Oil & Gas Security
IFSEC, representing the world’s largest and most successful series of integrated security events, is expanding into the Egyptian market with the launch of IFSEC Egypt. This event will be held in Cairo’s EIEC on 4-6 November 2020 and will be held alongside fire safety show FIREX Egypt, which takes place for the first time on 3-5 November 2019, and the long-established power and energy event Electricx. IFSEC Egypt introduces the successful IFSEC brand to a large and growing market, pr...
The highly acclaimed Dubai Health, Safety & Environment Forum returns to Dubai from 24-25 November, with a stellar line-up of confirmed speakers from Ministry of Health & Prevention, UAE, Dubai Municipality, ADNOC, DEWA, Emirates Global Aluminium as well as senior executives from leading international and regional companies. On the agenda for this year’s forum are topical health, safety and environment issues. With a raft of infrastructure and construction developments underway in...
This year’s Global Security Exchange in Chicago will see Synectics (booth 2088) demonstrate why the powerful capabilities of its Synergy 3 command and control platform were selected for a next-generation mission control hub for one of Europe's largest urban rail networks. With a comprehensive integration ecosystem combining security, surveillance, and operational sub-systems – through features like workflows, workforce management, cloud-based evidence management, and mobile applicat...
Antaira Technologies is a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LMP-2004G-SFP and LMX-2004G-SFP series. Antaira Technologies’ LMP-2004G-SFP and LMX-2004G-SFP series are industrial-grade equipment that is Ethernet ready to fulfill various markets’ edge-level networking applica...
The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal...
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command centre technologies, fusing critical data input from...
One of the high security perimeter protection integrators has struck a partnership agreement to better access growth markets in oil, gas and military in the Middle East. British-headquartered perimeter protection Zaun Group partners with the Rimal Global Group in Oman. Rimal Global group focuses on engineering, procurement, contracting and construction for renewable energy development, oil & gas field development, power generation projects, roads development and promoter of Niche global technologies in Oman and other Gulf countries. Security fencing systems The quality and precision of their products is second to none in the world" Critically, Rimal Global will become an authorised distributor of Zaun’s high-security fencing systems with Security Ratings, in Oman. Gokul Jayanth, Divisional Manager at Rimal Global, said: “We at Rimal Global bring to Oman the world’s leading organisations specialised in various products and technologies and hence have associated with Zaun for high security fencing systems. The quality and precision of their products is second to none in the world.” The Loss Prevention Certification Board (LPCB) in the UK maintains a Red Book and its Security Ratings to LPS 1175, through exhaustive assessments by independent testers from the Buildings Research Establishment (BRE). LPS 1175 specifically covers the approval and listing of intruder resistant building components, strongpoints, security enclosures and free-standing barriers. Secure and quality product Products approved by LPCB are rigorously tested for resistance to deliberate attack and play an important role in protecting people and property against physical attack, burglary, vandalism and terrorism. To maintain accreditation and a listing in the LPCB Red Book, manufacturers must regularly demonstrate to independent auditors that they are producing products consistent with those tested. This gives the customer the guarantee that they are getting a secure and quality product. Zaun has worked extensively in the Arabian peninsula, with clients including Kuwait Oil Corporation, Petroleum Development Oman and the Abu Dhabi military. Battery power cutting tools Assessors used top end battery power cutting tools including an awesome 750W reciprocating saw Zaun sales and marketing director Chris Plimley said: “A customer in the Middle East has asked us to create a fencing system that could defend against forced entry for at least 10 minutes. Just last month, that development fencing system based on our ‘corrugated steel mesh sandwich’ CorruSec resisted serious attempts at forced entry for over 20 minutes in independent tests by BRE assessors. We believe this may be a world record for a fencing system.” The assessors used top end battery power cutting tools including an awesome 750W reciprocating saw with specialist blades used by fire and rescue teams and 18V circular saws, jigsaws and disk grinders, axes including an 850mm felling axe, a hooligan bar, 1.5kg lump hammer and 500mm long bolt cutters.
UK organisations are failing to make progress towards strong cybersecurity and are facing paralysis as cybercriminals become more advanced. This is the conclusion drawn from the findings of the 2019 Risk:Value report – ‘Destination standstill. Are you asleep at the wheel?’ – from NTT Security, the specialised security company and centre of excellence in security for NTT Group. Examining the attitudes of 2,256 non-IT decision makers to risk and the value of security to the business, NTT Security’s annual Risk:Value report researches C-level executives and other senior decision makers across 20 countries in the Americas, Asia Pacific and Europe, including the UK, and from across multiple industry sectors. Impact of cyber attacks on businesses Almost all respondents in the UK believe that strong cybersecurity is important to their business over the next 12 monthsUK respondents are aware of the risks posed by cyber threats, with over half (54 per cent) ranking cyber attacks on their organisation as one of the top three issues that could affect businesses in the next 12 months – second only to ‘economic or financial crisis’ (56 per cent). While global organisations rank ‘loss of company data’ in third place, in the UK, 44 per cent believe that cyber attacks on critical infrastructure is a far greater threat. Of the most vulnerable components of critical national infrastructure, telecoms, energy and electricity networks take first, second and third place. Almost all (90 per cent) respondents in the UK believe that strong cybersecurity is important to their business over the next 12 months, compared to 78 per cent who say the same about ‘growing revenue and profit’, while 93 per cent believe cybersecurity has a big role to play in society. According to the report, strong cybersecurity allows UK organisations to ‘ensure the integrity of their data’ (58 per cent) and ‘ensure only the right people have access’ to this data (56 per cent), while around half say it ‘helps protect the brand’. Good and bad practice in cybersecurity Businesses in India, a new country to the research, are now the best performing in the world for cybersecurityFor each organisation in the research for the last two years, NTT Security has analysed the responses for good and bad practice in cybersecurity, with good practice awarded positive scores and bad practice awarded negative scores. The results show a worrying lack of progress globally: in 2019 as in 2018, the average score was just +3, meaning that there is nearly as much bad practice as good practice. Thirty-two per cent of businesses score less than zero: that is, they are exhibiting more bad practice than good practice. Businesses in India, a new country to the research, are now the best performing in the world for cybersecurity, ahead of the UK. The performance of organisations in France, Germany and Singapore has worsened in the last year, as has the performance of the financial services, telecommunications, chemicals, pharmaceuticals, oil and gas and private healthcare sectors, placing doubt on the robustness of critical national infrastructure. Areas where UK organisations are stalling Paying cybercriminals: A third (33 per cent) of UK respondents say that they would rather pay a ransom to a hacker than invest more in security because it would be cheaper, a significant rise of 12 per cent over 2018’s Risk:Value report. In addition, 34 per cent said they would rather pay a ransom to a hacker than get a fine for non-compliance of data regulations. Budgets: Security budgets in the UK are potentially failing to keep up with increasing cyber risk, with the percentage of IT budget attributed to security (15 per cent) in line with the global average. The percentage of operations budget spent on security has fallen by around 1 per cent since 2018, to 16.5 percent in 2019. GDPR compliance: Just 30 per cent globally believe they are subject to GDPR, a year on from the deadline, despite it affecting all organisations that have operations or customers in any European Union member state. The UK is a more respectable 48 per cent – still behind Spain (55 per cent) and Italy (50 per cent). Internal security policies: Businesses are still failing to be proactive internally. At a global level, 58 per cent have a formal information security policy in place, just 1 per cent up over last year. While the UK shows an impressive 70 per cent with a policy in place, this is down on last year’s 77 per cent. Less than half (47 per cent), however, admit that their employees are fully aware of such a policy. Incident response plans: In 2019, 60 per cent of UK organisations have