Power plant security
Building on their highly popular series of integrated high-security solutions events, the CNI Security Group has announced their next event, ‘Protecting CNI Scotland – The importance of cyber-secure solutions in critical national infrastructure’. Designed for all end users, consultants and system designers in the CNI sector, the free-to-attend event will be held at Dakota Eurocentral, Motherwell, on Wednesday 19th November, between 9:30 am and 4 pm. The event will show in...
dormakaba, a global pioneer in the access solutions market, and technology company Rohde & Schwarz are expanding their partnership from the airport business area to the critical infrastructure sector. Both partners have developed a new innovative solution for people screening that will be presented at the BAU 2025 trade fair in Munich. Automated access solution The automated access solution simplifies necessary security checks and increases capacity and efficiency. The global...
OPSWAT, a global pioneer in critical infrastructure protection established in the U.S., announced its acquisition of Fend Incorporated. Fend is a pioneering data pipeline and cybersecurity company dedicated to securing operational technology (OT) against cyber threats, ransomware, and other evolving risks. Based in Arlington, Virginia, Fend is known for its expertise in protecting U.S. government agencies, utilities, oil and gas, manufacturing, and other critical industries where air-gappe...
Delta, a global pioneer in power management and a provider of IoT-based smart green solutions announced it has provided approximately 3,500 Delta M125HV PV inverters to MOVE ON Energy GmbH to power Europe's largest solar power plant, the 650MW Witznitz Solar Park. Located near Leipzig, Germany, this landmark project collectively generates enough green electricity to power 200,000 households annually, translating into a reduction in carbon emissions by over 250,000 tons each year. Robust perfor...
When production halts unexpectedly, it disrupts the entire supply chain, causing delays in product delivery and potential loss of customer trust. Financially, the costs can be substantial, including lost revenue, overtime pay for workers, and expenses for emergency repairs. Additionally, frequent downtime can damage equipment, reducing its potential lifespan and increasing maintenance costs. Thermal imaging Thermal imaging, also known as Thermography is a powerful tool for preventative mainte...
The Association of European Distribution System Operators (E.DSO), the European Energy Information Sharing and Analysis Centre (EE-ISAC), the European Network for Cyber Security (ENCS), and the European Union Agency for Cybersecurity (ENISA) hosted a public conference on power grid cybersecurity. The conference gathered approximately 200 participants in Brussels and saw the participation of senior experts from the EU Commission, the TSO and DSO communities, the EU Energy regulator, and many oth...
News
For quick, programmable power on the go, LifeSafety Power has the smart solution: the B150 Intelligent Step-Down Converter, designed for dual voltage in a single enclosure. The B150 power conversion module, aka “dual voltage with intelligence,” launched at GSX 2024 in Orlando this week and provides an economical, user-selectable voltage output for FlexPower® Unified Power Solutions®. Network connectivity module The B150 enhances power output capabilities, similarly to the B100 The B150 step-down converter offers an additional voltage in a FlexPower system by converting a higher input voltage to a lower output. Primary power for the B150 comes from a LifeSafety Power power supply, which the B150 adjusts down to a user-defined range. The B150 is jumper selectable for either a fixed 12VDC or an adjustable range between 3-18VDC at 6 amps maximum current. An on-board LED display provides real-time values for output voltage, current and input power. The B150 enhances power output capabilities, similarly to the B100. The B150 offers additional functionality in that it can be paired with the LifeSafety Power NetLink® network connectivity module for remote power management, monitoring and control through a RS485 port. For example, users can receive notifications of power fault or voltage drops and perform remote power cycling and programming through the B150 and NetLink. As integrators add new devices to their solutions, the B150 can be used to power modems, routers and other IT devices or components without increasing the size of the enclosure. It also eliminates the need for a 12V battery set in dual voltage access power systems.
