday (Sept. 9) a networking luncheon will be followed by the Awards Reception later in the day. A reception in the evening will present the Karen Marquez Honors Award, recognising a female security professional. Tuesday (Sept. 10) will have a Happy Hour at the exhibit hall, followed later by a Women in Security and Young Professionals Happy Hour. Wednesday evening will be the President’s Reception at Wintrust Arena, with a 1980s theme. The annual trade show has declined in recent years, and ASIS International has implemented changes that seek to reinvigorate the show, culminating in the rebranding last year. One challenge is that the show’s emphasis on education keeps attendees engaged for hours of the day, making it harder to meet the expectations of exhibiting companies who want more booth traffic. More attractions on the show floor, including the Tuesday happy hour, are aimed at increasing overall foot traffic in the hall.
The devil is in the details. The broader implications of the U.S. Government ban on Chinese video surveillance manufacturers are being clarified in the federal rule-making process, and a public hearing in July gave the industry a chance to speak up about the impact of the law. Ban on equipment The hearing centered on Section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019, specifically paragraph (a)(1)(B). The paragraph "prohibits agencies from entering into a contract (or extending or renewing a contract) with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system." “Covered equipment” refers to products and services from Huawei, ZTE Corp., Hytera, Hikvision and Dahua “Covered equipment” refers to products and services from Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. Hikvision and Dahua are two of the largest manufacturers of video surveillance equipment, and Huawei manufactures HiSilicon chips widely used in video cameras. ‘Chinese ban’ provision The public hearing was part of the rule-making process for paragraph (a)(1)(B), which the industry has informally referred to as the “blacklist” provision of the NDAA. However, the “Chinese ban” provision [Paragraph (a)(1)(a)] is not at issue, was not covered by the public hearing, and is already scheduled to go into effect a year after the law was signed by President Trump (August 13, 2018). There were seven presentations at the public hearing. Presenters included the Security Industry Association (SIA), two Hikvision integrators, a representative of communications manufacturer Hytera, an economist and an attorney on behalf of telecommunications company Huawei, and Honeycomb Secure Systems, a federal contractor. There was no livestream or transcription of the meeting, although PowerPoint summaries of the 10-minute presentations were published. SIA emphasises on clarity In its presentation, the Security Industry Association (SIA) emphasised that contractors need clarity, i.e., that paragraph (a)(1)(B) applies to an entity's use of covered equipment or services in the performance of federal contracts, but NOT to non-federal sales or use of covered equipment by a contractor that is unrelated to federal work. SIA also focused on the distinction (and contrasting risk profiles) between video surveillance equipment, which are endpoint devices that may or may not be on the Internet, and telecommunications equipment. In contrast, telecommunications equipment is essential to Internet infrastructure and manages all data on a network, encrypted or not. Fully-compliant video surveillance products Security equipment suppliers and integrators doing federal work can offer fully compliant video surveillance products" SIA's presentation included the following "outcome" statement: "Security equipment suppliers and integrators doing federal work can offer fully compliant video surveillance products in the federal market, while offering other products tailored to technical requirements, price points and specific customer needs that vary widely for non-government commercial sectors – e.g. malls, banks, convenience stores, etc.” In other words, involvement in government contracts should not restrict an integrator’s flexibility to offer any and all products and services (included those from the listed Chinese companies) to non-government customers. The two integrators made similar points, specifically about their business with Hikvision. One presenter was Rick Williams, General Manager of Selcom, a systems integrator in Selma, Ala., with 10 employees. They have been a Hikvision partner since 2012 with a year-to-date revenue from Hikvision products of approximately $400,000. Hikvision integrators speak out A second integrator at the hearing was Mark Zuckerman of Clear Connection Inc., a security company in Beltsville, Md., with 32 local employees, that focuses on electronic security, telecommunications and IT. Clear Connection designs, installs and services systems throughout Metro DC and Baltimore, including commercial entities, schools and non-profit organisations. They do about $120,000 a year in business as a Hikvision partner and have over $500,000 in business awaiting federal NSGP [Nonprofit Security Grant Program] approval. In two almost identical presentations, the integrators sought clear guidance on how to comply with the language of the law as written, specifically confirmation that Section 889 of the