an incident response plan in place in the event of a security breach, a 3 per cent drop. However, this is still above the global average of 52 per cent and among the highest figures across all 20 countries. Blaming IT: Around half (44 per cent) of UK respondents believe cybersecurity ‘is the IT department’s problem and not the wider business’, which is in line with the global average of 45 per cent. While Swedish organisations are most likely to blame IT (60 per cent), Brazil is least likely (28 per cent) to do so. Time spent on recovery from cyber breach The cost of recovering from a breach is estimated to be $1.2 million in the UK, matching the global averageThe 2019 Risk:Value report reveals that the time spent on recovering from a cyber breach continues to rise year on year, with UK respondents estimating that it will take 93 days on average to recover. The UK figure is a significant rise of nearly double over last year’s estimated 47 days. The UK now ranks as one of the highest figures globally compared to one of the lowest in 2018. The cost of recovering from a breach is estimated to be $1.2 million in the UK, matching the global average. Notably in the Nordics, costs are predicted to be much higher, with Norway at $1.8 million and Sweden in first place with expected recovery costs for a business suffering a breach of $3 million. Oil & Gas is the industry sector having to spend the most on recovery efforts to the tune of $2.3 million. The estimated loss in revenue in percentage terms is up year on year in the UK – 12.9 per cent, up from 9.7 per cent in 2018, and in line with the global average of 12.7 per cent. Integration of new technologies The execution of cybersecurity strategies must improve or business risk will escalate for the organisations concerned"Commenting on the 2019 findings, Azeem Aleem, VP Consulting, NTT Security, says: “The Risk:Value report is an interesting barometer based on responses from those sitting outside of the IT function – and is often very revealing. What’s clear is that the world around them is changing, and changing fast, with the introduction of new regulations, integration of new technologies and fast-paced digital transformation projects changing the way we work. "What’s concerning though is that organisations seem to have come to a standstill in their journey to cybersecurity best practice – and it’s particularly worrying to see UK businesses falling behind in some critical areas like incident response planning. “Decision makers clearly see security as an enabler; something that can help the business and society in general. But while awareness of cyber risks is high, organisations still lack the ability, or perhaps the will, to manage them effectively. The execution of cybersecurity strategies must improve or business risk will escalate for the organisations concerned.”
Crowcon develops an HMI solution that creates complete system visibility. The solution can run alongside existing DCS/SCADA/PLC systems or mimic panels which are used to monitor wider system views, often incorporating other sensors including security, flow, smoke and fire. Crowcon’s product manager William Allum explains, “This solution enables our customers to view data from multiple panels from one central screen. Due to the system having the ability to store alarm and event logs, users can quickly understand the symptoms of a problem as they view the information and identify the exact location.” License activated software Vortex & Gasmaster HMI employs license activated software operated from a dedicated touchscreen panel Vortex & Gasmaster HMI employs license activated software operated from a dedicated touchscreen panel. As the system is modular, users specify the required number of input converters to link the number of controllers in their system. It monitors up to six Vortex panels or racks, or up to 10 Gasmaster controllers operating on one system, so either Vortex or Gasmaster. The display shows gas levels from all detectors from the chosen panel simultaneously and enables the user to easily adjust or test a system. It is now possible to see the details of each controller within a system, including alarm indications, as well as the complete configuration and location of each gas detector. Users can also see possible trends within the alerts. For example, an alarm in a specific location may be triggered on a regular basis. This is due to the development of a one-hour ‘trend visibility by gas’ function. Long distance connectivity Crowcon HMI can be configured in various different setups: Connection locally Connection via network Connected directly via HMI enclosure The Crowcon HMI can connect with the controller via RS-485 MODBUS or ethernet cable which are capable of long distance connectivity. High ingress protection Vortex’s flexible control package can be customised to meet site requirements without the need for extensive cabling The large multi-lingual display shows gas levels from all detectors simultaneously and enables one to easily adjust and test the system. It operates stand-alone or can interface with any alarm device and control system using a selection of outputs. All the information one needs about gas and fire detectors is available, at a glance on Gasmaster’s compact, versatile and powerful gas detection control panel. Simple to operate with a comprehensive selection of input and output functions. Vortex’s flexible control package can be customised to meet site requirements without the need for extensive cabling. The rack and panel comprise the essential input, output and controller modules which are mounted on a DIN rail. An optional display module is available in panel-mounting and 19" Rack formats. This configuration can be incorporated into a variety of specialist enclosures, such as 19" format or those with high ingress protection.
Radiflow, a provider of industrial cybersecurity solutions for industrial automation networks, and Trusted Cyber Security Solutions (TCSS), a provider of cybersecurity services and solution, jointly announce that TCSS has joined Radiflow’s OT MSSP Partner program in order to expand its service offerings and pursue market opportunities to provide managed OT cybersecurity services to its industrial customers across central and southern Europe. TCSS is a growing cybersecurity systems integration and consulting firm based in Vienna, Austria. The company currently provides a range of IT-related cybersecurity solutions, including consulting, professional and managed services, to its corporate and government customers through the DACH, Balkan and Adriatic regions in Europe. Industrial enterprise segment Most of our industrial enterprise customers are in the process of digitising their operations" Recently, TCSS has experienced significant growth in the industrial enterprise segment with numerous new customers in the manufacturing, automotive, oil & gas and other production-related sectors. As part of an overall effort to expand its service offerings for this customer segment, TCSS has taken the strategic decision to launch OT managed cybersecurity services based on Radiflow’s OT MSSP partner program. “Most of our industrial enterprise customers are in the process of digitising their operations, which has created a valuable market opportunity for our company to provide ongoing OT cybersecurity services in an MSSP offering,” explained Robert Herscovici, CEO at TCSS. “Radiflow’s comprehensive MSSP partner program will provide us with the framework to rapidly define and rollout important new managed OT cybersecurity services to protect our industrial enterprise customers throughout their Industry 4.0 journeys.” Threat detection system Radiflow’s OT MSSP partner program provides tools, procedures and expertise for MSSPs to efficiently rollout new cybersecurity services dedicated to the ICS/SCADA networks of their industrial enterprise and critical infrastructure customers. By hosting Radiflow’s iSID Industrial Threat Detection System in its cloud environment, an MSSP can offer new OT cybersecurity services, including mapping and monitoring the network topology and connected assets, detecting and responding to security breach alerts and more. We have strong expectations to benefit from Radiflow’s well established experience in the OT cybersecurity sector" MSSPs can also offer advanced OT cybersecurity services that leverage iSID’s automated vulnerability mapping and dynamic scoring processes in order to identify the most critical security risks based on the impact to its specific business operations. “We have strong expectations to benefit from Radiflow’s well established experience in the OT cybersecurity sector and the company’s compelling partnership program,” added Herscovici. Digital transformation projects “We are pleased to welcome TCSS as a new OT MSSP partner and are looking forward to working closely with the company to maximise the value it provides to its customers with their new managed OT cybersecurity services,” said Ilan Barda, CEO at Radiflow. “Based on our experience of working with industrial customers, we see strong benefits in teaming up with MSSPs to deliver an effective framework for industrial enterprises to address their emerging OT cyber risks.” Radiflow will be discussing the benefits of its OT MSSP partner program at the upcoming SANS ICS Europe 2019 event in Munich, Germany on June 24 – 29. Industrial enterprises that are looking to improve the way they address their cybersecurity risks in their digital transformation projects are invited to meet Radiflow’s experts at this event.
