Office security
Johnson Controls, the global pioneer in smart, healthy, and sustainable buildings, is pleased to announce the commercial availability of its Security Operations Centres (SOC) service offering in the North American market. Building on 50 years of central monitoring and response services internationally, the SOC offering is available to North American customers seeking to improve business continuity and help reduce risk at a predictable as-a-service fee. State-of-the-art monitoring centre...
Cohesity, a pioneer in AI-powered data security and management, announced it is collaborating with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud. Leveraged with Fort Knox, Cohesity’s cyber vault service, this data-in-use encryption innovation will be the first of its kind in the data management industry. Together, Cohesity and Intel are solving one of the most pressing cybersecurity challenges for CIOs. Traditionally, options have been limited...
Traka is attending The Workplace Event 2024, where it will be showcasing its latest innovations designed to optimise security and efficiency in processes in the modern-day workplace. RFID technology On stand 3a/G22, the pioneer in intelligent key and asset management solutions will be presenting the latest security technology, including flexible RFID technology, designed as a customisable solution for securely storing personal belongings and equipment. With its RFID technology, users can easi...
Brivo, the global pioneer in cloud-based access control and smart building technologies publishes its 2024 Top Global Security Trends Report, detailing the most important changes for physical security teams across the globe. Brivo’s seventh annual trends report is based on 850 responses from security professionals across the U.K., U.S., and Europe, asking the opinions of physical security teams in financial services, technology & IT, manufacturing, retail, and more. New sec...
KYND, a provider of cyber risk management solutions, has officially disclosed a substantial investment in the business to propel expansion and further growth. The investment comes from Verisk, a global data analytics and technology provider, and existing backer BGF, one of the largest and most experienced growth capital investors in the UK and Ireland. Cyber risk monitoring platform Founded in 2018 by Andy Thomas and Melanie Hayes, KYND has developed a cyber risk monitoring platform designed...
A new graphic released by the Security Executive Council (SEC) will help corporate security pioneers and their teams identify skills gaps and track their progress toward Next Generation Security Leadership. Version 2 graphic tool The Next Generation Security Leader graphic, version 2, maps out six categories of skills significant to security leadership success and invites security teams to check off skill sets they’ve attained so they can focus on mastery in other critical areas. The co...
News
The Matrix Multi-Location Solution caters to the contemporary needs of businesses, providing the adaptability to unify dispersed offices within a singular network. This solution presents optimal and practical choices for inter-office communication and long-distance calls. Using our highly scalable and advanced Unified Communication platforms like ETERNITY GENX, ETERNITY MENX, and ETERNITY LENX, connect multiple and distantly located offices, seamlessly. Virtual network The various branches establish connections through branch office communication systems utilising peer-to-peer connectivity, creating a virtual network that interlinks all systems. This network enables streamlined, one-touch calling accessibility for users, facilitating calls to colleagues regardless of their location, as well as on the move. Cost-efficient communication Matrix has catered to industrial verticals like Hospitality, BFSI, Education, Manufacturing, etc. This setup contributes to sustaining business operations seamlessly, offering a readily available contact list of all users and cost-efficient communication via a secured VOIP network. Matrix has catered to industrial verticals like Hospitality, BFSI, Education, Manufacturing, etc. focussing on location solutions to unify their geographically dispersed offices. Key benefits Workforce collaboration across different geographic locations. Centralised management by streamlining communication through the Unified Communication Platform. Maintain business continuity by centralising communication tools and integrating redundancy measures. Investment optimisation in long-distance communications. Optimise Capital and Operational expenses by consolidating communication infrastructure.