NDAA does not apply to non-federal sales or use of covered equipment. "This is critical to my company as I provide integrated security solutions across multiple government and commercial markets, using a mix of products from different manufacturers tailored to the technical requirements, price points and customer needs that vary widely for each sector," said Williams. Hytera speaks at hearing It is not clear what Section 889 means, who it applies to, or how far its prohibitions extend" "It is not clear what Section 889 means, who it applies to, or how far its prohibitions extend," commented Zuckerman. "If interpreted broadly, some of my customers would be barred from entering into a federal contract because they have covered products installed in their facility to protect their property and staff.” Also presenting at the hearing was Hytera, a manufacturer of open standard digital mobile radio technology. The presentation emphasised that Hytera does not sell to U.S. telecommunications carriers, and does not supply 5G components or video surveillance equipment. Hytera equipment is used by federal customers such as the National Gallery of Art, National Archives, National Zoo and the Holocaust Museum. Impact on clients and commerce "These federal entities do not play a role in national security, and the Hytera systems do not connect to any critical systems," says the company. "However, the lack of clarity in the implementation of the NDAA has a significant impact on Federal, state and commercial clients, impacting competition and choice." Hytera's presentation continues: "Hytera has never been informed by any U.S. government entity that its equipment posed a national security risk and as such has not been given the opportunity to respond to any concerns. The result of Section 889 is the creation and circulation of misinformation in the marketplace." Hytera also said that the federal proposed rules and regulations should exempt federal agencies that do not include a national security component, and equipment not interconnected with the public network. Impact on cybersecurity Consolidating the number of equipment suppliers hinders rather than helps cybersecurity" James E. Gauch, an attorney with James Day speaking on behalf of Huawei, offered a global argument that could be applied to any of the banned companies: “Virtually all equipment manufacturers rely on a global supply chain and face security risks from a wide range of sources, excluding may be one or two vendors based on their national origin will not address these risks.” He adds, “However, consolidating the number of equipment suppliers hinders rather than helps cybersecurity. Creating a small number of dominant suppliers, regardless of national origin, reduces the incentives of those suppliers to embrace industry-leading standards and creates greater exposure to vulnerabilities of a single supplier.”
In five states in the Western United States, 200 video surveillance cameras keep are keeping watch to provide early warning of wildfires. In the near future, the number of wildfire surveillance cameras will be growing dramatically. Soon there will be more than 1,000 of the cameras in California alone, keeping watch on thousands of acres at risk of destructive events like last year’s deadly Camp and Woolsey wildfires. It is a striking example of how video surveillance technology can be used effectively beyond the realm of corporate or institutional security. The wildfire surveillance cameras are providing extra eyes to avoid a disaster before it can happen. ALERTWildfire surveillance cameras The ALERTWildfire surveillance cameras are installed through a consortium of universities – the University of Nevada, Reno; the University of California San Diego; and the University of Oregon. Dozens of partners also participate in ALERTWildfire, including the National Forest Service, other government agencies, utilities and other private companies, state and local fire departments, and NGOs (non-governmental organisations). Wildfire surveillance cameras can provide early warning when a fire starts and help firefighters respond quicker “It takes a lot of people, pushing in the same direction, to deploy cameras rapidly,” says Graham Kent, University of Nevada, Reno. “We are connected into the community, which is a positive thing.” The wildfire surveillance cameras can provide early warning when a fire starts and help firefighters and first responders scale the resources needed to respond. The cameras also monitor fire behavior until it is contained, enhance situational awareness during evacuations, and ensure fires are monitored appropriately through their demise. Axis Q6055-E PTZ network cameras ALERTWildfire currently uses Axis Q6055-E outdoor-ready pan-tilt-zoom network cameras that provide 1080p HDTV signals, 32x zoom and low-bandwidth compression. (Earlier versions of similar Axis camera models were also installed previously.) The camera’s robust aluminum casing can withstand temperatures up to 60 degrees C, although the cameras are positioned on the tops of towers where temperatures from wildfires are not a factor. In addition to surveillance cameras, each installation site includes a range of equipment including hard power or solar power (on about a third of installations), both with battery backups. Resilient, hardened microwave/fiber