Percepto, the provider of autonomous industrial drone solutions, launches the next generation of its AI-powered autonomous industrial Drone-in-a-Box (DIB). Available now, the solution includes a highly portable, smaller, lighter-weight and extreme weather resistant base station. Adding field-proven 5G compatibility, the new DIB also features seamless integration of 2D mapping and 3D modelling, highly customised reporting, comprehensive compliance and enhanced safety functions. The award-winning DIB solution provides constant aerial visual insights. It enables organisations operating around the world in the mining, energy and industrial, oil and gas, ports and terminals sectors, to optimise their security and business operations, whilst reducing risks and operational costs. Launched at IFSEC International in London, the new next-generation Percepto solution provides many significant upgrades and new features. Promising complete protection New features enable constant site scanning and pile inspection for better inventory management At only 166(W) x 162(D) x 168(H) and 162kg, the smaller and lighter weight (162 kg) Percepto Base makes it even easier to transport, deploy and manoeuvre units into position, in order to schedule and manage a wide range of surveillance, mapping, inspection and maintenance missions. The entire DIB solution is protected by high levels of extreme weather resistance, with the new Percepto Base achieving an ingress protection rating of IP65, which promises complete protection against contact with moving parts inside the enclosure and against the ingress of dust. New features enable constant site scanning and pile inspection for better inventory management. Fully integrated data dashboard created automatically upon mission completion as well as customised reporting for pile inspection and change detection. In addition, the new Percepto DIB solution is powered by the PerceptoCore Software suite which now includes new highly customisable reports to translate aerial data from Sparrow drones to actionable insights. Each stakeholder operating on-site received aerial insights relevant to his/her field of interest. With 5G networks being switched on around the world, Percepto is pioneering the autonomous drone market by adding 5G compatibility to its latest version. In April 2019, the company revealed that it had successfully proven the ability to fly autonomous drones over SK Telecom’s (the largest mobile operator in Korea) 5G trial network. The Percepto Solution has always adhered to the most stringent global regulatory compliance requirements. In order to provide even greater levels of safety and to protect the Sparrow drone in the highly unlikely event of malfunction, units can now be equipped with an integrated parachute. Another additional safety enhancement feature is the ability to lock accurate drones’ position in case of loss of GPS. CEO of Percepto, Dor Abuhasira, states: “Percepto has a reputation for being first to market with innovations that become adopted as the gold-standard for autonomous drone functionality and operation. With the launch of our next-generation DIB solution we have raised the bar once again, when it comes to safety, and customised value for variety of our customers.”
Synectics commences the roll-out of Synergy 3 2019, the latest release of its command and control platform for demanding surveillance and security environments. Introducing enhanced customisable mapping, camera management, and third-party integration capabilities, the feature-rich platform is the most customer-centric iteration of the software to date and aims to make the Synergy 3 experience more user-friendly. The new release will be available across Synectics’ key markets, spanning transportation, infrastructure, oil and gas, high security, public space, and gaming. Automatic camera plotting Speaking about the latest developments, Martyn Rowe, Head of Product Management at Synectics, said: “We wanted this release of Synergy 3 to offer practical innovations that customers will truly benefit from in terms of how they work and their security challenges.” We wanted this release of Synergy 3 to offer practical innovations that customers will truly benefit from" “For example, to complement existing GIS mapping capabilities, we’ve introduced advanced CAD mapping that enables customers to upload and seamlessly navigate their own maps of property and asset layouts. Functionalities such as automatic camera plotting in Synergy 3 ensure that any layout changes (for example, to gaming tables or slot machines) don’t require lengthy re-programming of cameras. This has a positive impact for the customer’s on-premise resources, particularly where sites have hundreds or even thousands of cameras.” Monitoring live footage Camera-related developments in the 2019 release also enable footage to be viewed in more intuitive ways. The de-warping functionality within Synergy 3 has been enhanced to provide an undistorted view of fisheye cameras, offering the ability to monitor live footage from multiple angles of the same camera for wide-area situational awareness. Furthermore, Synergy 3 now supports H.265 compression for all IP cameras compliant with ONVIF Profile S. Martyn continued: “Synectics has a strong reputation for offering end-to-end solutions tailored to specific needs. We can’t make that claim if we don’t give our customers the freedom to choose and use systems and devices that meet their unique requirements. Developments such as H.265 compression, new third-party system integrations, and a Software Development Kit (SDK) to help technology partners write integrations to Synergy 3, reflect this and our commitment to future-proofing our solutions.” Facilitating situational awareness Other capabilities strongly associated with Synergy 3 since it first launched in 2014 are its incident management and response features. Synergy 3 2019 builds on these proven capabilities, with further improvements to facilitate situational awareness and incident management under pressure. Clip mode ensures that any footage viewed is automatically imported to a clip basket Two notable developments in this respect are the introduction of quad view automation and the new clip mode functionality. The former refers to tailorable alerts that, if specific criteria are met, trigger quad layouts ‒ allowing the simultaneous tracking of live action and investigation of recorded footage. Clip mode ensures that any footage viewed is automatically imported to a clip basket, for quick and easy transfer to the incident locker if verified as pertinent. Intelligently automate processes Martyn added: “At Synectics, we place great importance on being able to intelligently automate processes for those in charge of securing and operating facilities in the demanding sectors we serve. Whether it’s to improve conditions for keeping on top of incidents, help users get the most out of the powerful capabilities at their disposal, or simply save busy surveillance teams precious time, we are always looking at how we can better support our customers.” “While these developments in Synergy 3 2019 differ in function, they share a common thread. They have all been undertaken with an understanding of the pressures our customers face – one fostered through close working partnerships and real-world sector experience.”