Brigade Electronics has been honoured with a King’s Award for Enterprise for international trade. Brigade is one of 252 organisations nationally to be recognised with a prestigious King’s Award for Enterprise. Announced on Monday, 6th May, 2024, Brigade Electronics has been chosen for its excellence in international trade. A total of 257 awards were made with five companies being recognised for two awards. Brigade Electronics Employing 154 people in the UK, Brigade Electronics was founded in 1976 by Chris Hanson-Abbott OBE, who brought the very first reversing alarm to Europe. The company has been at the forefront of championing vehicle and plant safety ever since, pioneering new products, and developing and patenting new technology. Second King's award Philip Hanson-Abbott, Managing Director of Brigade Electronics, commented, “This is a huge honour for Brigade. We are absolutely delighted to be recognised by what is one of the most prestigious business awards in the world." He adds, "This is the second time Brigade has received this accolade, having previously been presented with the Queen’s Award for Enterprise for International Trade in 2019. To be recognised a second time is a huge achievement for our business and testament to the dedication of our team, both in the UK and our office locations across the globe." Workplace safety Brigade Electronics will receive official recognition of the award in July 2024 during a ceremony Philip Hanson-Abbott continues, "It goes without saying that road and workplace safety remains our number one priority and we remain wholly committed to producing high quality products that support drivers and save lives.” Brigade Electronics will receive official recognition of the award in July 2024 during a ceremony to be hosted by His Majesty the King at Windsor Castle. King’s Award for Enterprise The King’s Award for Enterprise, previously known as The Queen’s Award for Enterprise, was renamed last year to reflect His Majesty The King’s desire to continue the legacy of HM Queen Elizabeth II by recognising outstanding UK businesses. The award programme, currently in its 58th year, is the most prestigious business award in the country, with successful businesses able to use the esteemed King’s Award Emblem for the next five years.
Barrier1 Systems, the industry pioneer in perimeter-hardening physical security barriers, is exhibiting a variety of crash-rated vehicle barrier systems at ISC East 2023, at the Javits Center in New York City. Most notably, Barrier1 is demonstrating a selection of high-security bollards, drop arm solutions, and folding gates on the show floor, serving as a testament to its expansive range of perimeter security solutions. Security barriers “Security barriers are no longer perceived as solutions for just for high-security locations, and have moved into the mainstream for a wide range of commercial and industrial applications,” said Mark Borto, CEO, of Barrier1, adding “That is why we are featuring several examples of our crash rated security and safety barriers here at ISC East, so attendees can see firsthand how our solutions can better protect their facilities.” The following solutions are on display EntraQuick® PU 30 High-Security Folding Gate The steel folding gate and its containment system offer maximum protection against impact loads The EntraQuick® PU 30 High Security Folding Gate offers all the advantages of the EntraQuick® II gate and more. The steel folding gate and its containment system offer maximum protection against impact loads from vehicles up to the size of a pick-up truck, traveling at speeds of up to 48 km/h. which means that the EntraQuick® PU 30 can be used as a high security gate. This makes the EntraQuick® PU 30 a high-security gate ideal for high-security areas. Avenger M50 Surface Set Drop Arm Barrier The Avenger M50 Surface Set Drop Arm Barrier is a crash-rated beam barrier designed to stop a 15,000lb vehicle travelling up to 50 mph. The unique surface set design allows for a quick setup and provides the ideal anti-ram vehicle barrier solution necessary for critical infrastructure including nuclear facilities, oil and gas refineries, and other sites where installing an in-ground foundation may be problematic. Electric and manual versions are available allowing for vertical arm raise and/or horizontal rotation for opening or closing of roadway. CityProtector M40 Bollard The CityProtector M40 Bollard was inspired by the biomechanics of nature to meet the practical needs of modern city life. With a shallow foundation depth of less than 9in, the CityProtector M40 is ideal for urban installations where pipes, underground garages, and other structures run underneath the surface. Shark-tooth design The CityProtector M40 can be assembled and disassembled manually by only one person, eliminating the need for heavy machinery such as cranes or forklifts. Its unique shark-tooth design can be uniquely customised with a variety of options including the integration of benches, planters, bicycle racks, directional signage, and more for an aesthetic yet effective perimeter solution.