networks carry video signals from the cameras to servers at University of Nevada, Reno, which makes them available on the Internet. Geolinks, an ALERTWildfire partner, provides resilient Internet connectivity to mountaintops throughout the West. Firefighters can even watch fires on their mobile devices while they are en route to a fire breakout site Mobile surveillance Dispatchers around the West have access to video from the cameras, and fire management can move the camera views through their iPhones. Firefighters can even watch fires on their mobile devices while they are en-route to a fire. Cameras are located currently in California, Nevada, Idaho, Washington and Oregon. There have been 85 cameras in place for five years or so, and the number of cameras has more than doubled since the beginning of 2019. The accelerated installation schedule is courtesy of a new policy of using existing infrastructure for cameras rather than creating it from scratch. The large number of cameras on the horizon for California is being funded by utility companies such as Pacific Gas & Electric (PG&E), Southern California Edison and San Diego Gas and Electric. AI in video surveillance The public can view the camera feeds and often call 911 to report early warnings of fires The public can view the camera feeds and often call 911 to report early warnings of fires, thus providing a kind of crowdsourcing, a fire-warning version of “Neighborhood Watch.” In the future, artificial intelligence (AI) could be used to monitor the video feeds to provide early warning. For now, the system is largely used by 911 dispatchers to confirm reports of fires. “Cell phones are so ubiquitous, people call in fires before the AI could react,” says Kent. “We could never beat 911.” A model for early detection of wildfires is in operation in San Diego, where San Diego Gas and Electric manages an emergency center that uses sophisticated real-time modeling to predict fire events based on weather conditions, vegetation, etc., tracked on a threat map. The system enables firefighting resources to be deployed quickly at the first hint of fire and thus to avoid a larger, sweeping wildfire event. Enhancing surveillance for quick wildfires detection “If you can get on top of it quickly enough, it makes all the difference,” says Kent. “In the case of extreme conditions, 10, 20 or 30 minutes can make a big difference.” Other locations are looking to replicate the San Diego model to discover and confirm fires quickly and then reposition assets to respond. Phos-Chek long-term fire retardant, applied by air from a fixed or rotor-wing aircraft, is used to slow or stop the spread of wildland fires. Our successes have led to a demand to get more cameras out right now" Installing more cameras to provide early warning of wildfires is “a grave need in the Western states,” and the system is likely eventually to be deployed in other areas, too. Wildfires can be a challenge in non-Western states such as Florida and Oklahoma, and a similar approach could also be used to provide early warning of other emergencies, such as tornados. “Once we do the West, we will be looking to do the rest of the United States,” says Kent. Increasing demand for video cameras Currently, the biggest challenge is keeping up with demand. “Our successes have led to a demand to get more cameras out right now,” says Kent. “Funding isn’t the largest issue. The money is there to do it, but we have to be able to scale up quickly, working with partners. It’s a wild ride.” Key words for success of the ALERTWildfire system are “location, location, location” combined with “coverage, coverage, coverage,” adds Kent. “We can solve 90 percent of the problem with coverage.”
Airbus, a provider of secure communication and collaboration solutions, provides mission critical communications technology to the Kingdom of Saudi Arabia for this year’s Hajj pilgrimage. Airbus has been a trusted supplier of secure communication solutions for the Hajj pilgrimage every year since 2017. With the implementation of its systems to ensure faster emergency response for public safety, and use of its state-of-the-art technology, Airbus and STC Specialized ensured the smooth running of security operations which safeguard millions of visitors each year. Th1n Tetra radio and AVL technology Various security organisations benefited from Airbus’ trusted solutions which include the slimline Th1n Tetra radio and Automatic Vehicle Location (AVL) technology. These inform dispatchers of each mobile unit’s location, status, and active Tetra talk groups. The information is then sent to all the relevant emergency personnel using the STC Specialized network powered by Airbus’ Tetra solution; such as the Ministry of Hajj, the Ministry of Health, and the Mecca Municipality. Airbus’ mission critical solutions facilitated the monitoring of this major event, as well as the communication between ground staff and the control rooms, enabling them to immediately address any on-site emergency while benefitting from the stability, continuity, and reliability of Airbus technology when and where it is needed the most. The Hajj is the largest Muslim gathering in the world and takes place every year over a period of six days. This year, from the 9th of August onwards, around 1.8 million Muslims visited the holy city of Mecca.