At AppWorld, the premier application security and delivery conference, F5 announced new capabilities that reduce the complexity of protecting and powering the exploding number of applications and APIs at the heart of modern digital experiences. API code testing As AI accelerates the growth of applications and the APIs that connect them, F5 is bringing API code testing and telemetry analysis to F5 Distributed Cloud Services, creating the industry’s most comprehensive and AI-ready API security solution. F5 also announced it is making AI pervasive across its entire solution portfolio with intelligent capabilities that help customers protect against sophisticated AI-powered threats while making it easier to secure and manage multi-cloud application environments. AI-ready capabilities “Companies already face daunting complexity and a rapidly changing threat landscape. The added pressure to secure and deliver AI services compounds this, putting many security and IT teams in an untenable position,” said François Locoh-Donou, President and CEO, of F5. “It is our singular mission to deliver solutions that greatly reduce this complexity so our customers can focus on what matters most to them: their business. We are delivering new capabilities that ensure our customers are ready for AI, making it significantly easier for them to protect and power every app, every API, everywhere.” Hybrid and multi-cloud architectures 88% of enterprises report that they deploy apps and APIs across multiple locations In F5’s forthcoming 2024 State of Application Strategy report, 88% of enterprises report that they deploy apps and APIs across multiple locations. Companies have realised that no single cloud is perfect for every application, while hybrid and multi-cloud architectures offer the flexibility necessary to deliver modern digital experiences and meet sky-high user expectations. Report findings This has created immense complexity in enterprise application environments, and it only continues to grow. The same research found that the percentage of organisations hosting their applications in six different environments doubled in the past year, to 38%. At the same time, applications and the critical data that flows through them have become the preferred targets for increasingly sophisticated cyberattacks. Complexity is not just slowing down operations, it is expanding the threat surface area and creating substantial risk for organisations. AI challenges New AI-driven digital experiences are highly distributed with a mix of data sources, models, and services As AI drives growth in the volume of apps and APIs, it is adding significant security challenges that companies must solve. New AI-driven digital experiences are highly distributed with a mix of data sources, models, and services spread across on-premises, cloud, and edge environments, all connected by an expanding network of APIs. The protection of these API connections and the data that runs through them is the critical security challenge that companies must face as they deploy more AI-enabled services. AI-ready API security solution To address this challenge, Distributed Cloud Services will offer the industry’s most comprehensive, AI-ready API security solution. Companies are forced to use disparate tool sets and capabilities to secure their APIs at build time and during runtime. The addition of capabilities recently acquired from API security innovator Wib enables vulnerability detection and observability in application development processes, ensuring that risks are identified and policies implemented before APIs enter production. All-in-one platform At a time when API security has never been more important and more complex, F5 is eliminating the need for customers to pay for and manage separate API security solutions by offering API discovery, testing, posture management, and runtime protection, all in a single platform. Distributed Cloud Services offer the following benefits of a full lifecycle API security solution: Greatly reduced risk window for new APIs, through the identification of vulnerabilities and enforcement of strict, accurate specifications before they enter production. Clear governance guidance, with real-time standards and regulatory compliance reporting for security operations teams and CISOs. API discovery, including third-party and unmanaged APIs in application code, on public internet properties, or referenced in app telemetry. A single solution for both API discovery and enforcement of protocols, policies, and configurations from code to runtime. End-to-end solution “In today’s highly distributed and interconnected world, the protection of the connections that fuel business-critical processes is becoming one of the most important components of enterprise security,” said Chris Steffen, Vice President of Research, at EMA. “As AI accelerates growth in applications and APIs, the ability to consolidate tools and have a single end-to-end API security solution will be a significant advantage for any company.” Making AI pervasive across the F5 portfolio F5 AI Data Fabric is a foundation for building innovative solutions that help customers make more informed decisions F5 technology sits in the data path of nearly half of the world’s applications, providing the unique position and expertise to deliver AI-enabled solutions that benefit from an unmatched level of data. The new F5 AI Data Fabric is a foundation for building innovative solutions that help customers make more informed decisions and take quicker actions. Telemetry from Distributed Cloud Services, BIG-IP, and NGINX will surface unparalleled insights, produce real-time reports, automate actions, and power AI agents. AI assistant Later in 2024, F5 will release an AI assistant that will change the way customers interact with and manage F5 solutions using a natural language interface. Powered by the F5 AI Data Fabric, the tool will serve as an intelligent partner to stretched IT and security teams. It will easily generate data visualisations, identify anomalies, query and generate policy configurations, and apply remediation steps. It will also act as an embedded customer support manager, allowing customers to ask questions and receive recommendations based on model training of entire product knowledge bases.
