MOBOTIX is exhibiting at the International Security Exposition (ISE) 2019, global show for the UK Government, in the London Olympia venue at Stand J30, from Dec 3 to 4 2019. International Security Expo 2019 ISE is bringing Government, Industry, Academia and the entire end-user community in charge of regulation and procurement together under one roof to debate current challenges and to source the latest security technologies and services. The demonstrations will show visitors the newly launche...
The latest Wisenet Pentabrid video recorders from Hanwha Techwin are designed to extend the life of existing analogue based CCTV, whilst providing a smooth and cost-effective migration to an IP network based video surveillance solution. Wisenet Pentabrid video recorders Combinations of analogue or IP cameras up to 4K ultra high definition can be connected to the new Wisenet Pentabrid 4, 8 and 16 channel video recorders, with a simple onboard software switch enabling users to convert any channe...
Check Point has extended the capabilities of its CloudGuard cloud security platform to support Kubernetes computing services, including Amazon Elastic Kubernetes Service (Amazon EKS) and Amazon Elastic Container Service (Amazon ECS). CloudGuard also delivers additional security capabilities for Amazon Web Services (AWS) Serverless computing solutions, including AWS Lambda and related services like AWS Fargate, Amazon API Gateway, Amazon DynamoDB, and Amazon Kinesis. The announcement further del...
The Face Recognition Company (FRC) has announced that its multi-camera face-recognition security product is to be unveiled for the first time at the International Security Expo in London. The company, which has been in stealth mode for three years, has developed the world’s first ultra-accurate facial recognition security system, optimised for commercial businesses. Available in January 2020, its first product is designed to provide enhanced security for retail and commercial premises or...
Hikvision, global provider of innovative security products and solutions, has introduced its Video & Audio Convergence Solution to the market, featuring an innovative real-time intrusion deterrent feature. With Hikvision’s new Video & Audio Convergence Solution, IP speakers now can be linked with cameras, access control systems, and alarm devices. When the CCTV system automatically detects an intrusion or if the alarm system is activated, IP speakers can immediately play programme...
ZMR has been appointed a distributor of Video Storage Solutions’ (VSS) pre-engineered video recording and storage appliances. VSS and ZMR partnership Based in Saudi Arabia, ZMR will supply the complete range of VSS products, which includes IP video recording servers, storage and network architecture, to systems integrators across the Kingdom of Saudi Arabia who are part of the Milestone Systems Community. We are very excited about partnering with VSS and adding its appliances to our por...
Analog CCTV technology has been around for more than thirty years in the security industry, with the latest innovation being the Analog High-Definition (AHD) camera. Inexpensive and simple to install, AHD cameras are ideal for surveillance systems that need HD quality for video evidence but may not need more the more advanced features of IP video. AHD705A3.6 5MP bullet camera The AHD705A3.6 grants users access to the newest technology in the surveillance world To ensure its customers the best quality AHD cameras, LILIN Americas has announced the model AHD705A3.6 5-megapixel vandal-resistant bullet camera for indoor and outdoor surveillance projects. As an affordable alternative to IP technology, the AHD705A3.6 grants users access to the newest technology in the surveillance world while staying on budget, an important factor in retail, SMB, C-Store and Commercial properties. High resolution IP cameras The LILIN AHD705A3.6 features 2592 (H) x 1944 (V) resolution without compression to capture and view video in real-time of any crimes, attacks, vandalism, or other questionable behavior, letting users see exactly what happened. Other performance enhancing features are 2D noise reduction, IR Cut Day/Night imaging, and IP66 rain and dust resistance. In addition, Infrared LED automatically activates for image capture in total darkness. Integrated with "Up the Coax" technology UTC or "Up the Coax" technology lets users remotely set up the AHD705A3.6 camera with compatible UTC recorders, reducing installation time and eliminating the need for varifocal adjustments at AHD cameras.