Aiphone, the international manufacturer of intercom, access control, and emergency communication products, announced it has opened a new office in the Tampa, Florida, USA, a further testament to the company's position as an industry pioneer and continued growth within the security industry. The new office marks Aiphone’s first location in the South, and fourth overall in North America. Aiphone currently has offices located in Cherry Hill, N.J., and Laval, QC. The corporate office is located in Redmond, Wash. New access control line The new office comes at a pivotal time for Aiphone. In early 2023, the company introduced its new access control line, expanding its portfolio of offerings beyond intercoms and emergency communication towers. The Tampa location will be used as a sales and training facility, enabling the Aiphone sales team to further extend its reach and strengthen client relationships. Better customer service "Opening this new location signifies our commitment to serving our customers better, fostering innovation, and strengthening our community ties,” said Brad Kamcheff, Marketing Manager for Aiphone Corporation. He adds, “We're excited to be closer to our clients and partners in the South, ensuring we continue to meet their evolving needs. It also serves as a convenient location to support the growing security market in Latin America." Emergency communication, intercom solutions Spencer Britenstine, Director of Sales for Aiphone, will be heading the office in Tampa Spencer Britenstine, Director of Sales for Aiphone, will be heading the office in Tampa and will be supported by a talented team of professionals. The team includes Jasen Dunn, Robert Hilt, Jessica Baker, and Daniel Esposito, all of whom share Aiphone's vision and dedication to delivering top-tier emergency communication, intercom, and access control security solutions. Applications Aiphone has been a trusted provider of reliable intercom, access control, and emergency communication towers designed to help keep people safe in a variety of settings. The company’s solutions have been deployed in numerous locations, including schools, offices, healthcare facilities, multi-tenant buildings, industrial plants, parking garages, and government buildings.
Sunstone Systems, an award-winning innovator in renewable energy and surveillance technology, is proud to announce the groundbreaking launch of the Rapid Autonomous Frontier Technology (RAFT) System. RAFT System This innovative product is set to transform the integration of smart devices, renewable power generation, and connectivity in remote and challenging environments. The RAFT System builds upon the success of Sunstone Systems' range of wireless, clean energy, remote power systems which have been deployed in some of the most extreme Oil and gas environments in the world, such as Tengiz Kazakhstan, for over 7 years, elevating its capabilities to deliver unparalleled power generation, significant CO2 savings, and adaptable deployment solutions across a wide spectrum of industries. Mission-critical power and connectivity Sunstone Systems boasts extensive experience and expertise in designing and manufacturing technologies Whether the field is telecommunications, agriculture, security, or any other sector requiring robust power and surveillance solutions, the RAFT System possesses the potential to revolutionises operations. With a proven track record of delivering advanced technologies to prominent organisations such as the Highways Agency and Network Rail in the UK and worldwide, as well as participating in the Chevron Catalyst Programme, Sunstone Systems boasts extensive experience and expertise in designing and manufacturing technologies that provide mission-critical power and connectivity precisely where user need it. Unmatched Innovation for Remote Areas The RAFT System is not just another solution; it's a revolution. Designed to excel where traditional power sources fail, this rugged and off-grid power solution uniquely integrates IoT devices, renewable energy, and connectivity, making it indispensable for extreme and hostile environments. A Versatile Powerhouse The RAFT System transcends conventional boundaries. It's not just a surveillance and security powerhouse; it's also a renewable energy hub. In locations where power sources are scarce or unreliable, the RAFT System steps in as a versatile solution, delivering clean and reliable off-grid power to a wide range of IoT devices, including: Oil & Gas Industry: Providing power for Surveillance Cameras, Gas Detection, and Communication Systems for monitoring Pipelines, Wellheads, and Refineries in remote and rugged environments. Rail Industry: Ensuring uninterrupted power for Signalling, Communications, and Safety Systems along rail lines, enhancing safety and efficiency. Highways and Infrastructure: Powering Traffic Management Systems, ANPR, and Electronic Signage for real-time updates, improving safety and traffic management. Construction Sites: Delivering clean power to Security Cameras, and Communication Systems, enabling efficient project management and site security. Security and Surveillance: Enhancing situational awareness with Surveillance Cameras, Radar Systems, and IoT Sensors for proactive security measures. Telecommunications: Ensuring clean and reliable power for Cell Towers, Remote Base Stations, and Communications Equipment, enabling uninterrupted communication services, even in remote locations. Key features and benefits Extreme Durability: The RAFT System's rugged design is built to withstand harsh conditions, making it ideal for challenging environments. QuickGrid Integration: Seamlessly integrate Sunstone's solar array, QuickGrid, for increased power capacity and energy efficiency. Centralised Control: All system control equipment is conveniently located in one cabinet, simplifying management. CO2 Savings: Incorporating a 2.4KW solar array for significant CO2e reduction. Wide Temperature Range: Operates from -40°C to +50°C. IP-Rated Protection: Guards against dust and moisture for uninterrupted operation. Renewable energy, smart devices "I am thrilled to introduce the RAFT System, an innovation that will redefine how we harness power and IoT capabilities in remote and challenging environments," said Paul Schelhaas, CEO of Sunstone Systems. "We are committed to pushing the boundaries of technology, and the RAFT System is a testament to our dedication to delivering unmatched innovation and reliability. With its unique blend of renewable energy, smart devices, and connectivity, the RAFT System is set to revolutionise multiple industries and make a significant impact on the way we operate in extreme conditions."
