Network monitoring
Hanwha Techwin has announced consultants, system designers and system integrators are now able to specify Wisenet Q series and Wisenet WAVE PoE NVRs supplied with Seagate hard disk drives (HDDs). High-density HDDs “Seagate’s space-efficient, high-density HDDs (hard disk drives) are able to perfectly meet the data storage demands of video surveillance systems and equally important, they have a reputation for being ultra-reliable,” said Uri Guterman, Head of Product & Marke...
Smart R Distribution’s appointment as a full member of the Dahua Dealer Partner Program, provides the opportunity for installers to source Dahua products from the specialist distributor of access control and video surveillance network solutions. Supplier of Dahua IP cameras, NVRs As an authorised reseller, Smart R Distribution will be supplying the entire portfolio of Dahua products, including a comprehensive range of IP security cameras, NVRs (Network Video Recorders) and video manageme...
Check Point Software Technologies Ltd., a provider of cybersecurity solutions globally, launches Check Point Harmony, the first unified solution to enable secure connectivity to any resource anywhere and give total endpoint protection for users on any device. Harmony secures both corporate and BYOD devices, and internet connections from known and zero-day attacks, while giving Zero-Trust access to business applications in a single, easy to manage solution. Securing the new work from anywhere en...
Dahua Technology, a globally renowned video-centric smart IoT solution and service provider, has recently unveiled its updated WizSense – a series of AI products and complete end-to-end solutions based on deep learning that focuses on humans and vehicles. It benefits users with intelligent functions, simple configuration and inclusive products. Compared to its previous version, the updated WizSense offers upgraded features that will surely transform regular monitoring to a whole new level...
Following the outbreak of COVID-19 and the pandemic everyone is living through, the uptake in touchless access control which was previously gaining in popularity has been accelerated driving digital transformation across many industries and technologies. Among these is the rapid growth of mobile and cloud-based systems that make access control a simple and secure solution for businesses to manage keys, users, and doors across multiple locations, simply and conveniently. SALTO Systems, which has...
Quantum Corporation announces that its StorNext® File System is the fastest file system for video workloads. In testing using the independent SPEC SFS 2014 benchmark, the StorNext 7 system outperformed all other file systems across all three performance metrics, using a reference architecture with 57% fewer storage nodes than the next nearest vendor and at a much lower cost per concurrent stream. These results demonstrate that StorNext provides the best performance and best value for...
News
Panasonic i-PRO Sensing Solutions Corporation of America, a pioneer of advanced sensing technologies, continues to expand its portfolio of AI-driven analytics that provide higher levels of intelligence to the company's unique offering of holistic solutions. The addition of intelligent analytics continues to drive a shift in emphasis from conventional surveillance and security monitoring operations to proactive predictive analysis and business intelligence applications that further leverage the versatility of i-PRO system solutions. Improving business operations "New AI solutions provide the means to leverage organisations' current investments in technology to further protect people, property, and assets from new and emerging threats," said Bill Brennan, President, Panasonic i-PRO. "At the same time, these very same AI solutions enable users to go beyond traditional security to deliver insights and intelligence enabling them to improve their business operations." These very same AI solutions enable users to go beyond traditional security to deliver insights" While artificial intelligence offers the power to drive a vast array of analytics solutions, many of the newest technology developments have been driven by the security and health safety challenges faced by businesses, organisations, and government agencies. Privacy concerns around facial recognition, detection and identification of individuals not complying with face mask mandates, and detecting when an individual has an elevated body temperature are among the many areas of focus for i-PRO AI solutions. AI network cameras i-PRO FacePRO facial recognition analytics employ AI and deep learning to recognise and authenticate the identity of an individual. The powerful software can identify a person even if their face is partially covered, if they are at an obscure camera angle or if they have aged - even over a significant number of years. Panasonic i-PRO also offers new extension software for its AI network cameras to detect if an individual is not wearing a mask. This is a critical feature for facilities and businesses that require masks to be worn upon entry, and in many cases is mandated by local or regional law. The advent of such powerful facial recognition has created more awareness around concern for the privacy of innocent individuals captured on video used for investigations and as evidence in public hearings or trials. Video management system Panasonic i-PRO offers an AI-assisted redaction plug-in for the Video Insight video management system (VMS) To help protect an individual’s privacy, Panasonic i-PRO offers an AI-assisted redaction plug-in for the Video Insight video management system (VMS). This software enables automatic redaction of faces on video, which saves hours of time for security personnel and law enforcement agencies, schools, municipalities, correction facilities, and others in responding to FOIA or FERPA requests. Through a