360 Vision Technology’s Invictus ruggedised Hybrid PTZ cameras are being used to protect endangered nesting green sea turtles. The Invictus camera has been deployed as part of Security Centres International’s high-performance Mobile Advanced Safety Tower (MAST), rapid deployment camera solution, which is now installed on the Cayman Islands, British West Indies. Mobile Advanced Safety Tower The MAST unit was deployed after a funding campaign led by Caymanian, Michael Ridley, to install video surveillance at a key nesting beach at Sand Hole Road in Boatswains Bay. “Sand Hole Road is a critically important nesting beach for the female turtles, who crawl out onto the beaches to dig nests and lay eggs during the night,” Michael explains. We are all very confident that the data obtained from this project will prove invaluable " “Unfortunately, poaching poses a constant threat to the survival of the nesting sea turtles at many locations. In addition, economic development of the island has seen more beach front property being built and a subsequent squeeze on places available for the turtles to nest safely after migrating long distances between feeding grounds.” HD surveillance imaging He adds, “After analysing the Cayman Islands Department of Environment (DoE) detailed nesting data accumulated over 20 years, to identify the most vibrant turtle nesting grounds, I selected the beach to implement a pilot program to monitor nesting turtles and protect them from poaching activity. The beach site has been dubbed, ‘Turtle Beach’ and provides a perfect nesting ground for turtles due to its minimal property development, zero light pollution, and enough sand and vegetation to support the turtles’ nesting activity.” “The Invictus based MAST solution was perfect for the application at the beach,” says Stuart Bostock, Executive Group President at Security Centres International. “Featuring world-class HD surveillance imaging from the 360 Vision Invictus camera, leading-edge design, robust build, zero infrastructure requirements and seamless Video Management System (VMS) integration, MAST is the only product of its kind. It’s also 100% self-powered, using solar energy and a 100-hour back-up battery; a feature supported by the use of the low power requirements of the 360 Vision Invictus camera.” High-performance CCTV surveillance Monitored 24/7, images from the camera enable DoE and Royal Cayman Islands Police Service (RCIPS) officers to be alerted and dispatched when nesting turtles arrive at the beach, assisting the DoE to monitor the beach and provide the highest level of protection against poaching. “We are all very confident that the data obtained from this project will prove invaluable in assisting the DoE with their conservation efforts and assist them with their Island-wide monitoring efforts,” says Michael. “Sand Hole Road is a critically important nesting beach with poaching posing a constant threat to the survival of the sea turtles that nest there, so high-performance CCTV via the MAST solution was specified as the best way to protect them.” Night-time surveillance The MAST system was selected for deployment on the beach due to its excellent night-time surveillance capability The MAST system was selected for deployment on the beach due to its excellent night-time surveillance capability, operating without the need for any supporting local infrastructure. Plus, the MAST system is silent in operation, posing no environmental impact, and thanks to the 360 Vision IR LED illuminator equipped Invictus camera, the system can operate without a visible light source that may disturb, or draw unwanted attention to the turtles nesting site. Mark Rees, Managing Director at 360 Vision Technology added “The Invictus is a high-performance, ruggedised all-in-one PTZ camera with full 1080P HD and Predator ultra-low-light camera technology, making it the perfect choice for off-grid temporary/rapid deployment mobile surveillance rigs, such as MAST. Additionally, Invictus’ low-power consumption greatly assists the longevity of critical off-grid battery power when deployed in remote applications, extending MAST’s operational performance, and meaning fewer maintenance visits to the camera, with the benefit of less disturbance to the green sea turtles.” Video evidence gathering “The Invictus camera’s unparalleled mix of competitive cost and advanced functionality make it the perfect imaging component for the innovative MAST system, where it is now providing much needed surveillance protection and research video.” To date, the use of the MAST unit has proved a huge success in protecting the sea turtles from poachers and providing evidential video of the turtles’ feeding and nesting activity on the beach. Calculating population, nesting patterns and survival rates from the footage gained during this season, plans have already been made for additional protection measures and the extension of the MAST based surveillance program to other locations on the British West Indies island.