In response to recent growth, Bandweaver, a company providing solutions for security, fire, power, and pipelines, is delighted to welcome Marinus de Heijde to the Bandweaver team as their new Business Development Manager who brings with him 20 years of experience in the fire safety sector. As a key member of the team, Marinus will be responsible for accelerating Bandweaver’s already impressive growth by developing and executing sales strategies and building relationships with key decision-makers. He will also be working with existing customers, maintaining and developing key relationships in Europe. Author's quote Bandweaver showcasing our linear heat detection solutions to the German" Marinus joins Bandweaver from Biosite Systems Ltd, where he was the Business Development Manager (Export). In his time there, he was responsible for the sale of all fire safety products in Europe and set up exclusive distributors in The Netherlands, Belgium, Denmark and UAE whilst also selling directly and indirectly in Ireland, Sweden and Germany. Of his appointment, Marinus commented, “I am very excited about expanding Bandweaver’s presence across Europe as we believe there is a massive opportunity here, especially in the Nordic countries. I am also looking forward to exhibiting at VdS-FireSafety Cologne this December, where Bandweaver will be showcasing our linear heat detection solutions to the German fire safety market.” Prior roles of Marinus As an international sales manager with over 25 years of experience, Marinus has extensive experience in the fire safety sector with the supply of critical components to vehicle builders and fire safety companies in Europe and the Middle East. More recently, he has also ventured in the supply of fire alarm and evacuation systems through a network of international distributors. Marinus’s skill set is mainly suited to the Bandweaver’s European client base He brings with him additional experience in all aspects of exporting goods on a global basis, including logistics, marketing and budgets. Marinus’s skill set is particularly suited to the Bandweaver’s European client base as he is also fluent in English, Dutch and German as well as intermediate French. Building key relationships Richard Kluth, Managing Director of Bandweaver, says: “We couldn’t be more pleased to have Marinus join Bandweaver." "His extensive skills in the sale of fire safety products and rich experience in global sales will make him a unique and highly valuable member of our team, and we look forward to expanding our business and building key relationships with the help of Marinus’ expertise.”


Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually. Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India. Expensive AI resources Cloud systems empower customers to leverage AI without having to install and program complicated and expensive hardware, in effect stripping away the barriers to entry that customers face when seeking to embrace AI. The cloud also enables customers to share expensive AI resources. One of the key components is ease of deployment – click, click and turn on the AI for any camera" Simplicity of implementation is crucial to the combined value proposition of Eagle Eye Networks and Uncanny Vision. “One of the key components is ease of deployment – click, click and turn on the AI for any camera (in a cloud system),” says Dean Drako, Eagle Eye Networks CEO. There is also a benefit of having AI systems networked, enabling 25 banks to perform facial recognition of customers from a single cloud-based system, he adds. A transition is also under way in the perception of AI. Video surveillance applications While previously it was seen as an add-on to surveillance systems, now it is seen as a very desirable feature on any system. “Centralised management of the cloud benefits the AI database,” says Drako. “In a project built around licence plate recognition (LPR), for example, all the data goes up to the cloud into a single database, and the customer can get a mobile view of everything going on across the world. You can’t do that without the cloud. And AI for LPR is more accurate.” Uncanny Vision’s targeted focus on AI for video surveillance applications was one factor that attracted Eagle Eye Networks to make the acquisition, says Drako. In contrast, some other companies have embraced broader applications of video AI. Uncanny Vision also has more customers using their system in real-world applications than competitors. Finally, the acquisition will help to expand Eagle Eye Networks’ presence in the LPR market, where Uncanny Vision is especially strong. Improving business operations The 60 employees at Uncanny Vision are mostly engineers and programmers Uncanny Vision’s deep learning algorithms enable recognition, identification, and prediction, improving business operations, customer service, and site safety. Applications include smart parking, retail, smart cities, ATM monitoring, worker safety and perimeter security. The 60 employees at Uncanny Vision are mostly engineers and programmers. “These guys understand how to translate AI algorithms to run very efficiently on various types of hardware,” says Drako. “They optimise how they get the code to run so we can implement in the cloud cost-effectively. They do it at a modest cost to make it more accessible. They understand how to deploy software for high performance on low-cost hardware.” For Uncanny Vision, the new ownership provides more reach. “We have a huge channel and a huge brand,” says Drako. “They are strong technical guys who need a sales and solution channel.” Video analytics solutions Even in light of the acquisition, Eagle Eye Networks will continue to provide a selection of third-party AI and video analytics solutions to customers. Use of AI and video analytics is specific to the application and business needs of each customer. Use of AI and video analytics is specific to the application and business needs of each customer In addition to AI functionality, systems need a ‘business logic’ component that drives how that capability is integrated into a system. System needs vary widely by vertical market, and many third-party vendors are focused on a specific vertical and how AI can benefit that market. Recurring monthly revenue “Third parties can provide analytics and the business logic, which is different for a factory, an office building or for a drive-thru restaurant,” says Drako. “The market is looking for many solutions, and one company couldn’t own a majority of them.” To ensure flexibility, Eagle Eye Networks will accommodate third party solutions, deploy their own analytics, or leverage analytics embedded in cameras. For Eagle Eye Networks’ dealer and integrator customers, the expansion into AI presents a new opportunity for recurring monthly revenue (RMR) and provides greater value to customers. Drako says the impact of the acquisition will be global as AI applications grow in popularity worldwide.