partnership with MOBOTIX, i-PRO is now offering a new thermal camera solution to help organisations maintain the health safety of those entering their facilities. This solution combines MOBOTIX M16/S16 cameras with a new plug-in from Panasonic i-PRO's Video Insight video management system to automatically detect when an individual's body temperature exceeds a pre-set threshold and provides an alert to the appropriate personnel. This new solution offers businesses, schools, retail stores, and other public facilities another tool to keep their staff and guests safe. Motion detection analytics Panasonic i-PRO offers powerful and versatile AI-VMD extension software for a wide range of the company's AI network cameras. Far beyond conventional motion detection analytics, I-VMD provides multiple modes to detect intruders, loitering, the direction of an object's movement, if an individual has crossed a predetermined line, suspicious objects left behind, scene change if a camera is moved or covered, people counting, heat-mapping, and moving object remover to remove people from images and only show the background scene. Panasonic i-PRO offers powerful and versatile AI-VMD extension software for the company's AI network cameras This powerful suite of intelligent analytics adds further depth to any organisation's or municipality's situational awareness, increasing security and safety, and providing new data sources for numerous business intelligence applications. New sensor technologies and solutions can provide a wealth of data, effectively increasing situational awareness through autonomous detection. Advanced systems technology Through integration with the open platform, Panasonic i-PRO Video Insight VMS and MonitorCast access control, and intelligent Panasonic i-PRO AI cameras, security professionals can benefit from audio analytics that detects screams, gunshots, explosions, and glass breaking, along with environmental sensors that detect noxious fumes and gasses, smoke, vibrations from explosions or earthquakes and more. "This is the future of systems technology as physical security continues to converge with and deliver business intelligence," said Brennan. "Panasonic i-PRO will continue to support the development and integration of new AI-driven solutions to provide our customers around the world with the most advanced systems technology available."
ONVIF, the renowned global standardisation initiative for IP-based physical security products, is pleased to announce the appointment of Leonid (Leo) Levit as the new Chairman of the ONVIF Steering Committee. Leonid Levit serves as Director of System Integration at Axis Communications and brings to the Chairman’s role a strong technical background and more than a decade of product management, marketing and sales experience. Levit takes over from Per Björkdahl, who is stepping down from the role of Chairman after nine years. Video surveillance and access control products major “For the past decade, ONVIF has worked to facilitate nearly universal interoperability of IP physical security devices and clients, enabling end users and systems integrators to have freedom of choice in their selection of video surveillance and access control products,” said Leonid Levit. I look forward to being part of the next evolution of ONVIF, as it continues to support our evolving industry" He adds, “I look forward to being part of the next evolution of ONVIF, as it continues to support our evolving industry and the deepening relationships between analytics, IoT, AI and other technologies.” Prior to his role as Director of System Integration, Leonid Levit was Global Product Manager of Analytics Solution at Axis Communications. His past work experience includes roles at Sony Mobile Communications and Ericsson Mobile Platforms. Interoperability of IP physical security products Founded in 2008, ONVIF is a renowned and well-recognised industry forum, driving interoperability for IP-based physical security products. The organisation has a global member base of established cameras, video management systems and access control companies and more than 19,000 profile conformant products. ONVIF offers Profile S for streaming video, Profile G for recording and storage, Profile C for physical access control, Profile Q for improved out-of-the-box functionality, Profile A for broader access control configuration and Profile T for advanced streaming. ONVIF continues to work with its members to expand the number of IP interoperable solutions that ONVIF-conformant products can provide.
Control4, a globally renowned provider of customised automation and control solutions, has officially certified the DoorBird driver. DoorBird IP door stations can now be integrated directly into Control4 systems. The smart video intercoms are developed and produced by Bird Home Automation Group in Berlin, Germany. Integration with Control4 interface Customers can now access their IP intercom directly from Control4 interfaces, without the additional cost of a third-party driver. The new certified driver recognises the doorbell, video camera and motion sensor of the DoorBird door station, immediately after installation. The devices communicate over a shared-network via hardwired PoE (Power over Ethernet) or Wi-Fi. This integration features audio and video calls from the door station to touch panels or the Control4 OS 3 app, as well as a live view of the entrance area via the DoorBird camera. When a visitor rings the call button, a ringtone can play through the home’s audio system. The resident can then open their electronic door lock or garage door via the DoorBird icon, or anytime from the DoorBird app. Cinegration’s third-party driver functional This driver is free-of-charge and available in the Control4 Composer online database. The third-party driver from Cinegration, which had previously enabled the integration of DoorBird into Control4, continues to function.
