Perimeter security - Security beat

Preventing drone incidents that threaten airports

The threat of drones is a growing concern around the perimeter and in the airspace surrounding airports. According to a UK Airprox Board report, the number of times a drone endangered the safety of an aircraft in the UK airspace rose more than a third in 2018 compared to the year before. The highest-profile recent drone incident was at UK’s Gatwick Airport, where a drone sighting last December triggered a three-day shutdown of the UK’s second busiest airport, disrupted the travel p...

Learn about AI, convergence and GDPR at IFSEC 2019

Attendees strolling the exhibit hall at IFSEC International, 18-20 June, 2019, at ExCel London, will be hearing a lot about artificial intelligence, convergence and GDPR. These industry hot topics are representative of major trends in the industry, from new technologies to new ways of designing systems to new privacy requirements. The education sessions at IFSEC International will also address these timely subjects – and provide a welcome chance to sit down and consider the ‘bigger...

Affordable drone radar: how Echodyne is reinventing drone prevention

Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security ag...

High-tech drones, robots and counter-drone solutions on display at ISC West 2019

From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs and autonomous systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies be...

Artificial intelligence: why you should enable deep learning and video analytics

Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-co...

The Security Event 2019: a new security event to reconnect UK commercial security industry

There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numer...

Dispatches from GSX 2018: a smaller but successful show for visitors

The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at...

Advantages and pitfalls of electronic locking solutions

The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an in...

High-speed visitor screening systems will improve soft target security

Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough fire...

Security professionals avoid costly breaches with encrypted USB drives

A USB drive from Heathrow Airport, found on a London street in late October, contained confidential information about accessing restricted areas at the airport and security measures used to protect the Queen. The drive also contained a timetable for anti-terrorism patrols at the airport and documentation of the ultrasound system used by Heathrow security to check perimeter fences and runways for breaches. The data was not encrypted, and the London resident who found it turned it over to a newspa...

How NERC/CIP compliance is boosting US power grid security

Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. Much of the current concern about securing electrical substations in the United States originated in response to a 2013 sniper attack, us...

IFSEC 2017 Day 2: Exhibitors shift focus from products to solutions

Exhibitors at this year’s IFSEC are thinking outside the box in terms of how they communicate their value proposition and how they interface with customers. In the process, some are rethinking how big trade shows like IFSEC fit with their goals. Panasonic's approach to the 'race to the bottom' Thomas Lausten, MOBOTIX new CEO How Gallagher benefits from IFSEC without exhibiting Panasonic Systems Communications Europe Panasonic Systems Communications Europe is one of several compani...

IFSEC 2017 Day 1: Trade show highlights changing security needs in Europe

Has there ever been a better time for a security trade show in Europe? Shifting threats such as terrorism and a volatile political climate serve as reminders every day of the importance of security in our lives, and even the role of technology. IFSEC opened in London on Tuesday at the ExCeL centre, covering every aspect of security, from access control and video surveillance to home automation and perimeter security. Amid sweltering heat, attendees came to find the latest-and-greatest innovatio...

London terror attack: Are other high-profile sites at risk?

The attack on Parliament in London is another reminder that a facility's security is only as strong as its weakest point. In this case, it was a frequently used gate in New Palace Yard that was left unlocked. Known as Carriage Gates, the entrance is generally monitored by police officers. Could the weakness have led to the attack? Could the attack have been prevented (or minimised) if the gate had been bolted shut? Planned ‘complete security overhaul’ Finger pointing in the wake of...

ARA’s asymmetric sensor approach adds focus to perimeter security

Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetr...

Physical, cyber and network security enable Recovery Point’s business continuity services

What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large,...

Percepto demonstrates future of perimeter protection with autonomous drones

The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow d...

Perimeter security benefits from increasingly sophisticated and cost-effective technologies

Perimeter security has evolved in recent years from an emphasis on fences and low-cost sensors to a broader systems approach that incorporates a variety of technologies. Protech is among the companies leading the transition and positioning itself as a one-stop systems provider at the perimeter. Mergers and acquisitions In 2014, U.S.-based Protech merged with Sorhea, a French manufacturer of perimeter security systems. The combination expanded Protech’s business from one product to the a...