Award-winning security manufacturer, Gallagher Security, has responded to the growing demand for Federal solutions by appointing Marty Forman as the Business Development Manager for the Federal programme. Marty Forman's experience Marty brings 35 years of industry experience to the role along with a great enthusiasm for turning orange. “There’s a synergy between the teams at Gallagher that I appreciate,” he says. “Many companies are siloed and it's easy to feel like you’re just a number, but that’s not how Gallagher operates. Everyone is very team and goal-oriented and customer satisfaction is our number one drive.” Federal service Marty’s career spans across multiple roles and regions, ranging from integrator to Channel Partner Marty’s career spans multiple roles and regions, ranging from integrator to Channel Partner and managing sales across Georgia, Florida, the Virgin Islands, and Puerto Rico. In more recent years, his work with large corporate clients, like Coca-Cola, has led him to engage with more complex customers in the Federal Government space. Addressing security concerns “Large corporations have similar concerns and needs as the Federal Government because they’re future-focused and fighting major security concerns daily,” Marty explains. “The threat landscape changes so quickly that both need trusted solutions that help them keep up, so we as manufacturers need to be ahead of the game to deliver the capabilities they need. That’s something Gallagher does remarkably well, and it’s one of the things I’m most excited about in my new role.” Best-in-class solutions Jeff Fields, Director of Federal, says Marty embodies the ethos of the programme and that “the spirit of the team would not accept anything less.” He continues, “Marty’s knowledge and commitment to being the best and doing what’s right are attributes required to achieve success and deliver best-in-class solutions for our Federal customers. Servant leadership, respect for the customer, and a can-do attitude are foundational traits, and embody the vision of the Federal Team.” Federal programme expansion When I saw this opportunity to join the team, I talked to my Federal Government customers about Gallagher" According to Marty, a word about the team’s vision is spreading among Federal customers and he wasn’t surprised to hear that the programme was expanding. “When I saw this opportunity to join the team, I talked to my Federal Government customers about Gallagher and everywhere I asked there was a huge respect for our proven solutions and the quality of our products,” Marty says. Gallagher’s Federal solutions “Every one of them has said that they’re impressed with the company’s focus and dedicated Federal programme that’s committed to their specific wants and needs. We understand the environment they work in exceptionally well and it shows.” Marty will be on hand showcasing Gallagher’s Federal solutions at booth # 27099 at ISC West from April 9-12 and invites attendees to stop by and say hello.