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, is pleased to announce that Vanderbilt International (Vanderbilt Industries) has become the 50th member of its technology partner program. Vanderbilt’s ACTpro solution brings expertise to the Dahua ECO Partner Program and takes access control to the next level with video surveillance integration. Both companies look forward to enhance their partnership and explore future developments together. Dahua ECO Partner Program The Dahua ECO Partner Program was launched in June 2020. Since then, global and local teams have been committed to building a smart ecosystem with technological partners. Together with our ECO partners, we are able to provide the right solution to their demands" “End-users, system integrators and distributors can already feel the impact in the industries,” said Peter Pan, Global Technology Partner Alliance Director at Dahua Technology, adding “Together with our ECO partners, we are able to provide the right solution to their demands. It is great to have Vanderbilt International by your side in industries like healthcare, education, retail, government and others. We are enthusiastic to create more value together.” ACTpro access control system ACTpro is Vanderbilt International’s award-winning access control system that has a wealth of features and integrations. The addition of Dahua complements an already rich set of integrations and enables users to play live video or recorded video associated with a door through the Dahua solutions. Ross Wilks, Head of Marketing at Vanderbilt International expands on the value of this, stating “If an event happened last week where a door was forced open, the operator can right-click on the event in ACTpro software and simply replay the video recording from the Dahua system.” Dahua – Vanderbilt integration “This makes for a more precise examination of the video system concerning the access control event. It also removes the operator's need to visit the control room to retrieve the footage, as it can be viewed directly within ACTpro instead. This, of course, delivers an added layer of convenience to the system’s users,” Ross concludes.
Driven by the development of AI (Artificial Intelligence) and IoT (Internet of Things) technology, Network Video Recorder/NVR is no longer just the traditional data storage centre in CCTV systems today. From initial connection demands of third-party IPC and PTZ suppliers and docking demands of alarm sensor and platform manufactures, to alliance demands of algorithm and app developers, NVR (Network Video Recorder) is playing an increasingly significant role in connecting front-end devices, alarm sensors and other equipment. Open integration of NVR As a globally renowned video-centric smart IoT solutions and service provider, Dahua Technology has been actively cooperating with third-party software and hardware partners around the world through open integration of NVR, aiming to build an open and smart NVR ecosystem. The NVR Ecosystem also brings technology partners together to explore more possibilities While jointly creating value for customers and users, the NVR Ecosystem also brings technology partners together to explore more possibilities. Making NVR available to third-party devices and platforms enables third-party cameras and software/hardware manufacturers to connect to NVR through ONVIF and CGI/SDK, respectively. Furthermore, it also allows users to customise GUI style, run their own algorithms and develop apps on NVR, as per their needs and budgets. NVR DHOP Fully considering the system development demands of customers, Dahua Technology released NVR DHOP to allow third-party applications to be downloaded and installed on Dahua NVR hardware. Equipped with strong and powerful AI functions, Dahua Technology’s NVR DHOP boasts advantages such as flexible operation, safety guarantee, reliable quality and strong support, which brings business growth opportunities to algorithm and app developers, who lack hardware devices and those with customisation requirements for NVR GUI. Encrypted data storage and transmission In order to protect the interests of customers, all embedded third-party applications will pass legal verification and the data in storage or transmission will be encrypted. In addition, Dahua Technology’s professional R&D team provides continuous support in the whole process. Combining video with traditional alarm enables linkage between alarm signals and video footages Furthermore, the expanded application of the security field has also prompted the cooperation between NVR and traditional alarm manufacturers. Combining video with traditional alarm enables linkage between alarm signals and video footages, which can help warn-off intruders when an alarm is triggered. At the same time, it also allows users to search for relevant alarm videos stored in the NVR, achieving visual and intelligent alarm. Integration with third-party VMS suppliers By far, Dahua NVR (Network Video Recorder) has already completed integration with a number of third-party VMS suppliers, such as Milestone, AxxonSoft, Digifort, etc. Aside from general video storage and query functions, NVR can also assist third-party platforms in improving business operations and management with smart video analysis. Dahua NVR has been successfully integrated with the Milestone platform, providing temperature monitoring statistics reports during the COVID-19 pandemic and realising efficient management of people with abnormal temperature. Enabling a safer society Adhering to the concept of openness, Dahua Technology will continue to embrace the diversity and inclusiveness of the AIoT (AI-IoT combined) era and build an ecosystem that provides customers with all-win success through open and interconnected cooperation, enabling a safer society and smarter living.