The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal and long-term reliability, monitors the bulk power system through system awareness, operates the Electricity Information Sharing and Analysis Center (E-ISAC) and educates, trains and certifies industry personnel. Normal everyday operations of the system are the responsibility of utility owners and operators. Protecting critical infrastructure An attack by a disgruntled former employee, ideologically motivated activist, or a criminal could inflict significant damage Currently, a significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists. However – and more applicable to grid operators – we have recently seen noteworthy interest in disabling or destroying critical infrastructure. Coordinated attacks can target the grid, and an attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target,” could inflict significant damage. With an interconnected grid of over 450,000 miles of high voltage transmission lines (100 kV and higher) and over 55,000 substations (100 kV and larger), the targets of opportunity are endless. Data capture form to appear here! According to the Department of Energy, the number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year in lost output and wages, spoiled inventory, delayed production and damage to grid infrastructure. The number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year Large power transformers A large power transformer (LPT) is an enormous, custom-built piece of equipment tailored to customers’ specifications. They usually are not interchangeable with each other, and they are not produced for spare-part inventories; so if one blows, a lot of companies and homes could be without power for more than six months. They are not cheap, either. According to EEP (Electrical Engineering Portal), $10 million is a fairly average cost, but that doesn’t include transporting the gargantuan piece of equipment or installing it, which usually adds an additional 35 percent to the bill. Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. According to EEP, $10 million is a fairly average cost for a large power transformer NERC/CIP guidelines The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC/CIP) guidelines address security needs of electrical substations. Every facility has a baseline requirement for perimeter security protection around the site, although medium- and high-impact sites will have more stringent requirements. The geography surrounding sites – Is it an urban area or rural? Does the surrounding elevation provide additional lines of sight? – also impacts the types of systems they require. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities The U.S. power grid is divided into three sections: The Eastern Interconnection for states east of the Rocky Mountains, The Western Interconnection for states from the Pacific Ocean to the Rocky Mountains, and the smallest—the Texas Interconnected system—covering most of Texas. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities and they distribute power to homes and businesses, to millions of personal devices, lights, refrigeration, computers, and to other “loads,” that tap it. Inherited challenges According to the American Society of Civil Engineers (ASCE), the nation’s electric infrastructure is “nothing but a patchwork system” that has evolved wildly since the first substation was erected by Thomas Edison in 1882, on New York City’s Pearl Street. Contributing to the challenges of securing the grid are the crazily disparate ages and capacities of the grid’s equipment. There are many possible targets, too. Approximately 300 control centres around the country monitor voltage and watch the data from SCADA (supervisory control and data acquisition) systems, which are placed at transformers, generators and other critical areas. Ideally, this allows engineers to monitor the data for signs of trouble and then communicate with each other to deal with whatever is happening to the grid, but SCADA has cybersecurity issues.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-wave signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, Washington-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar technology for border surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar sensor for security applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
Case studies
In a power station, where a fire could trigger a grid shutdown affecting up to 25% of Ireland’s electricity supply, the need for early fire detection isn’t just a matter of efficiency; it’s an essential part of national stability. This reality was made starkly visible during the April 2025 blackouts in Spain and Portugal, which left millions without power, disrupted hospitals and rail systems, and sent shockwaves through Europe’s energy sector. While the root cause remains under investigation, the cascading effects of a single grid failure reignited urgent questions around energy infrastructure resilience and underscored the dangers of inadequate detection systems. Overcoming problematic failure points It provides real-time alerts, enhances engineer responsiveness, and helps future proof energy infrastructure To meet that challenge, ESB Energy, in conjunction with Butler Technologies, has deployed a cutting-edge end-to-end thermal monitoring system using FLIR technology. It provides real-time alerts, enhances engineer responsiveness, and helps futureproof energy infrastructure as it transitions to