Globally renowned sensor solutions provider, HENSOLDT will equip the Norwegian Coast Guard vessel “Svalbard” with the latest version of its TRS-3D naval radar and MSSR 2000 IIFF System. This is already the second upgrade contract from the Norwegian Defence Materiel Agency as HENSOLDT is already under contract to equip the three new Arctic Coast Guard Vessels in the P6615 Program with the upgraded radar and IFF system. TRS-3D naval radar system Under both contracts worth more than € 27 m HENSOLDT will deliver four TRS-3D radars including the latest solid-state technology and signal processing software and will deliver them from 2021, in parallel to the building program of the new Arctic Coast Guard vessels. The TRS-3D includes a secondary radar MSSR 2000 I for Identification-friend-or-foe (IFF). It operates all current IFF modes, including the latest “Mode S/Mode 5 Level 1/2” standard answering the most recent NATO requirements. Our TRS-3D naval radar is an extremely reliable radar, particularly suited for littoral missions" “Our TRS-3D naval radar is an extremely reliable radar, particularly suited for littoral missions”, said HENSOLDT CEO Thomas Müller. “We are taking the upgrade contract of the Norwegian Coast Guard as proof of the customer’s satisfaction with our product and services”. Air and sea surveillance TRS-3D is a three-dimensional multimode naval radar for air and sea surveillance. It includes the ability to correlate plots and tracks of targets with the MSSR 2000 I identification system for automatic identification of vessels and aircraft which is essential to avoid friendly fire and to establish a comprehensive situation picture. It is used for automatically locating and tracking all types of air and sea targets and safe guidance of on-board helicopters. Thanks to its signal processing technologies, the TRS-3D is particularly suited for the early detection of low flying or slow moving objects under extreme environmental conditions. Naval surveillance and security More than 50 units of the radar are in operation with naval forces around the world. Among the ships equipped are frigates and corvettes of the German Navy, the US Coast Guard National Security Cutters and the "Squadron 2000" patrol boats of the Finnish Navy.
Comelit 4 camera wireless CCTV system has been selected on site at the iconic, Grade II listed Chichester Cathedral, to protect the retail area and provide 24x7 high-quality monitoring capability and extra peace of mind for staff. Wireless CCTV surveillance This magnificent Cathedral has stood at the centre of Chichester for over 900 years. With unique architecture from each century of its life, this Cathedral is both ancient and modern, where original medieval features sit alongside world famous contemporary artworks. Any works needed to consider the sensitivities of working in such a historic building. A representative from Chichester Cathedral commented, “When it came to upgrading CCTV for the retail area, we contacted Envisage Technology Ltd who recommended Comelit’s 4 camera wireless CCTV system. It has proven to be the perfect solution, with the system proving simple to install. Staff now have access to monitors by the till points that also act as a significant visual deterrent. The high-quality images available add extra peace of mind.” Four camera wireless CCTV Kevin Brown, Managing Director, Envisage Technology added, “Chichester Cathedral is one of the most prestigious visitor sites in West Sussex. Comelit’s wireless CCTV specification, coming from such a renowned brand, provided the necessary infrastructure to embrace the need for delicate installation, minimising the need to run cables, and still provide the high-quality footage. We can support the ongoing maintenance process to ensue volunteers, customers and staff are kept safe and secure.” Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image. Installed outside of opening hours to avoid disruption to the retail environment, monitors were positioned directly by the till points, enabling staff to have full visual access of the complete area at all times. Retail surveillance Tim Edmonds, Comeilt CCTV Manager concluded, “The retail area, established in such a significant Cathedral is a great example of how Comelit’s wireless CCTV system can be used to protect any environment.” “Working with Envisage, the solution was presented as a simple, yet effective option, installed with absolutely no impact on the surrounding building. The result is a powerful visual deterrent and peace of mind that staff in store, and in back offices can keep an eye on operations quickly and easily, on a 24x7 basis.”