Armis®, the agentless device security platform, and Viakoo®, a pioneer in automated IoT cyber hygiene, announce a partnership that brings together IoT device discovery and remediation. The number of connected Enterprise IoT devices used in workplaces across all industries is exploding. Experts say that by 2025, one should expect more than 40 billion of these devices interwoven into our everyday lives. And although these devices help improve efficiency and reliability, they lack the management and security needed to keep them safe from cyberattacks. Traditional asset management Most enterprise IoT, operational technology (OT), and biomedical devices have limited on-board security controls. Traditional asset management and security products can't see unmanaged and IoT devices that can't host software agents. Active network scanners can cause sensitive OT equipment or critical patient-connected devices to malfunction. And misconfigured or unpatched devices can expose vulnerabilities that create a massive attack surface and considerable risk. When an out-of-compliance device is found, the best outcome is to remediate potential risks and to return the device to service. Armis detects such out-of-compliance devices, and Viakoo can trigger certain actions on them, like firmware updates, configuration modifications, certificate refresh, and password changes, which can remediate risk. Achieving greater value Viakoo solves a difficult and necessary task by automating cyber vulnerability remediation" Devices that can’t be remediated would continue to be monitored by Armis for suspicious or malicious behaviour and quarantine. Both the Armis and Viakoo platforms are agentless, do not require the installation of any hardware in the environment, and install in as little as minutes, using the infrastructure one already has, with no network changes. Armis integrates with Viakoo and other IT security and management systems just as easily, from the firewall to the NAC to the SIEM, letting the user achieve greater value and more automated response. “Viakoo solves a difficult and necessary task by automating cyber vulnerability remediation,” said Peter Doggart, VP Business Development, and Global Channel at Armis. Eliminating cyber vulnerabilities “Our integration provides a best-in-class solution for organisations to quickly eliminate cyber vulnerabilities and be in control of their IoT infrastructure. Together, Armis and Viakoo provide a unified cybersecurity vulnerability management solution for unmanaged, medical, OT, and IoT devices - critical for any IT or security team.” “Unmanaged IoT devices represent the largest attack surface within an organisation,” said Bud Broomhead, CEO of Viakoo. “Armis has the most comprehensive solution to discover these devices; now, combined with Viakoo, customers can quickly and cost-effectively make these devices secure, visible, and capable of delivering their full value.”


Expert commentary
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organisations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centres or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognise individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analysing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable. Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognise. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the centre of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimises passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labour. All these features make it difficult to recognise people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognised or unrecognised people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialised software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorised access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimises and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorised access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
Since lockdown came into effect, organisations globally have undergone years' worth of transformations in a matter of months. Whether it’s been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the “next normal” there remains a great deal of uncertainty around what the next twelve months holds and how organisations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. And even with news of some businesses returning to their places of work and office spaces opening at reduced capacity, it’s widely speculated that for some, the home office environment is here to stay. Lower operational costs, greater flexibility and productivity driven For the vast majority, however, working from home is an entirely new process. In fact, a recent survey from IBM revealed that more than 80% of respondents either rarely worked from home or not at all prior to the pandemic. And in turn, more than half are now doing so with their personal laptops and devices. While the benefits of a more remote workforce are well documented – lower operational costs, greater flexibility and productivity driven by being able to access shared workspaces and applications from anywhere, at any time, and on any device – it does represent a sizeable concern in terms of security and data protection. An evolving threat landscape In the IBM survey, it was also revealed that organisations had not implemented any new security policies to help guide their staff when it comes to handling sensitive customer data and password management. And with so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. The challenge is that bad actors love this new reality, as employees are far more likely to fall victim to a cyberattack when working outside of the office’s firewall. A survey released by INTERPOL, showed that cybercrime had grown at an “alarming pace” as a result of the COVID-19 pandemic, with a particularly large increase in phishing scams/fraud (59%), malware/ransomware (36%), malicious domains (22%), and fake news (14%). And this should be real cause for concern for organisations, because should one employee fall victim to a data breach through a scam or spear phishing attempt, for example, that company will be liable to pay potentially huge fines in line with national data regulatory standards. In April this year, the UK’s data protection watchdog, the Information Commissioner’s Office (ICO) and the EU, did both announce that they would temporarily soften their enforcement of the GDPR. However, this was not a cause for organisations to become complacent and neglect the data protection policies they had worked so hard to implement in their office environments. The momentary change actually means very little in terms of the critical importance of safeguarding private and sensitive data. Don’t slip into bad habits It’s essential that all organisations implement proper audit trails to track and account for any and all data It’s fair to expect that the move to a home office will inevitably make employees feel, well, more at home. And with that might come a relaxation in their approach to data management best practices and the adoption of a few bad habits. One thing to consider about a remote workforce, is it’s highly likely that everything will be saved to a desktop as temporary data or in permanent folders, particularly if access to central, cloud-based workspaces and platforms is impaired or restricted. The issue here is that this can impair an organisation’s chain of custody over its organisational and customer data. It’s essential that all organisations implement proper audit trails to track and account for any and all data in their possession. With data stored locally on a device and off-premises, this data immediately becomes harder to audit and presents a significant risk to the organisation. It’s crucial that both the organisation and its employees understand how to actively clean up this type of environment. Managing documents through centralised cloud-based workspaces, is a much better way to continuously manage data stored. What this all comes down to is a need to account for the significant cultural shift all organisations are experiencing. While certain aspects of our day-to-day working life certainly won’t be business as usual, an area that can’t slip is data management and the safeguarding of private data. Ensuring that privacy is ingrained in all processes, new and existing, and maintaining the mantra that security