Crossword Cybersecurity, is pleased to announce that its Consulting division has recently signed numerous agreements including three with companies spanning the automotive, insurance and property sectors, to work with them on improving their cyber security posture. A cyber transformation project has begun with a global pioneer in connected vehicle data. Crossword Cybersecurity will assist the company with implementing a globally recognised cyber security standard, ranking it amongst major global players in the technology industry. Achieving this standard will enable the firm to work more efficiently with any global automotive manufacturer. Prioritised cyber security strategy Consulting has also secured business with an international insurance broker that conducts business in the Lloyd’s of London market. A third-party audit left the organisation with a long list of security measures to implement but lacking sufficient in-house expertise to do so. Consulting division has implemented its Virtual Chief Information Security Officer (vCISO) product Crossword Consulting worked with the organisation to offer advice on how best to improve their cyber maturity. Since developing the organisation’s prioritised cyber security strategy, Crossword will now also be carrying out the transformation work and implementing the practical recommendations they devised to make the organisation more resilient. Virtual cyber security The consulting division has implemented its Virtual Chief Information Security Officer (vCISO) product with an SME property investment firm. One of the key cyber security challenges organisations are currently facing, is understanding and implementing the most appropriate levels of cyber maturity for their company, and therefore allocating their cyber security budget efficiently. In response to these challenges, Crossword launched vCISO - a virtual/remote CISO service, provided and managed by Crossword Consulting cyber security experts. The vCISO service provides clients with a virtual cyber security team and network protection at a fraction of the cost of building their own team and clients are also able to leverage the deep cyber security and technical expertise provided by Crossword and Reliance ACSN. Multiple vCISO opportunities They are taking the right measures to protect themselves from cyber security attacks" Crossword’s Consulting team offers a full range of consulting services from Cyber Assurance and Auditing, Penetration testing, Third Party Assurance and Virtual Chief Information Security Officer (vCISO). Whatever an organisation’s size or level of cyber maturity, Crossword Consulting is able to offer a service tailored to its needs. Regarding the recent deal announcements, Stuart Jubb, Managing Director of Crossword Consulting, commented: “We are delighted that Crossword Consulting is making such headway, especially in terms of breaking ground into new sectors and with large corporations. This reflects the high regard in which our consultants are held, in what is an extremely competitive market. “It is a pleasure to announce our second vCISO client and note that there are multiple vCISO opportunities in our pipeline. We believe that by using our vCISO service, clients are able to have peace of mind that they are taking the right measures to protect themselves from cyber security attacks whilst achieving excellent value for money.”
AlgoSec, a provider of business-driven network security management solutions, today announced the availability of its integrated solution for Cisco ACI and security devices on Cisco’s Global Price List. This enables Cisco’s direct and channel sales network to offer AlgoSec’s solutions to customers through Cisco’s SolutionsPlus program. Cisco ACI, the software-defined networking solution, facilitates application agility and Data Center automation. ACI enables scalable multi-cloud networks with a consistent policy model and provides the flexibility to move applications seamlessly to any location or any cloud while maintaining security and high availability. AlgoSec Security Management Solution for ACI AlgoSec integrates with Cisco ACI to extend ACI’s policy-based automation to multi-vendor security devices across the Data Center, on its edges and in the cloud. AlgoSec Security Management Solution for ACI enables customers to better ensure continuous compliance and automates the provisioning of security policies across ACI fabric and multi-vendor security devices connected to the ACI fabric, helping customers build more secure Data Centers. AlgoSec security management solution extends ACI’s policy model and automation capabilities" “AlgoSec and Cisco ACI share an application-centric approach to network security management, allowing customers to realize the full potential of intent-based Data Centers. We are delighted to be a part of Cisco’s Solutions Plus program and get listed on Global Price List,” said Avishai Wool, CTO and co-founder at AlgoSec. Policy driven automation to security devices “Extending Cisco ACI’s policy driven automation to security devices, closely aligns with AlgoSec’s strategies and will deliver powerful benefits to our mutual customers. It enables customers to build truly automated IT environments that are flexible, secure and responsive to their business needs,” added Bruno Weinberger, VP, Strategic Alliances at AlgoSec. “Networking teams are increasingly adopting application-centric, policy-driven approach to meet rapidly changing requirements from IT teams and application owners,” said Ranga Rao, Senior Director of Product Management and Solutions, Cisco Data Center Networking. “AlgoSec security management solution extends ACI’s policy model and automation capabilities to security devices, allowing customers and partners to build agile and more secure data centers.” Potential of application driven security automation Cisco and AlgoSec’s channel partners share an equal level of enthusiasm about this initiative. “This collaboration between Cisco and AlgoSec is a great news for Consica. As a Cisco Gold Partner and AlgoSec’s strategic partner, we hope to enable customers to realise the potential of application driven security automation, help ensure continuous compliance and reduce the attack surface in their Data Centers” said Henrik Skovfoged, System Engineering Director, Conscia A/S.