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individual seeks to pursue, and the challenge is to ensure that all people can age with dignity and security. Climax’s GX Cubic Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, designed to help the elderly to manage their long-term health conditions, bridging medical health monitoring information to care providers/hospitals and create points of care to keep them safe in their own homes. GX Cubic medical alarm GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors, like blood glucose monitor, pulse oximeter, blood pressure monitor, or weight for tracking health data and providing customised alerts to meet individual needs. The measurements can be automatically sent to a health professional who can review the results and continuously keep an eye on the patient’s health needs and provide early treatment as necessary. In addition to medical health monitoring, GX Cubic is also compatible with Pivotell Advance Automatic Pill Dispenser to keep secure of all pills, and remind the user to take the correct medicine at the pre-set time. The solution allows health professionals to monitor pill taking timely results and keep an eye on the patients’ treatment as needed. For situation when remote monitoring care given is insufficient and the user requires onsite assistance, GX Cubic can raise an emergency alarm to inform the caregiver or medical personnel for immediate action. Seniors can be assured that they are always being taken care of, and provide their family members with a peace of mind. Voice recognition solution Voice recognition has innovated over time and continues to advance, allowing products to become even more intuitive and easier to use. GX Cubic has built-in voice recognition and can activate an emergency call to care provider or central monitoring center by preset vocal commands or keywords. This allows seniors to receive emergency attention even in situations where they are immobilised or cannot manually reach the panic button. Working with the leading voice ecosystems Amazon Alexa and Google Home via cloud, GX Cubic also features voice control to activate home electronic devices, complete daily tasks, and seek help during emergencies. Voice over Internet Protocol With the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice callsWith the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice calls to contact their caregivers or family members at any time. With the additional add-on of DECT, GX Cubic can pair with voice extenders, talking pendants, call points, and voice extenders placed strategically around the home to create a safety net. Smart Home Automation Comprehensive elderly-friendly health care should also have a focus on preventive action to maintain a healthy ageing process. To realise independent living in a smart way, GX Cubic pairs with Zigbee or Z-Wave sensors to enable the whole-home control with various protocol-of-choice. GX Cubic can be programmed to turn on the hallway lights automatically when a sensor reports a senior’s movement in the middle of the night, to reduce a chance of falling; or automatically adjusting air conditioning when there is a sudden temperature-drop. The scenarios are unlimited to fit individual requirements, ensuring a safest living experience for the senior users. GX Cubic can also integrate IP security cameras and camera PIR motion sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. Lastly, GX Cubic can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor environmental emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living.