green power. On Ireland’s rugged west coast, Moneypoint Power Station, a legacy site refitted to operate as an oil-burning plant, is now setting a new benchmark for safety and resilience. With a fully integrated thermal monitoring system in place, the site is changing how critical assets are managed. Round-the-clock visibility It is delivering round-the-clock visibility, precise early fire detection, and actionable condition monitoring insights. In an energy landscape where experts now warn that grid fragility could lead to repeat scenarios of international disruption, this Irish installation offers a timely case study in how intelligent monitoring can stop local issues from becoming continental catastrophes. This installation, led by ESB and Butler using FLIR thermography, is the first of its kind within Ireland’s national grid. Its impact is already clear. It is reducing risk, protecting uptime, and laying the foundation for a more stable transition to renewable energy. It offers a working model for the next generation of energy infrastructure. From delayed responses to immediate alerts Before automation, thermal inspections at the site were entirely manual Before automation, thermal inspections at the site were entirely manual. Engineers performed weekly walkdowns using handheld cameras, often capturing images and compiling reports long after any anomalies may have occurred. This meant that critical alerts were delayed, and fire risks could linger undetected for days. That’s now changed dramatically. With fixed thermal cameras continuously monitoring high-risk areas, the system now delivers sub-second response times, providing automated alerts the moment abnormal temperatures appear. In safety-critical environments, such as turbine halls or substations, this swiftness can be the difference between a routine fix and a grid-threatening event. Iberian Peninsula outages In light of the Iberian Peninsula outages, where a single transmission fault reportedly triggered widespread failures, this kind of proactive defence isn’t just prudent, it’s essential. In fact, the solution has already helped demonstrate the capability to initiate plant shutdowns within 15 seconds of fire detection- a key requirement for preventing cascade failures that could disrupt almost half of Ireland’s grid, for which it offers a critical redundancy to bolster the system’s capacity when it is overworked, overloaded or simply undergoing necessary maintenance. Condition monitoring without the guesswork Beyond fire detection, the system provides always-on insight into asset health Beyond fire detection, the system provides always-on insight into asset health. Cameras monitor components such as transformers, cabling, and valve actuators, which detect changes in heat signatures that may signal wear, stress, or failure risk. With over 16,000 reference points per image, these thermal feeds offer far more granular data than traditional sensors or manual inspections. Engineers on-site no longer need to rely on scheduled walkarounds or visual estimates. Instead, they receive real-time alerts, thermal imagery, and exact location data; enabling fast, informed decisions without needing to interpret temperature deltas by eye. More cameras ordered In fact, the site has now ordered more cameras to build into the success of this new system and with the learning that has come from the project, it has pushed Butler Technologies to develop a new application for ESB Energy shift managers to receive push notifications via SMS, email and though the app - for seamless cross-platform monitoring. As John Free, Senior Account Manager at Butler Technologies described it, the shift is not about usurping skilled labourers, but instead focused on enhancing it: “This isn’t about replacing engineers. It’s about empowering them. With fewer hands on deck, this system becomes an extra set of eyes they can trust.” An integrated and intuitive industry first One of the strongest advantages of the system lies in its end-to-end design One of the strongest advantages of the system lies in its end-to-end design. Thermal imaging, back-end software, and user interface were all deployed as a unified solution, enabling a seamless integration into the site’s existing video management system. Alarms are instantly visible through the centralised platform. If triggered, thermal zones automatically expand onscreen, directing operators precisely where to look and act. Critically, thanks to the fully native architecture, there’s no third-party hardware to maintain or troubleshoot. The system features the FLIR A500f and A70 thermal imaging cameras, with plans to scale to newer devices like the FLIR A700f and FLIR A700f PT as the station prepares to onboard next-generation infrastructure, including cloud-based monitoring and AI-driven anomaly detection. Future proof The system is already supporting exploratory work on advanced AI applications While the station continues to operate as an oil-fired facility for now, it also serves as the national test site for upcoming renewable energy initiatives, which include offshore wind. That future-facing mission required a monitoring solution that could evolve alongside it and better fit with Ireland’s largely green energy grid. The system is already supporting exploratory work on advanced AI applications, which include using visual monitoring to confirm valve positions or track operational trends across thermal patterns. These insights could help pave the