should be every employee’s top priority is crucial. Give data privacy the time and respect it deserves, make it part of the company’s culture, and a compliant, secure workforce will follow. Basic hygiene and remote solutions = a healthy remote workforce So, what is the best way to ensure a remote workforce is following data management best practices and keeping home offices secure? Primarily it comes down to following many of the basic hygiene practices and guidelines that organisations should already be following. Don’t sit on sensitive data in your home office that is not needed and no longer holds any value to the business. Maintain a full audit trail of any and all data from point of collection, right through to end-of-life and erasure. And ultimately carry out the permanent and irreversible erasure of data when it becomes redundant, obsolete, or trivial (ROT), to reduce your risk – in fact, it’s completely possible to carry out certified data erasure of selected data remotely. Don’t sit on sensitive data in your home office that is not needed Equally, a lot of concerns about ensuring your workforce is following security protocols and maintaining regulatory compliance can be alleviated through tools and processes that you don’t even have to think about. Appropriate methods of data sanitisation can be achieved through automated solutions that can be pushed out by administrators to help continuously protect employees in the background, without the need for a significant shift or change from normal routines. Remote erasure practices also enable the sanitisation of devices that reach end-of-life, these can then be transported to the device processor without the threat of sensitive data being intercepted. In these uncertain times, organisations will undoubtedly be challenged in new ways, but it’s vital that they don’t fall victim to new data management challenges and risk facing wholly avoidable fines from data breaches. Security and achieving compliance have always been about the journey, not the destination, and this is yet another step in that journey. It won’t happen overnight, and it must be a company-wide effort. Employee education is essential, and privacy should be built into every part of the organisation across departments, not just across IT or legal departments.
Security beat
At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorised users. The source of the unauthorised access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasises the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defences have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorised to connect to an organisation's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorised devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organisations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organisations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.” “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul. “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says. Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organisations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organisations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organisations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-life balance In a typical office with an on-premise data centre, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and travelling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organisations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasising both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilising webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
As the new Chief Executive Officer of Milestone Systems, Thomas Jensen pledges to continue the company’s focus on protecting people and assets and to help organisations gain insight and optimise their business processes. Seeking to fulfil Milestone’s mission to ‘Make the World See,’ Jensen will maintain Milestone’s approach of being an open video management system (VMS) platform and having an open company culture. End-user communities “I will also be working to expand Milestone’s VMS into new areas and applications —for example, to monitor beach erosion as the climate continues to warm up around the world,” says Jensen. “I believe the future of VMS is about bridging the gap between security and applications that go beyond security.” Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel. His experience as a generalist – extending beyond IT – enables understanding of the business side of things in addition to the skills, strengths and motivations of the people who work at Milestone, its channel, partner networks and the end-user communities. People-first approach “One crucial thing my career taught me is the importance of your team members,” he says. “A former manager once told me that success is the sum of the success of your team. And, luckily, Milestone already has a strong culture and people-first approach. This is one of the things that attracted me to this job.” The new CEO plans to spend his first 90 days building relationships and getting to know the company and the team members. He will be present in conversations with all Milestone people as well as partners and system integrators. “I want to ensure there is continuity and resilience so that my joining Milestone is a seamless transition,” Jensen says. “Furthermore, my focus will be to further build on the strengths of Milestone to create long-term sustainable growth.” Video-enabled insights Jensen sees security through two lenses: on one hand, protecting people and property, and on the other, providing video-enabled insights for public and private companies to be able to make better decisions. On the protection side, businesses have room to grow as technologies move to provide more affordable, more powerful, and more interoperable solutions. A transformative element in the future evolution of video management is the cloud Regarding video-enabled insights, there is great potential, and Milestone is forging deeper relationships with partners and system integrators of important verticals such as cities, education, transportation, and retail. A transformative element in the future evolution of video management is the cloud, which will advance the deployment of technologies across the board. Best software integrations “I will be spending time working with our organisation and partners to evolve Milestone’s cloud strategy and cloud partnerships to address the opportunities that lie ahead,” says Jensen. “I also think that Milestone’s belief in being open and giving integrators and end-users the freedom to choose the best software integrations available in the market is a philosophy that we've held dear from the very beginning — and this will become critical in the future as VMS solutions continue to evolve.” Safer business environment As the COVID-19 pandemic has raged on, Milestone Systems has continued its operation as usual, deploying safety measurements as needed to protect both employees and the partners they work with. COVID-19 has impacted everyone, every business and every government and organisation around the world, says Jensen. We’re working with our partners to design a safer business environment with VMS-enabled solutions" “I think it taught us all a lesson in empathy and how we need to respect differences in behaviour, regulations and compliance, customs and even each other,” he says. “At Milestone, we’re working with our partners to design a safer business environment with VMS-enabled solutions for social distancing, queue management, and contact tracing.” Creating security solutions “The past 50 years of digital technology and the past 20 years of IP technology have taught us that technologies eventually converge, and in some cases merge,” says Jensen. “Sometimes functions merge and channels converge, other times it’s the networks that come closer together, but none of this is absolute and universal.” “This is why we need to listen and learn from each other and be respectful of differences in the industry and the channel—particularly cultural and regional differences.” Jensen adds: “The technology company of the future — which I believe Milestone is becoming — will not dictate solutions but will instead partner with IT and security stakeholders to create security solutions that meet each customer’s unique challenge and environment.”