As prominent in Belfast’s history as its cranes are on the city’s skyline, it’s hard to imagine Belfast without Harland and Wolff. Once the world’s greatest shipbuilder, Harland and Wolff today has evolved into a company that provides over 150 years of engineering excellence to the maritime, offshore, and renewable energy sectors. The Harland and Wolff facilities on Queen’s Island are now used to maintain some of the world’s largest ocean-going vessels, ranging from offshore platforms and cruise liners to offshore wind farms. The company is spread over two sites in Belfast and covers over 200 acres. Its main facility has a public-facing perimeter of no less than 1.5 kilometers. With safety as a primary consideration in the execution of projects, the company goes to great lengths to protect its investments from unwanted visitors, intruders, and vandalism. FLIR VMS solution For over 15 years, Harland and Wolff has been using FLIR’s United VMS to manage a wide variety of security cameras For over 15 years, Harland and Wolff has been using FLIR’s United Video Management System (VMS) to manage a wide variety of security cameras. As technology innovations and features were being added onto the United VMS over the years, Harland and Wolff has always remained loyal to the FLIR brand. But with the increasing development of Queen's Island as an industrial, commercial, and tourist area came a greater public presence and an increased safety and security threat. That is why in recent years Harland and Wolff has been continuously investing in the latest security camera technology from FLIR, including enterprise security cameras, PTZ cameras, intelligent thermal cameras, and mobile and wearable cameras. Optical and thermal cameras “Today, over 140 FLIR cameras on-site and along the site’s perimeter make sure that we can detect any irregularity,” said Chris Neill, security operations manager at Harland and Wolff. “Whenever one of our cameras picks up an incident – an intruder for example – an alarm is generated and sent to our security control room, who can then follow up the incident. This ensures us that our investment and that of our customers is safe and secure at all times.” Due to the high impact and risk associated to a possible incident on site, the company’s security department follows a proactive approach for possible intruders. Even in complete darkness, in perimeter areas where there is no additional lighting, thermal analytic cameras can pick up the presence of intruders, animals, or vehicles automatically based on their heat signatures. Intruder detection While thermal camera footage does not allow actual identification of intruders, it can still be used as evidence for insurance companies or law enforcers, especially when an intrusion pattern can be seen over different cameras. United VMS is FLIR’s enterprise-level software solution for video surveillance operations United VMS is FLIR’s enterprise-level software solution for video surveillance operations. The software is currently used at Harland and Wolff by four control room operators and eight managers, all of which have dedicated user rights. One of the strengths of the United VMS system is that it can connect with nearly any security camera on the market and that video streams and detection alerts can be presented on any screen, be it on a video wall, a PC, or a smartphone. United VMS But Harland and Wolff has been using United VMS for far more applications. “We also use the United VMS platform to monitor alarms coming from fire sensors on oil rigs, for example,” said Neill. “Another example is the detection of failed pumps on one of our drydocks. This information also comes in on United VMS, where we generate alarms and notify key staff in real time.” Harland and Wolff has indeed managed to make use of United VMS's flexibility and deploy it for much more than security applications only. "We are not in a static business," said Neill. "At Harland and Wolff, we are always taking on new challenges and solving new problems; FLIR’s United VMS platform helps us do that.” TruWITNESS mobile sensor technology Harland and Wolff will also make use of TruWITNESS, the latest mobile and wearable sensor technology from FLIR. TruWITNESS will allow guards on patrol to stream video directly to the control room in real time and from anywhere on the Harland and Wolff sites. Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport" Guards will be able to bookmark events so that incidents or irregularities can be reported and can be followed up more efficiently. In case of incidents, camera footage from the TruWITNESS wearable devices can be used as evidence. In addition, control room operators will be able to track members of staff via the United VMS and display their location on a map. Security technology advancements “Our yellow gantry cranes have become a national icon,” said Neill. “Unfortunately, this also means that they are an attractive target for political messages or, as in the past, terrorism. As a port facility, Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport. But in reality, we always exceed these requirements. We owe this to our continuous investments in security technology, which we also consider as a commitment to our customers.” Maybe this is what connects Harland and Wolff with FLIR. “As committed as we are to our customers, we expect the same from our suppliers as well,” said Neill. “As someone with a technical background, I have always been convinced of the quality of FLIR security products. But there will always be a time when you need to rely on technical support, and that’s where FLIR really makes a difference.”
Round table discussion
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom". However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Network monitoring: Manufacturers & Suppliers
- Dahua Technology Network monitoring
- Vicon Network monitoring
- Sony Network monitoring
- Hikvision Network monitoring
- IDIS Network monitoring
- BCDVideo Network monitoring
- LILIN Network monitoring
- Surveon Network monitoring
- Vanderbilt Network monitoring
- Bosch Network monitoring
- eneo Network monitoring
- TruVision Network monitoring
- VIVOTEK Network monitoring
- Panasonic Network monitoring
- Hanwha Techwin America Network monitoring
- Luxriot Network monitoring
- Avigilon Network monitoring
- Ganz Network monitoring
- Milestone Network monitoring