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling increased energy demand. But like nearly every other market today, the oil and gas market is on the brink of a sea change. According to Deloitte’s 2018 outlook on oil and gas, “the digital revolution is here.” The sheer volume of information and data generated by digital devices, such as those associated with the Internet of Things, will allow producers to leverage rich data and combine it to deliver smart, efficient solutions. The rise of digital technologies is unleashing new ideas across the oil and gas industry and even though we are in the beginning stage of being able to harness the power of these types of technologies, innovative ideas are emerging — all designed to support the core business, reduce internal investments, deliver products faster, boost efficiencies, and enhance safety. Maximised operations and increased ROI This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand This is welcome news because there are a number of challenges facing the oil and gas industry, from improving reserve replacement and ensuring workplace safety to reducing operating costs and limiting downtime. All of these objectives must be achieved while maximising operations and increasing overall return on investment. Never has it been more crucial for critical infrastructure organisations to demonstrate a focus on safety, security, and collaboration. Here's why: Growth and demand According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand. As energy-centric organisations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success. Compliance Continuous demand is only one challenge; compliance with industry and government regulations is another significant hurdle that must be maintained or there is risk of production shutdowns. For example, the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS) impose comprehensive federal regulations for high-risk chemical facilities, requiring organisations to conduct vulnerability assessments. This is just one of many regulatory procedures sites must follow to conform to environmental protections, safety precautions, and safe handling of hazardous materials. As energy-centric organisations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success Threat protection, mitigation, and collaboration In addition to meeting the requirements of regulatory procedures, mitigating risk in this industry propels leaders to develop stringent strategies to ensure robust protection of people, property, and assets, effective and efficient response to incidents when they occur, and procedures and protocols to ensure business continuity in emergency situations. Energy providers require comprehensive safety planning and technology systems that can augment the capabilities of on-site and remote personnel. In recent years, video solutions have become the standard for monitoring facilities, assets, and employees, and now these organisations require enterprise-class solutions that can help gather intelligent data that allows for enhanced security and safety efforts but also focus on processes that enhance operational efficiencies. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market IT security is also a concern. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market. An IT breach can cause operational havoc, risk to the public, and damage to an organisation’s brand. Adopting a continuous improvement approach to a security strategy safeguards and helps protect valuable company information and reduces the likelihood of an incident. Also, collaboration between IT and physical security leaders and the correlation of both departments' data makes it much easier to identify a potential breach before havoc ensues. The digital age With the rise of the digital revolution and the demand for data to improve insight, oil and gas producers and businesses need to find new ways to capture data, correlate it as needed, and then leverage it to make the most informed decisions. Software platforms are being used in a wide variety of applications to provide a single pane-of-glass view that allows operators to gain critical insight into operations. By collecting intelligence from digital sensors, such as video surveillance cameras, open-source Web intelligence, building systems, crowdsourcing, weather sensors, mobile devices, and more, operators can detect potential risks and manage and respond to situations more efficiently. Furthermore, information can be shared easily with multiple agencies, employees, citizens, and first responders — especially valuable in the event of a safety incident where rapid response is paramount. By creating a single enterprise-wide view across disparate systems and technologies, organisations experience improved response times, lowered operational costs, and increased employee safety. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically Traditional command centers Intelligent solutions, such as those derived from the idea of artificial intelligence, help organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies within the oil and gas industry, fusing critical data input from emergency calls and responder activity to enhance situational awareness. With traditional command centers relying mostly on call and radio updates, visibility can be limited, but new digital platforms enable operators to oversee a situation and engage with and direct the response force. Overall, these types of automated functions deliver a simplified and modernised operating environment. The future is the Intelligent SOC Oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets All of these digital solutions are designed to take center stage within the Intelligent Security Operations Center (ISOC). To combat advanced, multi-stage threats, oil and gas facilities are transforming the traditional SOC into the next-generation unified ISOC with an integrated platform for detection, investigation, communication, and response. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically. Energy providers operate in challenging, fast-moving environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. As the idea of the digital age continues to transform this market, new technologies will be more widely used to improve business operations from exploration and extraction to transportation and distribution. With the right technology, strategic partnerships, and enhanced situational awareness, oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets, while continuing to focus on achieving business goals that will sustain supply and demand for years to come.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-driven decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis and application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilising data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyse data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant access to connected devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyse this data is of imperative importance. Real time data storage availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing stored data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilise surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
With the ever-growing availability of video data thanks to the low cost of high-resolution video cameras and storage, artificial intelligence (AI) and deep learning analytics now have become a necessity for the physical security industry, including access control and intrusion detection. Minimising human error and false positives are the key motivations for applying AI technologies in the security industry. What is artificial intelligence? Artificial intelligence is the ability of machines to learn from experience using a multi-layer neural network, which mimics the human brain, in order to recognise items and patterns and make decisions without human interference. The human brain is estimated to have 86 billion neurons; in comparison, the newest Nvidia GPU Volta has 21 billion transistors (the equivalence of a neuron), which offers the performance of hundreds of CPUs for deep learning.AI can learn continuously 24 hours per day every day, constantly acquiring, retaining and improving its knowledge In addition, unlike humans, AI can learn continuously 24 hours per day every day, constantly acquiring, retaining and improving its knowledge. With such enormous processing power, machines using Nvidia GPU and similar chips can now distinguish faces, animals, vehicles, languages, parts of speech, etc. Depending on the required complexity, level of details, acceptable error margin, and learning data quality, AI can learn new objects within as fast as a few seconds using