Case studies
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced how commercial real estate provider, Westminster Property Ventures has made innovative use of a range of Genetec solutions to make each of its premises safe from COVID-19 virus spread for staff, tenants and visitors. Westminster Property Ventures’ buildings house critical businesses, such as international banks, law firms and consultancies who can be assured that amidst a global pandemic their offices remain highly secure and equipped for their return. Genetec Mission Control The newly introduced processes and technologies make smart use of Westminster Property Ventures’ existing video and access control infrastructure. For example, using the Genetec Mission Control collaborative decision management system, Westminster Property Ventures is collecting and qualifying data from thousands of sensors and security devices, before guiding security operators in their response to routine and unanticipated situations. Among other current and critical capabilities, this helps ensure the seamless transition of out-of-hours monitoring between Westminster PV’s in-house security team and security provider, Wilson James’ monitoring centre, ensuring comprehensive levels of security at all times. “Our clientele continue to expect the highest level of security and service from us whether or not they are currently choosing to work inside our buildings,” said Andrew Forbes-Jones, Facilities Manager, Westminster Property Ventures, adding “We’re grateful to Genetec and Wilson James for keeping us at the forefront of innovation and compliance in all aspects of our security and operations.” Security Center Synergis access control system COVID-19 has created new challenges for Westminster Property Ventures’ security and operations teams in maintaining a secure and safe environment for both home and remote workers, as well as those still working inside the facilities. Using the Genetec Security Center Synergis access control system, Westminster Property Ventures is taking advantage of many COVID-19 specific features, developed over the last year, to help them directly address the challenges of the global pandemic. Synergis Proximity Report Westminster Property Ventures has deployed the Genetec’s ‘Synergis Proximity Report’ Along with the system’s new occupancy management capability, Westminster Property Ventures has deployed Genetec’s ‘Synergis Proximity Report’, first deployed at McCormick Place in Chicago, North America’s largest convention center that was repurposed as a COVID-19 field hospital in spring of 2020. Drawing data from the Synergis access control system, the solution allows Westminster Property Ventures to quickly identify individuals visiting one of their buildings, who may have come in contact with someone known to have tested positive for COVID-19 infection. Efficient protection against COVID-19 virus “I’m constantly impressed by the ability of our partners and end users to adapt quickly to changing requirements and bring the latest innovative solutions online to address them,” said Paul Dodds, Country Manager UK at Genetec, Inc. Paul adds, “Westminster Property Ventures’ rapid response to the challenges of the pandemic mirrors our own and validates our investments in technologies that can help make our workplaces safer, healthier and more secure.”