Videotec announces that the new ULISSE EVO PTZ range will integrate the high-sensitivity SONY FCB-EV7520 camera. This camera will provide a new level of high performance and exceptional image quality for the external surveillance of airports, critical infrastructures, and traffic. The new ULISSE EVO with the SONY FCB-EV7520 camera has a 30x optical zoom and a 1/2.8” Exmor RTM CMOS sensor with Full HD 1080/60p resolution that produces the highest image quality, even when surveilling moving objects or in poor lighting conditions. Powerful image stabilisation algorithm With ULISSE EVO and the SONY camera, you can set up to 24 dynamic privacy zone masks The powerful image stabilisation algorithm means even the smallest camera vibrations are detected and any blur in the footage is dynamically corrected. This results in a sharp image of the scene being surveilled. This is useful for traffic monitoring applications where the camera could be buffeted by wind or shaken by mechanical vibrations, especially if it installed on an unstable structure such as a bridge or pole. With ULISSE EVO and the SONY camera, you can set up to 24 dynamic privacy zone masks. These masks change size and shape based on the pan/tilt/zoom position so objects that shouldn’t be seen remain hidden. The advanced SONY technology brings the functions of Wide Dynamic Range and High Light Compensation that allow optimal management of contrasting light and dark conditions. Ensuring continuous monitoring The camera’s high sensitivity means you get colour video with a minimum illumination of just 0.0013lx (0.0008lx in black and white). This guarantees surveillance coverage even when lighting at the scene is very poor. The LED illuminator integrated into the PTZ, which is available as an accessory, ensures continuous monitoring 24 hours a day. This PTZ camera provides 3 Full HD streams with H.264/Avc digital compression The de-fog function provides a clear view even with fog or haze. When this function is activated, the camera will detect how hazy it is and compensates accordingly in the image. This PTZ camera provides 3 Full HD streams with H.264/Avc digital compression. It can be connected to an Ethernet network easily and can send video streams to digital monitors and storage systems. It complies with ONVIF, Profile S and Profile Q protocols. Quick-fit connectors for Ethernet/PoE The ULISSE EVO with SONY camera can be 24Vac/24Vdc or 90W PoE powered, depending on installation requirements. It can even be mounted upside down, in the typical speed domes position. The supports can be supplied with quick-fit connectors for Ethernet/PoE, power supply and I/O. This means the unit can be replaced quickly and easily in case of on-site intervention. The wiper is supplied as standard, for optimum cleaning of the front glass. ULISSE EVO operates at maximum efficiency between -40°C and +65°C. It is IK10, IP66/IP67/IP68, NEMA Type 4X and Type 6P protected and is wind-resistant up to 230 km/h. This ensures maximum protection against dust and bad weather, strong impacts or gusts of wind, and acts of vandalism.
ExtraHop, a pioneer in cloud-native network detection and response, announced a new integration between ExtraHop® Reveal(x) and Google Cloud Platform (GCP) via the new packet mirroring feature announced by GCP at Google NEXT ‘19 UK. Google Cloud’s new Packet Mirroring feature enables Reveal(x) to passively and agentlessly analyse network traffic within GCP to provide robust, real-time threat detection, investigation, and response. Cloud computing Traffic visibility is critical to prevent security breaches and attacks as networks grow in complexity" Armed with this visibility, security teams can protect data and workloads in Google Cloud and expand control across the entire hybrid attack surface. Reveal(x) for GCP automatically discovers, classifies, and maps dependencies between workloads, and applies advanced machine learning to surface the most critical threats. Equipped with this information, GCP customers can rapidly identify, investigate, and respond to threats, fulfilling their obligations under the shared responsibility model. "Ulta Beauty is a company built on seeing possibilities. It's informed everything from our in-store shopping experience to how we build our business – including the technology that supports it," said Diane Brown, senior director of IT risk management and CISO at Ulta Beauty. "In cloud computing, we see the ability to grow faster and deliver more 'wow' experiences to our customers. The new integration between ExtraHop Reveal(x) and Google Cloud's new packet mirroring accelerates our cloud adoption by giving us the visibility we need to secure our applications and protect our most precious asset, our customers." Full threat visibility Through the integration with GCP packet mirroring, ExtraHop Reveal(x) provides full threat visibility, detection, and response across cloud and hybrid workloads. Full Packet Analysis: Reveal(x) leverages GCP Packet Mirroring to capture payloads and headers, enabling in-depth analysis and threat hunting. Machine learning at the application layer provides immediate detection of difficult-to-spot activity, including exfiltration. Encrypted Payload Visibility: Reveal(x) decrypts SSL/TLS-encrypted traffic at line rate, including cipher suites supporting perfect forward secrecy, providing complete visibility into all communications, including encrypted malicious traffic. Augmented Investigation: Reveal(x) for GCP automates several early investigation steps to provide analysts with workflows that can be completed in clicks, enabling quick and confident response. Detect network intrusions "Traffic visibility is critical to prevent security breaches and attacks as networks grow in complexity," said Mahesh Narayanan, product manager at Google Cloud. “With Packet Mirroring, our customers now have a way to proactively detect network intrusions, analyse, and diagnose application performance issues for both Compute Engine and Google Kubernetes Engine, across all regions and machine types." "Traditional security tools are falling short and new thinking is needed for hybrid enterprises today," said Jesse Rothstein, CTO and co-founder at ExtraHop. “Reveal(x) for GCP Packet Mirroring provides security teams with unparalleled network visibility and cloud-scale machine learning for detection and automated response across your business's complex attack surface.” ExtraHop Reveal(x) for GCP is now available in alpha.