Spiking Neural Network (SNN) to a few weeks using Convolution Neural Network (CNN). While both SNN and CNN offer advantages and drawbacks, they outperform tradition security systems without AI in terms of efficiency and accuracy. According to the research reports of MarketsandMarkets, the market size of perimeter intrusion detection systems is projected to increase from 4.12 billion USD in 2016 to 5.82 billion USD in 2021 at a Compound Annual Growth Rate (CAGR) of 7.1%. Meanwhile, the predicted market of AI in security (both cyber security and physical security) will grow from 3.92 billion USD in 2017 to 34.81 billion USD by 2025, i.e., with an impressive CAGR of 31.38%. Legacy perimeter intrusion detection systems Legacy perimeter intrusion detection systems (PIDSs) are typically set up with the following considerations: Geographical conditions: landscape, flora, fauna, climate (sunrise, sunset, weather conditions, etc.), whether there are undulations in the terrain that would block the field of view of cameras Presence or lack of other layers of physical protection or barriers Integration with other systems in the security network: camera, storage, other defensive lines (door, lock, alarm, etc.) Types of alarm triggers and responses System complexity: intrusion detection with various types of sensors, e.g., microwave sensors, radar sensors, vibration sensors, acoustic sensors, etc. Length of deployment Local regulations: privacy protection, whether the cameras/sensors must be visible/hidden/buried, etc., electromagnetic interferences that may affect other systems such as oil rigs or power plants Human involvement: on-site personnel arrangement, human monitoring, human action in response to alarms AI object detection can easily distinguish different types of people and objects Pain points and benefits of AI The conditions listed above correspond to certain requirements of an intrusion detection systems: minimal false alarm, easy setup and maintenance, easy integration, and stable performance.AI by nature is designed to learn, adapt itself and evolve to work in multiple conditions: it should be integrated with existing video recording systems Minimal false alarms: False alarms lead to increased cost and inefficiency but are the main problem of PIDSs without AI technology, where animals, trees, shadows, and weather conditions may trigger the sensors. AI object detection can easily distinguish different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Therefore, the amount of false alarms can be reduced by 70% to orders of magnitude. Easy setup and maintenance: Legacy PIDSs without AI must account for terrain, line of sight of cameras, sensor locations; any changes to the system would require manual effort to recalculate such factors and may disturb other components in the system. In contrast, AI PIDSs enable the system administrator to access the entire system or individual cameras from the control room, configure the region and object of interest in the field of view of cameras within minutes, and adjust with ease as often as necessary. Computing knowledge and even specific security training are not required to set up a secured PIDS with AI because AI PIDS is designed to relieve humans from knowing the inner working of machines. Easy integration with complementary technologies: Legacy PIDS without AI relies on physical technology, which are often proprietary and require complete overhaul of systems to function smoothly. On the other hand, AI by nature is designed to learn, adapt itself and evolve to work in multiple conditions, so AI PIDS is easily integrated with existing video recording (camera) and storage (NVR) systems. AI also eliminates the need for physical wireless or fiber-based sensors; instead, it functions based on the videos captured by cameras. Furthermore, AI enables easy and instantaneous combinations of multiple layers of defense, e.g., automatic triggering of door lock, camera movement focusing and access control as soon as a specified object is detected in the region of interest, all set up with a click of a button. Stable performance and durability: Legacy PIDSs without AI requires complicated setup with multiple components in order to increase detection accuracy. More components mean a higher probability of malfunction in the system, including exposure to damages (e.g., sensors can be destroyed) and delay in detection, while human monitoring is inconsistent due to human fatigue (studies have shown that a person can concentrate in mundane tasks for only up to 20 minutes, and the attention span decreases even more rapidly when humans are faced with multiple items at once, e.g., multiple camera monitoring screens). AI significantly reduces, if not completely eliminates the need for human involvement in the intrusion detection system once it is set up. In addition, AI reduces the risk of system malfunction by simplifying the hardware sensors needed. Minimising human error and false positives are the key motivations for applying AI technologies in the security industry Additional benefits of AI in intrusion detection Artificial Intelligence is undeniably reshaping every business and weaving into every aspect of daily lifeMaximal detection capability: The most advanced AI intrusion detection system today provides an all-in-one solution to distinguish any combination of alarm-triggering criteria beyond perimeter protection. Using AI, the system administrator can configure as many zones with different settings and object of interests as necessary, which include detections for specific colors or attributes (e.g., person not wearing the required uniform or carrying food/drink), numbers and dwell time (e.g., group of more than 5 people loitering), or movements (e.g., cars moving faster than the speed limit). In addition, AI can accurately pinpoint the location of event occurrence by displaying the camera that records the event in near real time, i.e., with few-second delays. Lower security operation cost: By minimising the number of false positives and human involvement while maximising ease of use and stability, AI intrusion detection systems significantly decrease the total cost of ownership. Companies can reduce the large security personnel overhead and cost of complicated and expensive legacy PIDSs systems. McKinsey Global report in June 2017 shows that proactive AI adopters can realize up to 15% increase in profit margin across various industries. Artificial Intelligence is undeniably reshaping every business and weaving into every aspect of daily life. In security, legacy systems are giving way to AI-based systems, and the first enterprises to adopt AI-based systems will soon, if not immediately, benefit from such investment. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimise the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customised access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorised entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorisation to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customisation ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-wave signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, Washington-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar technology for border surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar sensor for security applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the biggest news is perhaps the possible long-term impact of first-time exhibitor Security and Safety Things (SAST), a Bosch startup. SAST is building a new Internet of Things (IoT) ecosystem for the security and safety industry, including an app store, an open and secure camera operating system, a software developer environment, and a portal for integrators. SOCs (system-on-chips inside cameras) are becoming much more capable" Their 1,800-square-foot booth was big for a first-time exhibitor, and the American football theme was well received, as was the substance of the company’s effort to drive innovation in a highly fragmented industry. Seeing actual cameras and apps on display at the ISC West booth is “more real than PowerPoint,” says Hartmut Schaper, CEO of Security and Safety Things (SAST). “For us, seeing is believing,” says Schaper. “It was important for us to show cameras and apps for the first time. People are surprised at how far down the road we are.” “This dynamic will change in the industry,” says Schaper. “SOCs (system-on-chips inside cameras) are becoming much more capable. Soon there will be more processing power on the edge. People will find a way to use the extra processing power.” “Seeing is believing” at the SAST booth at ISC West 2019, where CEO Hartmut Schaper showed several manufacturers’ cameras whose functionality can be expanded using Android apps Developing more apps Several large manufacturers are already involved in the initiative, but there are some holdouts. “We are having ongoing talks with everyone to convince them to join,” Schaper says. “Some of the bigger ones will come around. We are not a camera manufacturer, and not a threat. We are owned by Bosch but are managed completely separately. There will be more and more apps developed, and momentum will increase.” “A year from now we will have successful customers we can talk about, and more camera manufacturers on board,” he says. “This year we are taxiing on the runway, but next year we will have cleared the tarmac and be climbing.” If the approach succeeds, their first appearance at ISC West will be remembered as historic. Future of surveillance cameras Off the show floor, in a nearby meeting room, chip maker Ambarella demonstrated technologies that will be driving the future of video surveillance cameras, including more intelligence at the edge. “People have been using more traditional video analytics approaches, though most of them have been disappointing,” says Chris Day, Ambarella VP of Marketing and Business Development. “What is ground-breaking now is the use of neural networks and real artificial intelligence, which has increased capabilities 100x. "You will see camera products coming out over the next year that are massively better than before. It’s not just incrementally getting better. Cameras will be coming out later this year with analytics that are absolutely amazing based on [the new chips.]” Larry Anderson, editor-in-chief of SecurityInformed.com, talks about Ambarella HDR and Low Light Solutions with Jerome Gigot, Senior Director of Marketing for Ambarella. (Source: Ambarella) New systems-on-chips Ambarella has introduced four new systems-on-chips (SoCs) in the last year, with emphasis on computer vision (video analytics). The newest is the S6LM Camera SoC with 4K imaging technology, unveiled at ISC West. The S6LM includes Ambarella's latest high dynamic range (HDR) and low-light processing technology, highly efficient 4K H.264 and H.265 encoding, multi-streaming, on-chip 360-degree de-warping, cyber-security features, and a quad-core CPU. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff" “With so much focus on AI and computer vision, I’m concerned the industry has taken focus away from low light imaging, wide dynamic range and image quality,” says Day. “You have to see the details in an image. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff, it’s all included in one chip.” From products to systems With a new general manager on board (Daniel Gundlach, formerly of Bosch), FLIR Systems Security Division is continuing its transition from a product company to a solutions provider, removing internal silos to clear the path. FLIR offers a strong end-to-end portfolio for Smart Cities applications, including the TruWITNESS line of body worn cameras and newly acquired Aeryon drones. FLIR’s historical strength as the top thermal imaging provider continues, but today they are much more than a thermal imaging company, offering visible day/night cameras, infrared pan-tilt-zoom cameras, video management systems and other technologies to provide a broader platform. FLIR's Saros security cameras combine multiple security technologies, including thermal sensors, high-resolution visible imaging, IR and visible LED illuminators, onboard analytics and two-way audio and digital input/outputs. Products in critical infrastructure applications In addition to Safe Cities, FLIR installs a range of products in critical infrastructure applications, such as oil and gas and electric utilities. Ports also tend to combine traditional security with an emphasis on perimeter protection, a FLIR strength. Existing perimeter protection applications can open opportunities for the broader platform. For example, installing a complete system in an airport that already uses FLIR’s thermal technology represents “low-hanging fruit” for the company, says Fredrik Wallberg, FLIR Director of Marketing – Security and Intelligent Transportation Systems. Ambarella demonstrates its latest imaging technology for video security during ISC West 2019 (Source: Ambarella) Integrated solutions Bosch's focus At the Bosch booth, there was an emphasis on integrated solutions and the customer experience. A mock retail store setup demonstrated systems such as overhead cameras for people counting and alarm communication to provide an alert if a refrigerator door is left ajar. A wireless panic button generates a silent alarm, communicates with a 2-way radio, and triggers a camera to focus on the area. An AVIOTEK IP camera alarms if there is a fire, based on observing actual flames rather than smoke. A new Bosch fixed dome camera series offers wireless remote commissioning capabilities that reduce installation and set-up time by up to 75 percent. Set-up only takes three steps: install the mounting bracket, connect the cables, and attach the camera module. Commissioning can be done wirelessly or remotely with no need for ladders or lifts. Dahua marks five years in the U.S. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view Time flies in the security industry, and it has already been five years since the Dahua brand entered the U.S. market. Today the company offers products through ADI and some 20 distributors, and has more than 30 technical consultants and technical support employees and 50 or 60 sales people in the field (including independent rep firms). “We are growing,” says Tim Shen, Director of Marketing at Dahua Technology USA. “It’s exciting for the company.” At ISC West, Dahua introduced a line of Multi-Flex panoramic cameras with lens modules that can be repositioned along an internal track for 180-, 270- or 360-degree views, providing flexibility for integrators. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view. Cost savings come from ease of installation (one camera instead of four) and only one VMS license (instead of four). AI and night colour cameras Dahua is also emphasising its Night Colour cameras that remain in full colour mode regardless of how dark it gets. There is no IR illumination or IR cut filter – the camera stays in color mode and displays any visible image in colour with as little as 1 lux of illumination. The 2 megapixel version is on display at ISC West, and a 4 megapixel version will come in the fall. A year ago at ISC West, Dahua emphasised its initiatives in artificial intelligence (AI) in order to position the company as a technology leader. This year, the message was more general – ‘Power Through Technology.’ The range of Dahua technologies includes AI, Night Colour, Starlight low-light imaging, fifth-generation HDCVI, and e-POE (Enhanced Power over Ethernet). Dahua USA's Director of Marketing says "the market itself likes AI", and expects more AI applications to follow (Source: Dahua USA's LinkedIn) “When we present AI to customers, they are happy, but when it comes to the budget they don’t have it,” says Shen. “The market itself likes AI, and it’s very much a buzzword. But we still need a proof of concept that it can do something good for end users. We need time to develop broader applications. The ‘smart retail’ market and education are good places to start.” he says. “AI is for project business,” adds Jennifer Hackenburg, Dahua’s Senior Product Marketing Manager. “Projects that are looking at AI haven’t come to fruition yet; they are still in the pipeline. It’s not for your everyday business. They are implementing it, but not as fast.” Access control beyond doors Access control should extend beyond doors. That’s the message I heard at the ASSA ABLOY booth, which displayed a variety of physical locks and intelligent access systems. An example is traffic cabinets, those metal boxes in public locations that could potentially be accessed to invade an internal network. ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces throughout an enterprise. The company’s ‘security continuum’ message draws attention to the need for the right level of security for the right opening, using existing infrastructure as well as new electronic technologies. “Customers face a combination of non-traditional access control and questions on how they can secure things that are not doors,” says David Corbin, ASSA ABLOY Director of Access Control Accessories. The security message is resonating beyond the traditional security department to involve other stakeholders in an enterprise, including IT directors. There is new awareness of vulnerabilities that have been there forever, such as traffic cabinets that can be opened with a key purchased on eBay.