SailPoint Technologies, Inc., a pioneer in enterprise identity security unveiled two sets of new offerings designed to give customers options as they build their identity programme while driving customer success throughout their identity journey. First, the company is extending the family of SailPoint Identity Security Cloud offerings with a new Standard suite, giving customers three suite options – Standard, Business, and Business Plus. The Standard suite addresses the needs of companies at the outset of their identity security journey, with a select set of core capabilities that centralise identity-related data so companies can govern access for all enterprise identity types in a comprehensive, scalable way. In tandem, the company also introduced a set of new customer success offerings that align with programme maturity, arming customers with expert-led advice and guidance based on SailPoint’s unmatched depth of knowledge from implementing thousands of successful enterprise identity programmes. Identity security SailPoint solutions address their current, and most importantly, company's future identity security needs" “Identity security is all about the long game and should be approached both from a near-term business need and an aspirational one -- where will the business be in 2-4 years? No matter the answer to that question, the identity security solution you choose is critical to your company’s security over time,” said Matt Mills, President, of SailPoint. “With SailPoint Identity Security Cloud, we’ve built the playbook for companies to grow their identity security programme alongside their business, arming them with solutions that address their current, and perhaps most importantly, their future identity security needs.” SailPoint Identity Security Cloud SailPoint Identity Security Cloud is built on SailPoint Atlas, a unified multi-tenant SaaS platform, and includes SailPoint Atlas common services. It is designed to meet customers’ needs at every step of their identity security journey with each suite building on the previous, giving customers more advanced options as their identity landscape grows in size, scale, and complexity. Each suite includes four key product modules that are essential to a scalable identity security programme: access modeling, lifecycle management, compliance management, and analytics. Key features The below summarises each of the suites offered within SailPoint Identity Security Cloud: Standard suite [NEW]: Standard suite [NEW] provides the necessary tools to build a centralised identity security experience SailPoint Identity Security Standard is tailored for companies with a less complex identity landscape and who are typically early in their identity security journey. It provides the necessary tools to build a centralised identity security experience across the enterprise, streamline processes and increase visibility into the access of critical applications to meet regulatory compliance. This offering also includes an optional services package to set the baseline for deployment, driving a quick return on investment in 8-12 weeks. Business suite: SailPoint Identity Security Cloud Business enables organisations to automate tasks, analysing vast amounts of identity data to dynamically assist in determining the proper level of access, with real-time decision support. Organisations using this offering have the tools and insights to meet compliance requirements and reduce risky access. Business Plus suite: The Business Plus suite integrates critical activity insights and automation into core identity security capabilities SailPoint Identity Security Cloud Business Plus builds on the Business suite to provide the most comprehensive solutions for extended access protection across all applications, data, and cloud resources. It integrates critical activity insights and automation into core identity security capabilities to help organisations discover, secure, and manage identities across an entire hybrid infrastructure. Availability For key identity security use cases, additional SailPoint products are available to add on to the SailPoint Identity Security Cloud suites: Data Access Security, Non-Employee Risk Management, Access Risk Management, Password Management, Cloud Infrastructure and Entitlement Management, and Secure Data Share. Customer Success Portfolio To further propel customer success, SailPoint also released three new customer success packages. These packages are designed to maximise customers’ identity security investment and come in three tiers that offer varying levels of training, configuration support, adoption workshops, and ongoing programme oversight, assessment, and guidance: Silver: Arms customers for successful ongoing maintenance of their identity programme or foundational use cases. Gold: Ideal for those implementing a comprehensive identity security programme or special use cases. Platinum: Designed for those with a robust identity programme or those with more extensive goals and complex use cases. Seamless user experience SailPoint Identity Security Cloud focuses on thinking more about identity security" “With SailPoint Identity Security Cloud, we’ve been able to focus our management and engineering team on thinking more about identity security, than customising the solution, writing the workflows, making the user experience seamless, all of that is managed by SailPoint,” said Prasad Tamhankar, Director of Information Security at ADP. “We have had very positive feedback from our colleagues after we implemented SailPoint Identity Security Cloud,” explained Marcus Montelius, System Manager at Nordnet Bank. Easy-to-use design “The easy-to-use design for requests and certifications and the Slack integration has been very popular and much appreciated by our users. We have also improved drastically the implementation time of new integration with our internal application compared to our previous system." "This is enabling us to extend the delivery of applications and requestable accesses which results in less access management manual work around the company.” Availability The new SailPoint Identity Security Cloud Standard suites and the Customer Success Portfolio offerings are all currently available.