Panasonic Security Systems, a business unit of the newly formed Panasonic i-PRO Sensing Solutions Co., Ltd., is showcasing its impressive solutions capabilities at ISC East 2019, booth #435 at the Javits Centre. By combining superior imaging technologies with new AI-driven software and analytics solutions, Panasonic i-PRO Security Systems offers comprehensive, customisable solutions to meet the most diverse range of users’ specific needs. Core solutions on display include the company’s fully integrated Video Insight 7 Video Management System Video Insight 7 VMS solution Core solutions on display include the company’s fully integrated Video Insight 7 Video Management System (VMS) and MonitorCast access control platform, innovative FacePRO facial recognition software, and a wide variety of analytics. “There are many new and exciting developments at Panasonic that we will be unveiling over the next several months – the most significant being our enhanced solutions portfolio,” said Bill Brennan, Vice President of the Security Division., Ltd. AI-driven software and analytics Bill adds, “Where Panasonic was once almost exclusively recognised for our superior imaging products, our enhanced portfolio of AI-driven software and analytics enables us to provide advanced integrated solutions that move beyond detection to preventive analysis and business intelligence. This is the new Panasonic i-PRO.” Video Insight 7.5, a powerful and versatile VMS solution with innovative 3D De-warp functionality, fully integrates the company’s MonitorCast access control platform to deliver uncompromised system management and control with unlimited scalability, and no license fees when used with i-PRO Extreme cameras. FacePRO facial recognition solution FacePRO facial recognition software employs an innovative neural network with deep learning technology FacePRO facial recognition software employs an innovative neural network with deep learning technology providing fast face matching on both live and recorded video; the ability to identify and match multiple faces against 10 million records in seconds; and GDPR compliant privacy protection via end-to-end SSL communications and fully encrypted facial data. The National Institute of Standards and Technology (NIST) rated FacePRO as the ‘world’s most highly rated facial recognition engine’. A new portfolio of Intelligent Analytics including, License Plate Recognition; Vehicle Search Detection; Intruder Detection, Loitering Detection, Direction Detection, Object Left Behind Detection; Object Removed Detection; and Cross Line Detection. i-PRO Extreme IP cameras i-PRO Extreme IP cameras in a wide range of models with up to 4K/9MP resolution, and in multi-sensor, PTZ, dome, and box configurations. Highlights include the new WV-X8570N iA (intelligent Auto) 4K/33MP H.265 Panoramic Multi-Sensor Camera; WV-S3532LM iA H.265 Compact Dome Camera; and the WV-S2570L4K iA H.265 Dome Camera. The ISC East exhibit also showcases new Remote Demo Sites, with feeds from the majority of the i-PRO Extreme line-up, as well as the ability to demo FacePRO. For added versatility, the Panasonic Partner Ecosystem includes deep integration with over 4,500 cameras from 151 different manufacturers, and integration with 19 access control partners.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centres on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximising benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximising the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertise,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realising wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialised services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the programme, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertise”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
The experience of high-quality, high-performance automotive engineering and the sleek lines and signature beauty of luxury auto brands like Porsche, BMW, Mercedes, and more are investments worth protecting. When damage to these vehicles occurs and body work is required, only the work of attentive, highly trained, and craftsman technicians owners can trust, will do. Phoenix-area Autobahn Collision serves the region’s owners of luxury European automobiles with precisely such expertise they can trust, and when the time came to upgrade the premier body shop’s security infrastructure, they looked for a surveillance solution able to meet the same high standards of performance they meet every day. Seamless Integration Autobahn Collision provides customers with a service and repair experience, well-crafted to be as high-end, responsive, and trustworthy as the luxury vehicles they work on. The body shop’s expectations were no less for their surveillance solution, which needed to seamlessly integrate new and existing technologies in a way that was both easy to use and maintain, allowing for monitoring and documentation, as needed, without distracting from the team members core priority: optimising customer experiences and quality body work for their customers. Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution DirectIP NVR Surveillance Solution Scottsdale based integrator SARC Monitoring answered Autobahn’s call with an upgraded virtual guarding solution with IDIS DirectIP network video recorders (NVRs) at the heart, addressing all issues of compatibility and operational concerns. IDIS NVRs, specifically designed to reduce (if not eliminate) compatibility issues, support multiple industry standards and 3rd party protocols. At Autobahn Collision, SARC integrated multiple IDIS DR-8364(F) NVRs in designing a user-friendly surveillance solution that enhanced and fully supporting the shop’s existing IP camera infrastructure. IDIS DR-8364(F) series of NVRs The IDIS DR-8364(F) series of NVRs have multiple features that enhance the overall ease-of-use and maintainability. The DR-8364(F) supports 64 IP channels of 4K UHD with a maximum incoming throughput of 900Mbps, which means fewer NVRs are needed to support a large installation of cameras. Fewer devices reduce the overall complexity of any solution, by definition, and mean less time spent on installation and maintenance. The intuitive DR-8364(F) NVR interface, common to all IDIS products, also means that training and transition investment is minimised. IDIS’s license free software model, which also includes free software updates, further minimises the cost and complexity of owning and maintaining an IDIS solution. Enhanced protection for luxury vehicles The upgraded solution allows Autobahn Collision and a team of remote monitors to keep the premises—and the concentration of luxury vehicles, parts, and accessories—secure 24 hours a day / 7 days a week, enabled by the enhanced recording, storage, and failover benefits of the IDIS DirectIP NVRs and IDIS’s modular IDIS Solution Suite VMS. Data can be transferred on existing cabling and saved in existing storage space The IDIS DirectIP DR-8364 NVR’s support for H.265 with IDIS Intelligent Codec and Motion Adaptive Transmission (MAT) reduces the need for additional bandwidth and storage upgrades, providing up to a 90% reduction in both bandwidth and storage utilisation. IDIS SmartFailover Additional data can be transferred on existing cabling and saved in existing storage space. Multi-layered data protection through IDIS SmartFailover features include RAID 5 storage redundancy, dual power supply redundancy, and NVR failover, which provides support for a standby NVR that continually monitors the primary NVR (taking over recording if the primary hardware fails). IDIS SmartFailover ensures that data integrity and system operation are automatically monitored and maintained, simplifying system support and maintenance tasks. Real-time monitoring, playback and review, high-quality imagery for reference and documentation purposes, and more are now seamlessly empowered by the new system, allowing Autobahn to continue doing what it does best of all, meeting and exceeding the needs of the region’s most discerning vehicle owners.
Ciudad Ros Casares has become one of the most important business parks in Valencia, Spain. It is a unique commercial and residential construction, which responds to the new business and networking requirements. The intercommunication system chosen by the project managers is the MEET IP System from FERMAX, because of its high performance and integration features as well as the security offered by MEET. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader. Residential management software The project has a total of 245 apartments in 2 buildings, with two outdoor panels per building plus a concierge service managed with MEET's residential management software. The chosen outdoor entry panel is the MILO Digital Touch Panel and the 245 apartments are equipped with the MIO 7'' Monitor. The project is equipped with high technological features and qualities of different types, large leisure and green areas, general and specialised services and an excellent geo-strategic location. This commercial condominium includes offices, stores, a business centre, spaces built to organising events and apartments for rent. The installation of Fermax MEET system started in January 2019.