way for predictive maintenance, remote inspections, and safer operations at scale. Choosing FLIR technology An ESB Project Engineer said: "We chose FLIR technology because it provides the real-time precision and scalability needed to safeguard critical infrastructure.” “In an industry where uptime is everything, FLIR’s thermal imaging offers the level of early detection and monitoring we require to protect both our assets and the national grid." Immediate gains for Ireland’s grid Projects like this demonstrate how thermal automation can deliver immediate gains in safety As national grids face increasing pressure to modernise, projects like this demonstrate how thermal automation can deliver immediate gains in safety and reliability, all while laying the groundwork for smarter, greener energy systems. This station is the first in Ireland to implement such a comprehensive monitoring solution and one of the first in Europe to tie it directly into future renewable operations. It’s a powerful showcase for how thermal vision, when done right, can go far beyond temperature; it protects assets, accelerates response times, and helps keep the lights on for everyone. Early Fire Detection systems ESB Energy has plans to further hone the use of Early Fire Detection systems ESB Energy has plans to further hone the use of Early Fire Detection systems, like those which FLIR specialises in creating. The system in place at Moneypoint Power Station has become a huge talking point within the organisation, which has led Butler Technologies to a new lead monitoring substations with similar builds. This application is to monitor connection points in the substation and identify failures; a critical trial for ESB to see the use cases of the system within substations and, if successful, has the potential to be rolled out to over 500 substations in Ireland.
In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfilment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organisations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorised employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalised key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.
Honeywell has been selected as the building automation provider for LG Energy Solution’s cylindrical EV battery manufacturing facility being built in Queen Creek, near Phoenix, Arizona. Set for completion in 2026, this state-of-the-art project represents a critical milestone in LG Energy Solution’s strategy to lead EV battery innovation in North America, and it also supports Honeywell’s alignment of its portfolio to three compelling megatrends, including automation and the energy transition. New standard for operational efficiency Deployment of Honeywell’s building automation technologies at the Queen Creek facility Global battery demand is projected to quadruple by 2030 according to Bain, and the deployment of Honeywell’s building automation technologies at the Queen Creek facility will help set a new standard for operational efficiency in high-tech manufacturing environments. This 1.3-million-square-foot standalone facility will integrate a suite of Honeywell technologies to help optimise performance, enhance safety and support sustainability outcomes. Future of automation “By developing and delivering solutions that blend cutting-edge technology and energy management, we are driving the future of automation," said Billal Hammoud, president and CEO of Honeywell Building Automation. "Honeywell’s collaboration with LG Energy Solution demonstrates how advanced building automation can help empower companies to achieve operational excellence in their facilities while also accelerating the shift to a more secure energy future.” Honeywell’s innovative solutions Honeywell’s innovative solutions will provide the Queen Creek facility with the following: Unified Systems Integration: Honeywell’s Enterprise Buildings Integrator platform will help enable seamless control of building management and safety systems via integration into Honeywell Forge, which provides advanced monitoring and analytics. Honeywell Forge, an IoT platform, enables condition-based maintenance to improve the resiliency of critical systems around the clock, helping to reduce unplanned reactive work and help lower energy costs. Its machine learning capabilities will continuously study a building's energy consumption patterns, which will enable LG Energy Solution to automatically adjust the facility to optimal energy-saving settings. Comprehensive Fire and Safety Solutions: Honeywell’s VESDA smoke detection and advanced self-testing fire alarm system offers automated and continuous air sampling enabling early warning of an impending fire hazard, often even before heavy smoke or flames are detected. VESDA and the networked fire alarm solution will be integrated into the facility’s building management system to allow coordinated and near-instant responses from the HVAC system if smoke is detected. Mission Critical Control and Advanced Cybersecurity: The QronoX Programmable Logic Controller will enable LG Energy Solution to enhance operational performance and resilience by providing advanced cybersecurity for its facility. The Honeywell technology will also help ensure asset security and compliance while reducing downtime for critical systems. Honeywell’s scalable solutions are designed to support the future expansion of the project as well, reinforcing its role as a key collaborator in this transformative industrial sector.