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, has promoted Sarah Dixon to General Manager of Fire & Security, effective immediately. Dixon brings a wealth of leadership knowledge and expertise in pioneering the commercial success of the business. Sarah Dixon In 2020, Dixon joined Johnson Controls as General Manager, Fire Suppression, and after a two-year tenure was promoted to Enterprise Sales Director UK&I. In her new role, Dixon will take the Fire & Security team from strength to strength by enabling sustainable growth while enhancing and digitalising the customer journey, driving the smart, healthy, and sustainable building evolution. Previous responsibilities Sarah has a passion for speaking internally and externally to promote diversity and inclusion During her time with Johnson Controls, Sarah has led her team in driving double-digit growth for the Fire Suppression business. Dixon delivered digital and sustainable outcomes for customers as Enterprise Sales Director UK&I. Alongside her fantastic work in improving financial & customer results, Sarah has a passion for speaking internally and externally to promote diversity and inclusion within the industry. Track record “Sarah has an exceptional track record in strengthening teams and driving growth at Johnson Controls, and we are delighted she is continuing her career within the fire & security business,” said Andy Ellis, Vice President and General Manager, UK & Ireland. “I’ve built so many great relationships and learned from the best in my time so far at Johnson Controls. I am honoured I can still progress here and continue to work with pioneers in the industry,” said Sarah Dixon.
Acronis, a provider of cyber protection announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISV) and managed security service providers (MSSP). MISA members have integrated their solutions with Microsoft security technology to build a better defence against a world of increasing cybersecurity threats. Acronis Cyber Protect Cloud Acronis advocates for natively integrated applications and services commonly used by service providers to boost productivity and efficiency. Acronis Cyber Protect Cloud is an advanced single, integrated solution that reduces complexity and provides unmatched integrated protection from ever-evolving cyber threats. It also encompasses the Acronis Ecosystem of more than 200 integrations with third-party vendors. Manage security and backup services Acronis’ Cyber Cloud Protect integrated with Microsoft Intune, MSPs can manage customer endpoints" "Over 20,000 MSPs use Acronis to protect and manage their customers' endpoints, applications, and data," said Gaidar Magdanurov, President at Acronis. "Most of them are Microsoft CSP Direct or Indirect Resellers who seek synergies between Microsoft, Acronis, and other vendors to meet customer security and data resiliency requirements." "With today’s announcement of Acronis’ Cyber Cloud Protect integrated with Microsoft Intune, MSPs can manage customer endpoints with Microsoft Intune and deploy Acronis managed security and backup services quickly and easily to their customers, all from a single agent and interface.” Integrated ecosystem The integration between Acronis Cyber Protect Cloud and Microsoft Intune allows partners to deploy Acronis agents and apply protection plans based on Microsoft Entra ID groups through Microsoft Intune, which adheres to Microsoft best practices. Acronis partners can seamlessly explore integration options directly through the MISA partner catalogue, aiming to provide MSPs with a more accessible experience for efficiently enabling an integrated ecosystem. Customer security Each new member brings valuable expertise, making the association more effective as it expands Acronis’ collaboration with MISA demonstrates the quality of its integration with Microsoft Intune, showcasing a long-term commitment to the Microsoft relationship. MISA enables close collaboration between members with the shared goal of improving customer security. Each new member brings valuable expertise, making the association more effective as it expands. Joining this ecosystem reinforces Acronis’ dedication to cybersecurity. Cybersecurity “The Microsoft Intelligent Security Association has grown into a vibrant ecosystem comprised of the most reliable and trusted security software vendors across the globe,” said Maria Thomson, Director, Microsoft Intelligent Security Association. “Our members, like Acronis, share Microsoft’s commitment to collaboration within the cybersecurity community to improve our customers’ ability to predict, detect, and respond to security threats faster.”