ASIS 2016 Day 2 highlights: New product releases, technology innovations & data

The ASIS show has not traditionally been a big forum for new product introductions -- those happen mostly at ISC West in the spring. Even so, there is plenty of technology to see at this year's show, and many exhibitors now say the products they were talking about last spring are now ready to ship. On Day Two of the show, it seems a lot of the attendees are ready, too. Video camera technology The technologies of video cameras march on, and Hanwha Techwin America has embraced the new H.265 cod...

Security concerns in run-up to U.S. Republican and Democratic National Conventions

A long and hard-fought primary season in the United States will culminate this month when the major political parties nominate their candidates officially at their national conventions in Cleveland and Philadelphia. The rancorous campaign has raised concerns about possible civil unrest associated with both conventions, but security planners say they have considered every eventuality. Beyond possible civil disturbances, there have been no credible threats made against either convention, authoriti...

New access control technologies offer flexible locking solutions for enterprise security

End users are looking to expand access control beyond its traditional role securing perimeter doors. Innovations such as wireless locks, wi-fi, power-over Ethernet (PoE) and panel-less IP architectures are yielding more flexible solutions for a larger range of locking needs both inside and at the perimeter of an enterprise. Donna Chapman, an ASSA ABLOY Integrated Solutions Specialist, notes that new technologies are increasing how many openings are secured in a building from the current 5 to 15...

ISC West day 1 sees large crowds exploring product releases, cybersecurity and security technology education

ISC West was hopping on its first day, with crowded aisles, packed booths and plenty of news to share. Much of the news consists of product announcements resulting from the rapid pace of technology development in the physical security market. It was enough to cause sensory overload. Educating integrators and end users about security technology Technology is moving so fast that it’s understandable integrators, not to mention end users, might struggle to digest it all and apply it to their...

FLIR goes beyond core thermal camera technology with DVTEL acquisition

A major industry player is getting even bigger. FLIR’s acquisition of DVTEL will make FLIR a full-spectrum security systems provider, covering the consumer, SMB, Enterprise and large infrastructure segments of the market. The acquisition of DVTEL strengthens and broadens FLIR’s Enterprise market segment, complementing the existing security product lineup by offering a new set of software-based video surveillance technologies. FLIR already has solutions at either end of the tradition...

Extending perimeter protection beyond the fence line with SpotterRF

In a layered approach to security, the outermost layer increasingly might refer to an area outside a fence line. The sooner a facility is alerted to a possible threat, the better, and when a threat reaches inside a facility’s fence, it may be too late to mitigate it. Security directors need situational awareness that extends outside the facility and provides the ability to intercept intruders before they become a threat. Zones of interest, or buffer zones, outside a facility’s fence...

Innovations at ASIS 2014 leverage camera intelligence at the edge

Video cameras were big news at the ASIS International Seminar and Exhibits in Atlanta, but the eagerly anticipated new 4K Ultra-HD cameras took a back seat to other camera innovations, including a rash of new panoramic view cameras in various flavours and types (including faster frame rates) and a renewed emphasis on cameras as intelligent system components. Samsung announced its new Open Platform program that leverages the added computing capacity of Samsung’s WiseNetIII computer chip in...

Drone attacks at U.S. prisons present new category of risk

If you had a super power, would you use it for good or evil? The question might typically be the subject of vigorous debate among third graders, but it’s also a question that comes up when you consider technology. Sometimes the benefits of technology are almost like super powers. As much as we seek to apply the powers of technology to security, there is also a criminal element that stands ready to use them with evil intent. Such is the case with drones. We have previously mentioned the po...

Drones (UAVs) for civilian/commercial aerial surveillance

Could drones be used for civilian/commercial surveillance within five years? Drone strikes in war zones are reported routinely now in the news, but unmanned aerial vehicles (UAVs) or drones are still not common in commercial and civilian applications. Commercial uses may still be several years away, but is it too soon to start thinking about the possible security applications? Currently in the United States, Congress has directed the Federal Aviation Administration to come up with a plan by Se...