Sitting on the banks of the river Niger in West Africa is Niamey, Niger’s capital city. The capital city faces some unique challenges to the safety of its local residents and visitors. To help tackle these issues, the government of Niger is working with Hikvision’s West Africa team to install a state-of-the-art, cutting-edge video surveillance solution across the region. Niamey has a history of trade and commerce. Its large and bustling open air market – the Grand Marché – sells everything from clothes, to jewelry, to food, and attracts an estimated 20,000 tourists a year. But while the city has long been known as one of the more relaxed capitals of West Africa, in recent years Niamey has received high profile attention due to criminal incidents in and around the capital city. African Union Summit The city would also receive high profile guests from around the world, including key personnel from the UN and WTO When it was announced that Niamey would host the 33rd Session of the African Union (AU) Summit for the very first time, the Government of Niger decided to seize the opportunity to establish a complete urban video surveillance network. It was vital that this high profile event could run for the full five days without any disruption or untoward incidents, as Niamey would attract visitors and heads of states from across the continent. The city would also receive high profile guests from around the world, including key personnel from the United Nations and World Trade Organisation. Complete video surveillance solution Vincent Wang, Technical Support Engineer for Hikvision West Africa, says, “The AU Summit is a key event in Africa’s diary, and always requires a high security presence. It gave us the ideal springboard for launching a complete surveillance solution that would provide security to those in attendance, while giving the city a robust set of tools to help prevent and manage security incidents long into the future.” When seeking out the ideal surveillance solution for this project, the Government of Niger learned about several similar projects that Hikvision had already completed in African cities and was impressed how well the solution is running. “They wanted to emulate a project, so that’s what we set about doing.” says Vincent. Hikvision high resolution cameras Vincent and the team worked with technology partners, ITS Solutions to design a complete urban surveillance network in Niamey, which would protect residents and visitors across the whole city during the summit and beyond. Central to the solution was the installation of more than 100 Hikvision high resolution cameras for 24-hour monitoring of the city. Along the 12 main roads, and at key intersections throughout the city, the government’s security team installed the Hikvision DarkFighter 2 MP Speed Dome Cameras (DS-2DF8225IX-AEL). These cameras are designed to deliver high quality images in low light or dark environments. They are also equipped with license plate recognition technology so as to effectively identify vehicle violations, such as over speeding or other traffic rules violations, even at midnight with no light. Hikvision PanoVu Series 180° Panoramic + PTZ Cameras Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras Meanwhile, Hikvision PanoVu Series 180° Panoramic + PTZ Cameras (DS-2DP0818ZIX-D/236) were installed at the entrances and exits of the main government offices and hotels, for reliable surveillance and overall protection of all visitors with panoramic view at the time of the summit event. Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras. And the high speed PTZ also offers the function of fast detail positioning over the panoramic area. In the control center, security teams were given Hikvision iVMS-8600 video management software (VMS) in conjunction with large LCD monitor screens, to display a live stream from all the city’s surveillance cameras. Hikvision’s urban video security solution also includes mobile surveillance, allowing law enforcement or government officials to use a mobile device to see a live stream from any Hikvision camera installed in the city, even while on the move. Enhancing network infrastructure The installation was thoroughly planned. “The existing local infrastructure provided some challenges,” says Vincent. “But we investigated it fully during our test phase, so we could design a surveillance network to suit”. “For instance, we found a few potential issues with the local power supply, but to remedy this we installed a UPS network to guarantee power to the cameras for at least 2 hours should the grid fail. We also assessed the local network infrastructure, and the ambient lighting at night. This work was fully completed during our proof of concept several months before the summit.” Hikvision surveillance solution for smart city The African Union Summit was well received and passed without event. The Hikvision surveillance solution undoubtedly played a key role. “The people of Niger feel a certain confidence when talking about the summit,” says S.E Brigi Rafini, the Premier Ministre, at the government of Niger. “It couldn’t have happened without the support of Hikvision technology. The comprehensive security solution was central to the event’s success.” Counseil de Bureau de Securité at the Government of Niger kept positive attitude towards the future potential of this solution. “Thanks to Hikvision technology, Niamey now has a comprehensive city safety solution that will help us to both prevent crime, and respond in real time when incidents do occur. It’s a landmark project for our country and the region as a whole, and we are very interested to see how this innovative technology can help our city and our people to be safer.”
Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, announces that Planet Fitness, with the help of their preferred system integrator Adirondack Direct, recently incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security but also improves operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. Intelligent motion detection Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the camera and Video Management Systems (VMS), but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center unified platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection. Providing bookmarks of recorded incidents A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Video surveillance management Anyone engaging in obnoxious behaviour will likely be the recipient of a Lunk Alarm and the flashing lightsCollins said Adirondack Direct has long recommended Security Center from Genetec for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organisations through enhanced situational awareness, unified command and control and connectivity to the cloud. While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgment-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behaviour. Anyone engaging in obnoxious behaviour will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it. Providing video evidence When a Lunk Alarm is pressed, Security Center creates a bookmark of the event Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate the use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Genetec video solution. When a Lunk Alarm is pressed, Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. Identifying areas of improvement The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Planet Fitness management can re-orient that employee on the proper policies and procedures Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can re-orient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. Losing sales opportunities “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.” A big question for Planet Fitness is have they been losing sales opportunities without realising it? A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realising it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check-in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Delivering a safe environment Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciated by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgment-free zone where people can do their own thing.”
STANLEY Security, one of the UK’s renowned security providers, has completed a major CCTV installation for Bridgnorth Aluminium Limited, the UK's only manufacturer of aluminium flat rolled products. At 27 hectares, Bridgnorth Aluminium’s site in Bridgnorth, Shropshire is extensive. It is home to a casthouse, rolling mill, two litho centres, a multi-slitting line and finishing lines. IP CCTV system The IP CCTV system is critical to our business in terms of health and safety of our employees and site security" The company had previously been using three separate CCTV systems, each covering different parts of this large site, one of which was over 15 years old, had very poor image quality and was starting to show signs of failure. Furthermore, none of the CCTV systems had any level of redundancy, so if one failed access to those particular cameras were lost, along with any recorded footage. Steve Denton, IT Manager at Bridgnorth Aluminium, explains the decision to upgrade, stating “We needed to consolidate everything into one single CCTV system, including all of the cameras from the other three systems, and we needed to add a level of redundancy. The IP CCTV system is critical to our business in terms of health and safety of our employees and site security.” IP video surveillance Following detailed discussions with Bridgnorth Aluminium, STANLEY Security designed a new site wide IP based CCTV system, covering external areas and the perimeter of the site, along with internal areas including key indoor production spaces. The system takes advantage of Bridgnorth Aluminium’s existing IP network which is deployed in most areas of the site, negating the need to install COAX cable. Opting for an IP-based CCTV system has also enabled Bridgnorth Aluminium to make use of newer technology with better quality images, which was the key. STANLEY 2MP bullet cameras and dome cameras The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms The new IP CCTV system features STANLEY 2MP bullet cameras and dome cameras, including 360⁰ dome models. The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms; one of which is used in case of redundancy. Bridgnorth Aluminium is pleased with the new CCTV system as Steve Denton comments, “The image quality of the new system is streets ahead of the old system. The area of coverage is also far greater thanks to the addition of 180-degree wide angle and 360-degree cameras. The software is very easy to use and has some very useful features to aid with playback of recorded footage. The software has already helped us to retrieve footage that we would have had little chance of retrieving before.” Enhanced site security STANLEY Security has been working with Bridgnorth Aluminium since 2017 when it took over the support of the company’s existing CCTV systems. “The transition period had proved successful” states Steve, commenting on their decision to appoint STANLEY Security for this project. He adds, “The service from STANLEY has been excellent, our account manager Amber is one of a kind and always goes above and beyond for us to ensure that we receive the best service possible.”
Traka’s innovative key and equipment management solutions have been installed at a new national distribution centre for a top four UK supermarket. The new distribution centre, fulfils orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centres are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorised personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centres are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorised colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organisations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorised ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom". However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
Network monitoring: Manufacturers & Suppliers
- Dahua Technology Network monitoring
- Vicon Network monitoring
- Sony Network monitoring
- Hikvision Network monitoring
- IDIS Network monitoring
- BCDVideo Network monitoring
- LILIN Network monitoring
- Video Storage Solutions Network monitoring
- Surveon Network monitoring
- Vanderbilt Network monitoring
- Bosch Network monitoring
- eneo Network monitoring
- TruVision Network monitoring
- VIVOTEK Network monitoring
- Panasonic Network monitoring
- Hanwha Techwin Network monitoring
- Luxriot Network monitoring
- March Networks Network monitoring
- Avigilon Network monitoring
- Ganz Network monitoring