Johan Cruijff ArenA will utilise innovative video analytics to improve visitor flow, optimise parking utilisation and offer fans an anonymous way to provide feedback about the stadium experience, among other uses. The Security & Safety Things IoT platform for smart cameras will integrate into the ArenA’s operational software to provide key insights into stadium operations and ongoing health and safety measures, especially useful since the pandemic. The partnership will provide a potential model for other organisations looking to deploy technology solutions to safely reopen. IoT platform for smart cameras Security and Safety Things GmbH and the Johan Cruijff ArenA are partnering up and will deploy S&STs IoT platform for smart surveillance cameras to enhance overall fan experience, optimise ArenA operations and increase visitor security and privacy. The ArenA is home to AFC Ajax and the internationally renowned Amsterdam Innovation ArenA (AIA), a living lab established by the ArenA and the City of Amsterdam to enable development and testing of innovative stadium and smart city solutions. Security & Safety Things IoT platform S&ST IoT platform and network of cameras is integrated into the ArenA’s dashboard software The Security & Safety Things (S&ST) IoT platform and network of cameras is integrated into the ArenA’s dashboard software to provide information and analysis for safety and security as well optimisation of stadium operations and visitor engagement. “Every technology selected for our innovation environment is strategic because of the potential benefits not only to our ArenA, but to the City of Amsterdam and other stadiums and large event venues seeking technological solutions to help to re-open safely and operate their facility more intelligently,” said Sander van Stiphout, Director International, Johan Cruijff ArenA. Sander van Stiphout adds, “The unique flexibility of the Security & Safety Things approach enables us to simultaneously deploy COVID-19 health and safety analytics along with business optimisation tools and easily re-equip the cameras with other analytic applications as our needs change.” AI-enabled video analytic applications A series of smart cameras on the S&ST IoT platform are installed in key areas throughout the stadium. Using specialised, Artificial Intelligence-enabled video analytic applications from the S&ST Application Store that run directly on each camera, each device will provide the ArenA with valuable operational insights. When the stadium reopens, crowd detection analytics will monitor social distancing compliance and visitor flow around entrances and food or merchandise kiosks. License plate recognition cameras will assist with real-time occupancy monitoring for parking and traffic flow optimisation. Queue detection applications Queue detection applications can be employed to reduce visitor wait times by directing fans to less busy areas and by providing the insights required to optimise staffing levels at peak times. In one specific area, a camera also provides the ability for visitors to provide feedback about their stadium experience in an anonymous and contact-free way by detecting the visual of a ‘thumbs-up’ or ‘thumbs-down’ from a visitor, collecting only the rating without disrupting people flow. Smart camera platform We’re honoured to be joining the Johan Cruijff ArenA as an innovation partner" “The flexibility of our smart camera platform and the ArenA’s mission of innovation are very well matched to produce the intelligence necessary to address real world issues of privacy, health and safety but also new and creative ideas for stadium and event management,” said Hartmut Schaper, Chief Executive Officer (CEO), Security & Safety Things GmbH. Hartmut adds, “We’re honoured to be joining the Johan Cruijff ArenA as an innovation partner and to help them provide a seamless and safe visitor experience.” Smart surveillance camera system The camera system and how it is used complies with all European and Dutch privacy regulations. Furthermore, there are various advantages to this camera system, when it comes to privacy. These cameras are equipped with powerful processors that analyse the images directly on the camera, reducing the need for a constant video stream to be passed on to a central location, where it can be monitored or further processed. Instead, the cameras can be configured to send only the information about relevant events such as when a long queue is forming, groups of people gather too closely, or individuals are not wearing face coverings as required. Only then will respective images be passed along. This reduces the processing of visitors’ personal information to an absolute minimum as opposed to a traditional set-up where all footage is transmitted and centrally processed at all times.
The city of Arnhem has chosen Nedap to regulate vehicle flows and to provide a seamless vehicle access experience in its city centre. Due to the increase in the number of vehicles in the city centre, it was a challenge for Arnhem to ensure that the traffic flow runs smoothly and safely, to keep the historic and tourist centre accessible and livable. Vehicle identification solutions With the implementation of Nedap’s vehicle identification solutions, authorised vehicles and drivers can access the city in a safe and seamless way. The combination with Nedap’s MOOV City Access software ensures that vehicle access in the city centre easily can be regulated. The city of Arnhem wants to regulate vehicle access to the centre and ensure only authorised vehicles can enter The city of Arnhem is located in the east of the Netherlands. Because of the historical centre, cultural sights and a wide range of entertainment facilities, it is also an attractive city for tourists. To ensure that the city centre remains traffic and pedestrian friendly, the city of Arnhem wants to regulate vehicle access to the centre and ensure only authorised vehicles can enter. MOOV City Access platform By limiting traffic flows, the narrow streets in the historic centre of Arnhem turned into an attractive and safe public place for pedestrians and cyclists, creating a livable city. The city of Arnhem has chosen Nedap for its MOOV City Access platform combined with its advanced solutions for automatic vehicle identification, based on long-range RFID (Radiofrequency Identification) and ANPR (Automatic Number Plate Recognition) technology. Authorised vehicle access in specific zones The solution is supplied and installed by Nedap’s partner - ST&D. Nedap’s MOOV City Access platform is implemented to control vehicle access in specific zones. With this, Arnhem ensures that only authorised vehicles can enter these zones and only if they have permission to do so. With the implementation of RFID readers and ANPR cameras, vehicles