Abdullah A. M. Al-Khodari Sons Company is a multifaceted contracting company in Saudi Arabia. This company conducts business in diverse sectors such as civil engineering, roads and bridges, railways, buildings and infrastructure, water and waste water treatment, oil-gas and pipelines. It has 25 construction sites across Middle East. Managing time-attendance, shifts, overtime and leaves of 20,000 employees at different locations was a challenging process for them. They wanted a centralised time-attendance solution that would enable them to manage attendance data from a central location and speed up the payroll process. Project Highlights Time-attendance solution for 25 construction sites Access control solution for 25 sites Centralised attendance management for 20,000 employees Managing time-attendance data Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East. Managing time-attendance, shifts, leaves and overtime of 20,000 employees at different locations is very time consuming and a tedious task. Previously, the customer was using Hand geometry solution, which was very time consuming. Workers also found it difficult to place their palms in the proper position. Managing time-attendance data of all employees on a central level was also becoming difficult for the company. Furthermore, the head office was using a different time-attendance solution in comparison to other sites. The head office processed the salary of employees after receiving an attendance summary from each of their branches. The process of salary calculation with respect to working hours and overtime of each employee took around 10 days. Moreover, there were chances that the attendance data was inaccurate, leading loss of efficiency and employee dissatisfaction. To overcome such challenges, the company required a centralised time-attendance and access control solution which could be managed and controlled from the head office. Faster and accurate salary calculation After discussing all of their problems and requirements Matrix offered web based COSEC CENTRA time-attendance and access control solution for their multi located branches across the Middle East. It automated all time-attendance processes right from recording entries to processing salaries. COSEC CENTRA access control solution allows controlling access on three simultaneous dimensions – user, zone and time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected Optical fingerprint based time-attendance and access control terminal COSEC DOOR FOP was installed to mark the attendance and get access using fingerprint credentials. As per assigned access rules and time-attendance policies, access is allowed or denied, and event data would be pushed from all devices to the COSEC CENTRA server in real-time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected centrally. Various types of time-attendance reports and charts can be generated for faster and accurate salary calculation. Error free time-attendance Time required for salary calculation reduced by 30% Productivity increased by 20% Control of all sites through a live monitoring window Error free time-attendance and overtime data Database management of all employees Centralised report generation Products installed COSEC DOOR FOP - optical fingerprint and RF card based door controller COSEC ENROLL FINGER - fingerprint enrolment station COSEC LE PLATFORM - web based application software platform COSEC LE TAM - time-attendance and leave management module COSEC LE ACM - access control module COSEC LE USER10000 - 10000 user license for LE platform
Many oil and gas companies manage miles of gas lines within their operations and have an extensive portfolio of real estate to manage. This breadth of assets can be challenging to effectively operate and secure. Historically, oil and gas companies have dispatched a technician to check their gas lines on a daily basis, which is exceptionally expensive. Companies need a way to minimise the necessity of personnel to check on false alarms or extended motion triggers. Saros DH-390 camera to detect intruders The FLIR Saros DH-390 camera provides wide-area coverage, using onboard analytics to detect intrudersOil and gas operators typically manage large numbers of remote sites, under the constant threat of trespassers. There are several solutions that can help reduce risk of theft and vandalism at these sites. The FLIR Saros DH-390 camera provides wide-area coverage, using onboard analytics to detect intruders. It combines thermal and optical image sensors to give remote security operators detailed views of the site, and the event that caused an alarm, covering areas up to a quarter acre per camera. The FLIR Elara Series includes the FC-ID thermal cameras, which also utilise onboard video analytics to detect perimeter breaches over longer ranges, up to nearly half a mile. Multiple Saros and Elara cameras can be combined with VMS solutions from FLIR or third parties to create comprehensive security solutions that enable oil and gas operators to efficiently secure their sites and receive real-time notifications of perimeter breaches. Real-time notifications of site activity FLIR security solutions allow oil and gas operators to receive real-time notifications of unauthorised site activity. Operators can then respond immediately, preventing losses associated with equipment downtime and damage. These systems can also provide live views of the site at any time, allowing basic visual inspections to be carried out without having to dispatch technicians to each site, which increases operational efficiency of the organisation.
Things get hot when pots and pans are polished in the production process at Kuhn Rikon, the number one Swiss brand for crockery and kitchen aids. Dust explosions can easily occur if the temperature rises above a certain threshold, which in the worst-case scenario can lead to significant fire damage and production outages. Initiated by ITES GmbH, MOBOTIX and Hekatron Brandschutz teamed up in a joint project to deliver 360° protection against this risk for Kuhn Rikon. MOBOTIX thermal imaging cameras are connected to the fire alarm & extinguisher control centre Integral IP by Hekatron Brandschutz. The cameras monitor the production process for critical temperatures and intervene autonomously in the production process. Not only does the system trigger an alarm in the case of possible overheating, it automatically stops the production machine and starts the extinguishing process where necessary. Requirement of reliable fire protection system In June 2015, overheated polishing plates caused a dust explosion at the Kuhn Rikon main facility in Rikon in the Töss Valley of Switzerland, precipitating a devastating fire that destroyed the production system and parts of the factory building. Together with the associated production outage, the total damages amounted to CHF 5.2 million (€4.6 million). The production outage alone cost the company CHF 1.4 million (€1.2 million). "Luckily no-one was hurt, but the incident made us drastically aware that we urgently require reliable protection of our production processes that exceed the scope of normal fire protection," explains Paul Brunschwiler, production technician at Kuhn Rikon AG. The M16 thermal cameras by MOBOTIX offer outstanding image resolution and enable precise monitoring of all danger zones M16 thermal cameras for precise monitoring Project manager Mathias Stauffacher provided the convincing proposal of connecting the thermal cameras M16 Thermal by MOBOTIX with a fire alarm & extinguishing control centre by the firm Hekatron Brandschutz. The M16 thermal cameras by MOBOTIX offer outstanding image resolution and enable precise monitoring of all danger zones within the Kuhn Rikon production workflow. In addition, the software package for the IP cameras allows tailored programming to suit the needs of the Swiss company. "We programmed all three escalation levels exactly: A warning for critical temperatures, production stop when the threshold is exceeded, followed by immediate initiation of the extinguishing process after the production shutdown to prevent any spread of the fire," adds Stauffacher. Production process boosted by 5% Precise temperature measurement also allowed us to optimise our production process" "The compatibility with MOBOTIX and Hekatron Brandschutz, as well as the user-friendly and low-maintenance system, convinced us 100 percent. Continuous, precise temperature measurement also allowed us to optimise our production process to ensure that we always operate at the ideal temperature and largely prevent any production errors. Overall, we managed to optimise our production process by around 5 percent and in doing so, make the general working atmosphere more pleasant for our employees," reports Paul Brunschwiler. "ITES GmbH is an expert for innovative fire protection and safety technology: Our competency and experience enable us to develop and implement tailored, state-of-the-art solutions for our customers. Our holistic approach offers our customers crucial added functionality," says Alexander Iglhaut, ITES Director of Safety Technology. Smart hard and software solution "MOBOTIX and Hekatron Brandschutz have very similar DNA. Both our companies develop their technology and also manufacture their products in Germany. The clear focus on premium quality hardware, software and services is confirmed in the successful results of projects like this one," emphasizes Christian Heller, Sales Director DACH at MOBOTIX AG. "The Kuhn Rikon project highlights the importance of a smart hard and software solution for fire protection and production optimisation. Our intelligent safety systems make major contributions in other sectors as well, among them waste management or the petroleum and gas industries," says Heller. The MOBOTIX thermal image camera is connected to the fire alarm and extinguishing control centre Integral IP, as well as the smart fire management system Fire protection for technical systems "The incident at Kuhn Rikon plainly shows that fire protection for technical systems is extremely important as a 'life-insurance policy' for the company. Here, protecting the employees and the company's output go hand in hand," stresses Daniel Triebswetter, specialist for extinguishing system control at Hekatron Brandschutz. "The solution for Kuhn Rikon catches the eye with its simple connection of the MOBOTIX thermal image camera to the fire alarm & extinguishing control centre Integral IP, as well as the smart fire management system – from production stoppage to triggering the extinguishing system."