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security beat
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure centre that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialised ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centres. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighbouring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centres, Jacksons Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customised acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanised steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilised effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customisation of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfils its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) solutions for highly dynamic environments, has successfully partnered with a prominent social media provider to effectively optimise the organisation’s use of space across campuses for enhanced productivity and improved employee experience. Improve space utilisation The social media giant faced the critical need to improve space utilisation across their campuses, which comprised of numerous conference rooms, cafeterias, and other general-purpose areas. Existing legacy solutions proved unreliable in these complex environments, failing to provide the desired level of accuracy while compromising employee privacy. Q-Track Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly To overcome these limitations, Quanergy leverages their seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software. Quanergy’s solution provides extensive coverage across the diverse campus environments, accommodating both large and small rooms with various occlusions, such as tables, chairs, cabinets, columns, and pillars. With a unique object stitching mechanism, Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly, even when temporarily obscured from view. Hyper-accurate detection, tracking Quanergy’s solution resulted in the hyper-accurate detection, tracking, and classification of employees without compromising privacy or capturing any Personal Identifiable Information (PII). Through the use of occupancy related insights, the social media giant can optimise the use of available areas and achieve enhanced productivity among its workforce. The result is a comprehensive solution that outperforms traditional camera-based solutions and dramatically lowers total cost of ownership. 3-D LiDAR solutions Quanergy’s success in optimising space utilisation for the social media giant showcases the transformative potential of 3-D LiDAR technology in smart spaces. With its privacy-preserving capabilities and accurate tracking, Quanergy 3-D LiDAR solutions are already the preferred solution at over 100 global locations providing security for critical infrastructure such as data centres, utility plants, and airports, as well as for safe cities, and industrial automation.
Gunnebo Entrance Control solutions have been installed at travel software and technology specialist Sabre’s remodelled office in Uruguay, to ensure the safety and well-being of its employees, clients and visitors. As a global technology company serving the travel industry, Sabre’s innovative software has revolutionised the way personalised travel experiences can be delivered, pioneering to an increasingly digital and interconnected world. Entrance control requirements With its visionary approach and dedication to customer success, its base in Uruguay is currently home to over 800 staff. To help Sabre meet its entrance control requirements, Gunnebo was invited to work with Abelenda Hermanos as a security system supplier to design and install a comprehensive solution, created to optimise access control whilst maintaining a seamless flow of people. Author's quote By proactively working with Gunnebo Entrance Control we were able to design a system" Says Natalie Sarmiento, Sabre Security & Safety Manager: “Our vision is always to connect people with travel experiences that matter most. And in doing so, our team is the most important part of our business to think differently and make this happen for our customers. We needed to ensure their security on-site in our remodelled office in Uruguay, with the highest standards." She adds, “By proactively working with Gunnebo Entrance Control we were able to design a system that easily blended with its surroundings, while coexisting with the welcoming environment we wanted to create for our employees and our guests. This is something that flows throughout our offices and has been received well by all on site.” Gunnebo's entrance control solutions Gunnebo Entrance Control worked closely with Sabre to create a bespoke entrance control solution, incorporating its latest sleek design SpeedStile FP 1200 EV speed gates, finished in full stainless steel grade 304, to operate six lanes in place. By implementing Gunnebo's entrance control solutions, Sabre has significantly enhanced security measures, reducing the risk of unauthorised access without compromising on speed or aesthetic design. Gunnebo SpeedStile system Real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation" Says Omar Ferrero, Director at Abelenda Hermanos: “It was an absolute pleasure to work with Sabre and install entrance control for the benefit of its staff and guests. The real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation, together with its use of advanced technology to balance speed, security and design. The finish is stylish and maintains the highest level of safety for all who work and visit the new facilities.” Gunnebo's SpeedStile FP 1200 EV system enhances security and optimises the flow of people in office environments. The system's high throughput capability ensures efficient traffic management, allowing for swift and smooth access for authorised individuals. Customised security solutions Equipped with intelligent sensors, it provides accurate and reliable entrance control, effectively preventing tailgating. Additionally, the system's customisable design options enable integration with the surrounding architecture, enhancing the aesthetic appeal of the new headquarters. Thomas Axelson, Gunnebo Partner Network Manager – LATAM concluded: “The successful installation of Gunnebo’s entrance control solutions at Sabre’s offices in Uruguay highlights our capability to deliver customised security solutions. We will work with our clients and installers right from the initial design stage to project completion to deliver a solution that presents the highest level of security whilst maintaining a welcoming feel. We are thrilled with the results and proud to support Sabre as they continue their mission to make travel happen across the globe.”