can be identified from a long distance, ensuring automated and safe vehicle throughput. Nedap’s long-range RFID solution, TRANSIT will be used to ensure that local residents, emergency vehicles, licenced taxis and municipal services have easy access to the city centre, without compromising on safety. TRANSIT long-range RFID solution Authorised vehicles equipped with a RFID tag will have fast access at vehicle entrances TRANSIT is a proven technology that enables highly secure identification and tracking of vehicles and drivers, up to a distance of 10 metres. Authorised vehicles equipped with a RFID tag will have fast access at vehicle entrances, without the need to stop. The all-in-one licence plate camera, ANPR Lumo will grant access to vehicles based on their license plate number. Licence plate recognition is a perfect solution for specific user groups or situations, in which vehicles require access temporarily or incidentally to the city centre. For example, retail delivery trucks can be given access at pre-defined locations, assigned days and time zones, regulating vehicle access to the city by reason. Digitisation of city access “By choosing and implementing Nedap’s MOOV City Access platform in combination with Nedap’s licence plate recognition solution, we have taken a major step in the further digitisation of our city access in Arnhem,” said Hans ten Barge, Chain Director Parking at the Municipality of Arnhem. Nedap Identification Systems is a specialist in Automatic Vehicle Identification and Vehicle Access Control solutions, for over the past decades. Nedap has developed a unique portfolio of proven long-range RFID and ANPR solutions that enable seamless third-party system integration. Vehicles and drivers are identified automatically, securing a free-flow yet highly secure vehicle access experience. MOOV City Access is Nedap’s vehicle access control solution, specifically designed for regulating vehicle flows in inner cities. MOOV’s hardware and software are compatible with Nedap’s RFID readers and ANPR cameras. This complete solution ensures a livable and safe city.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc. (Genetec), a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. Genetec Security Center The three-year project, which is expected to be completed by the end of 2023, will see Genetec Security Center, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract for Changi Airport Group was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights that Genetec Security Center is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
Global MSC Security announced that it has been appointed by the City of Edinburgh Council to consult on a planned upgrade of its video surveillance system from analogue to IP, as Edinburgh progresses towards its vision to become one of the world smartest capital cities. Working with the Council, Global MSC Security will use its public sector expertise to oversee the preparation of a tender specification of a fully integrated public space surveillance operation. Upgrading public realm CCTV surveillance system The appointment of Global MSC Security follows the announcement that the City of Edinburgh Council is investing over £1 million in its public realm CCTV (including housing blocks, transport network and Council buildings) and has also secured £712,000 from the 'Scotland's 8th City, the Smart City' European Regional Development Fund Strategic Intervention in support of an upgrade to its CCTV infrastructure, as part of its smart city programme. Global MSC Security has a wealth of expertise in public space surveillance, having consulted on dozens of local authority CCTV surveillance projects, including The Royal Borough of Windsor and Maidenhead, Central Bedfordshire, Buckinghamshire, Herefordshire, North Somerset, Barnet, Bristol City, Dorset, Neath and Port Talbot, Mid Devon and Maidstone and Luton Councils. Installing new IP cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, video management system (VMS) and encoders, with the right technology at the best price and implemented smoothly. Global MSC Security’s Managing Director, Derek Maltby stated “We offer a wealth of experience in specifying public space surveillance systems for local authorities. Global MSC Security is proud to be involved in what is a major initiative not only for the City but Scotland and its position as a leader in smart services and society.” Resilient and secure city surveillance system He adds, “This important and essential infrastructure upgrade represents a significant investment, and the resulting system will provide the Council with a function-rich, future-proof, highly resilient and secure surveillance system.” Derek further stated, “However, for any organisation making the switch from analogue to IP, it is vital that the transition is managed in the correct way, to maximise resources and optimise system performance. That begins with a robust tender specification, which is where our expertise lies.” The tender specification is expected to be released by the City of Edinburgh Council in February 2021 and the contract awarded in September.
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”


Round table discussion
The emergence of smart cities provides real-world evidence of the vast capabilities of the Internet of Things (IoT). Urban areas today can deploy a variety of IoT sensors to collect data that is then analysed to provide insights to drive better decision-making and ultimately to make modern cities more livable. Safety and security are an important aspect of smart cities, and the capabilities that drive smarter cities also enable technologies that make them safer. We asked this week’s Expert Panel Roundtable: what are the physical security challenges of smart cities?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Products


Videos
Network monitoring: Manufacturers & Suppliers
- Dahua Technology Network monitoring
- Axis Communications Network monitoring
- Vicon Network monitoring
- AMAG Network monitoring
- Video Storage Solutions Network monitoring
- Sony Network monitoring
- Hikvision Network monitoring
- IDIS Network monitoring
- BCDVideo Network monitoring
- Messoa Network monitoring
- exacqVision Network monitoring
- LILIN Network monitoring
- Surveon Network monitoring
- Vanderbilt Network monitoring
- Bosch Network monitoring
- eneo Network monitoring
- VIVOTEK Network monitoring
- TruVision Network monitoring
- Luxriot Network monitoring
- March Networks Network monitoring

How to ramp up perimeter security with license plate reader technology
Download
Solve access control challenges in the healthcare sector
Download
Getting the most value from Software Subscription Agreements
Download
Shifting trends in operation centers and control rooms for 2021
Download