An integrated security system that includes new IP cameras and two-way audio technology has seen the rate of injuries as a result of attacks on Post Office staff decline by 36% in just three years. This follows the deployment of a sophisticated monitoring and intelligent threat detection platform from Morphean, a Video Surveillance-as-a-Service (VSaaS) innovator, which has not only helped to keep staff safe but has also protected ATMs from attack, helping to keep Post Office doors open. Post Office is responsible for the safety and well-being of 14,500 workers in 11,600 branches. The very nature of their combined service offering and the fact they are often located in rural areas, means branches are prime targets for thieves. Threat intelligence Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon. In rural communities, attacks on equipment can leave branches out of operation for long periods. In the last year alone, there were 13,437 violent attacks on convenience store workers, 27% of which involved a weapon and 39% led to injury, according to The Association of Convenience Stores (ACS) annual Crime Report. The Post Office security team wanted to build on its existing threat intelligence and response system, Grapevine, with a network of IP cameras and two-way audio into branches. Axis Communications cameras, microphones and speakers, connected to the Morphean Platform and hosted in the cloud, were installed in pilot branches by Kings Secure Technologies. Security automation Now that trial implementations have been completed successfully, the security team plans to expand coverage rapidly. In addition to the cameras, the networked speakers enable control centre staff to speak directly to customers and suspected criminals, alerting them to the fact they are under surveillance. The solution is also optimised to use low bandwidth dataFurther integrations are under way to bring security automation to other branches, such as providing the ability for remote agents to lock on-site safes in the event of an attack. Because of the challenges around connectivity in the areas where the most vulnerable branches are situated, the solution is also optimised to use low bandwidth data and is capable of streaming video over a 3G mobile network. Built-in intelligence The built-in intelligence of the Morphean Platform means staff are able to monitor footage for suspicious behaviour, such as individuals loitering near an ATM, and issue an alert to security teams who can then decide on the appropriate course of action. If it’s someone trying to find their wallet, no action is taken; if a crime is in progress, police will be notified along with video footage. In addition, staff are able to trigger an alert manually using an under-the-counter activation button, which can be investigated immediately by control centre staff at the alarm receiving centre (ARC). “The safety of our staff is our number one priority,” says Physical Security Manager for Post Office, Mark Dinsdale. Make significant differences Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end" “We’ll never completely eliminate crime in our branches, but we are also not powerless against it and we are able to make significant differences to the safety of our people, as demonstrated by the new technology we are deploying.” “Post Officers, particularly those in remote areas without access to a nearby police station, value the easy access to help and now report feeling much safer at work,” he concludes. Paul Ottley, Account Director at Kings Secure Technologies, says there are more subtle benefits to the Morphean Platform. “Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end. This means that even if criminals attempt to destroy cameras or on-site storage appliances, recordings of any incidents are secured in a manner that is admissible as evidence. This eliminates the challenge of sending out an engineer to collect footage. It’s a simple solution that is flexible and fully compliant with regulations such as the GDPR.”
Milestone Systems, an open platform company for IP video management software (VMS), has announced a collaboration with NMS Security, SpotterRF, Canon, Dell, Utah's Hogle Zoo, and Polar Bears International to implement a unique video surveillance solution that helps the city of Churchill, Manitoba, to keep citizens, sightseers and polar bears at a safe distance from each other. Every year, nearly 10,000 tourists pour into this small town of 1,000 to view the polar bears that migrate along the shores of Hudson Bay. The impact of modern climate change is forcing many polar bears to wander into populated areas in search of food. With more than 300 polar bear response calls made in 2016, city managers and conservationists alike were looking for a way to use technology to safely manage the situation. "At Polar Bears International, part of our mission is to be involved with helping to prevent conflicts between polar bears and humans," said BJ Kirschhoffer, Director of Field Operations, Polar Bears International.The system does a great job of tracking polar bear movement and giving workers enough of a warning to pack up and get out Intrusion detection radar Milestone’s partner firm, NMS Security from Anchorage, Alaska, already had experience with protecting oil pipeline employees from with polar bears. They worked with SpotterRF to deploy and fine-tune the use of an innovative intrusion detection radar system as a solution at Churchill. “The system does a great job of tracking polar bear movement and giving workers enough of a warning to pack up and get out," said Ed Knoch, Director of Security Technology Solutions, NMS Security. "We’ve been doing this in Alaska for a few years now, and we've gotten really good at it." Polar bear warning alarm A Canon VB-R10VE vandal-resistant, outdoor PTZ dome camera and two SpotterRF radar units were installed. A Dell server runs the Milestone VMS platform with the Spotter XProtect plug-in interface installed. The radar units provide warnings at about 200 meters out from the shoreline, giving people enough time to get into the community centre and away from a bear. When a bear is detected, the system is triggered to automatically send out email alerts and sound a bear warning alarm throughout the community. Through the Milestone Mobile client application, the system can send notifications directly to the bear alert system and to wildlife officers, so they can see the radar screen and camera views on their smartphones. "We're very happy with all the elements of the project. The radar units, the camera, the Milestone video management software, everything is working well," said Kirschhoffer. "NMS Security did a fantastic job of getting us set up. All the pieces are pretty complex, and it's important to have a partner like that when doing these projects."As conservationists, we need to look at different strategies to help people and wildlife coexist Camera-radar surveillance With the camera/radar system up and running and yielding positive results, there is no doubt among the team that there is great potential for Churchill and for replicating this system into more polar bear impacted communities, as well as in environments around the world where humans and wildlife come in conflict. "There are many habitats around the world where humans and wildlife are sharing the same space and competing for water and food. As conservationists, we need to look at different strategies to help people and wildlife coexist," said Liz Larsen, Director of Conservation, Utah's Hogle Zoo who also help sponsor PBI initiatives.
Senstar is pleased to announce its FiberPatrol ranging fibre optic intrusion detection system is successfully securing the perimeter of the US headquarters campus of a major international oil and gas company. FiberPatrol has been successfully up and running along the site’s 40,000 ft (7.57 mi) perimeter, consisting of three fence types and 40 gates, for several months. “Going into the project the customer was no stranger to perimeter security with various sites around the world using fence-mounted intrusion detection systems. However, the performance of the previously-installed systems was not always up to the customer’s expectations, particularly in regard to the nuisance alarm rate (NAR),” said Nancy Marshall, Executive Director of Business Development for Senstar. “With FiberPatrol, we were able to address the issue of NAR, as well as meet a number of other strict requirements. The system is working extremely well and the customer is very happy with the results.” Detect and locate intrusion attempts FiberPatrol’s advanced fibre optic technology detects and locates intrusion attempts along fences, offering the lowest NAR and highest Probability of detection (Pd) on the market. It also offers accurate location of intrusions even when there are multiple simultaneous intrusions or in the presence of non-localised environmental noise that would overwhelm the location capability of other long-range fibre optic sensors, and built-in cut immunity, meaning when set up in cut immunity configuration, it continues to provide detection on the full perimeter after a cable cut. FiberPatrol also passed the project’s mandatory penetration testing. The implementation of this project was a team effort, with Senstar working with integrator Kratos Public Safety and Security Solutions Inc. (PSS) and installer W-Industries Inc.
Round table discussion
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?