Amthal has come to the rescue of Katherine Warington School, taking over the support and remote monitoring of fire safety and security services for the benefit of staff, pupils and visitors. Based in Harpenden, Katherine Warington School is a brand-new secondary school that opened in 2019 and welcomed its first cohort of 180 year-seven students in September of that year, before moving into a completed main building in the summer of 2020. Honeywell Gent solution Following a storm that damaged the school’s fire alarm system, the school consulted with Amthal to rectify the situation. Amthal recommended a specialist Honeywell Gent solution to restore the system to full functionality. Amthal continued to monitor the site remotely, working with the management team to service and support security, which included updating the intruder alarm system and access control. Each is now supported to the highest possible standards to create a safe learning environment enabling "every student to make outstanding progress, whatever their starting point.” Safe and secure learning environment It is also developing as a hub for the local area to enjoy and share in our exceptional facilities" Dean Inns, Katherine Warington School’s Business Manager, said: “Our school fosters a learning culture that rewards effort, inspires learning and engenders a shared belief amongst all members of our school that they are equipped to thrive in a changing world. It is also developing as a hub for the local area to enjoy and share in our exceptional facilities." Dean Inns adds, “To achieve this, we must offer a safe and secure learning environment for our staff, pupils and the wider community. This is where Amthal really came into its own, quickly responding when the storm damaged our life safety systems and continuing to work with us to enhance our security. Our continued collaboration reflects our dedication to maintaining a secure and conducive learning environment." Security and fire safety Amthal’s team works closely with Katherine Warington School and continues to monitor security and fire safety on site. Conducting continuous risk assessments, providing bespoke recommendations and delivering training to staff to ensure the seamless integration and maximum utilisation of all safety and security systems in place. Paul Rosenthal, Amthal Sales Director, stated: “Amthal’s expertise in delivering integrated solutions in education settings played a crucial role in securing the project. We were able to identify requirements quickly and efficiently, working around learning environments. The fire safety system, working with our partners at Honeywell Gent ensures early detection capability and enables a prompt response in case of emergencies." Safe educational setting The need for an enhanced intruder alarm was clear, to ensure the protection of the premises" Paul Rosenthal adds, “When we took over the service, support and remote monitoring, the need for an enhanced intruder alarm was clear, to ensure protection to the premises, in and outside of school hours." He continues, "Our continued partnership has also led to us updating the access control on site as the school continues to support young people to thrive, and welcomes its neighbours from the local area to take advantage of the facilities in a safe educational setting.” Advanced security solutions Independently owned, Amthal Fire & Security is dedicated to satisfying end-user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, fire, access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB), United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
Round table discussion
For many years, security systems produced their share of "data exhaust." Every access control action and each video image became a data point to be stored in perpetuity, with no practical way to use the data. More recently, systems have been developed to enable organizations to analyze data from sensors and other connected devices to gain valuable insights into how their systems are being used, to identify potential vulnerabilities; and even to provide insights into broader enterprise operations. We asked this week’s Expert Panel Roundtable: How are data analytics changing the course of the security marketplace?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Products
White papers
Managing security in the age of boundaryless working
DownloadThe welcoming workplace
DownloadAccess and security in the age of hybrid working
DownloadModernizing facilities management
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadThe role of access control in a safe return to the workplace
DownloadBoosting on-site safety and security
DownloadBuilding a safe ecosystem for visitors post COVID-19
DownloadIs your access control system as secure as you think?
DownloadVideos
Office security: Manufacturers & Suppliers
Multi-residential access management and security
DownloadGuide for HAAS: New choice of SMB security system
DownloadPrecision and intelligence: LiDAR's role in modern security ecosystems
DownloadHikvision: Solar powered product introduction + HCP
DownloadVideo surveillance
Download