Founded in 2020 by a team of energy professionals in Milan, Sunprime is a fast-growing independent renewable energy producer that develops sustainable photovoltaic plants across Italy. Their focus is mainly commercial and industrial (C&I) segment, ground-mounted systems on industrial land and industrial electricity storage systems. Challenges With global initiatives toward green sustainability and carbon neutrality, the demand for photovoltaic power generation construction is growing rapidly. Sunprime's project pipeline currently consists of several projects, many of which are located in very remote and often unattended areas (e.g., Maleo, Lodi Province), making it vulnerable to thieves that steal valuable cables and panels. Securing the vast area of photovoltaic plants requires a comprehensive surveillance system that can monitor the site at all times. Solution Dahua and Sunprime enabled the project team to come up with an effective design The technical and commercial partnership between Dahua and Sunprime enabled the project team to come up with an effective design, implement cutting-edge technologies and pay great attention to the positioning of the cameras. In order to safeguard one of the client’s solar power plants covering approximately 70,000 m2, more than 1,500 hybrid cameras (thermal cameras + traditional cameras) equipped with AI algorithms were deployed around the area, actively monitoring for potential intrusion 24/7. These state-of-the-art Dahua products can stably operate even under harsh weather conditions, making them ideal for outdoor applications. They are equipped with advanced AI algorithms capable of generating accurate alarms while filtering out false positives, which makes monitoring more efficient and more convenient for the client. Dahua AirShield wireless alarm system In addition, through fibre optics, the video steam from the cameras are sent to the technical rooms in the solar park via Dahua’s industrial switches. The signals are then managed by another row of switches and finally transmitted to high-resolution recorders. The Dahua AirShield wireless alarm system was also installed in each technical room in the park, providing another level of protection for the central equipment. What’s more, all the systems of Sunprime’s solar parks are now centralised through local routers thanks to the Dahua DSS management software installed in the surveillance operations centre. Results Dahua has assisted Sunprime from pre-sale stage to the implementation of the products Sunprime’s solar power plant has witnessed how Dahua’s thermal perimeter protection solution can be utilised to safeguard its property and assets located in remote and secluded areas. In addition to early business communication, Dahua has assisted Sunprime from pre-sale stage to the implementation of the products, with plans and designs based on the actual needs of the customer. The high-quality service offered by Dahua has gained praised from the client. Dahua secured new projects “The implementation of this type of systems was made possible thanks to the support of the Dahua projects department, which assisted us from the pre-sale stage up to the implementation of the products,” says Mr. Michele Vianello, Asset Manager at Sunprime. “I take this opportunity to once again thank them for their support throughout the entire project,” he added. After the successful completion of this project on the first site, Dahua has secured new projects for another 80 sites with approximately 20 thermal imaging cameras for each site, generating a total supply of 1,600 thermal imaging cameras.
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Ipsotek, an Eviden Business at Atos Group, has announced that it was appointed to provide its AI video analytics technology at the soon-to-be-opened new Midfield Terminal Building at Abu Dhabi International Airport, in Abu Dhabi, UAE. Delivered in partnership with Atlas Security, deployment of Ipsotek’s AI video analytics solutions is anticipated to improve operations, security, and safety across various areas of the Midfield Terminal Building, which is renowned for its iconic architecture and recently gained international attention as a filming location for Mission: Impossible - Dead Reckoning Part One. Advanced surveillance capabilities Ipsotek's AI video analytics technology is well-equipped to address these circumstances Safety and security are clearly paramount in any airport environment, and Ipsotek's AI video analytics technology is well-equipped to address these concerns. The advanced surveillance capabilities of the solution enable operators to detect and identify potential threats across various zones of the airport. By leveraging intelligent algorithms and machine learning, the system can recognise suspicious behaviours, unauthorised access attempts, or other pre-defined security risks in real time, allowing for swift response and mitigation. Ipsotek's AI video analytics By leveraging Ipsotek's cutting-edge video analytics solutions, the airport aims to enhance its security measures by effectively detecting abandoned baggage scenarios. Security teams at the airport will be able to quickly identify and respond to any unattended baggage, reducing potential security risks and ensuring a safe environment for passengers and staff. "The deployment of Ipsotek's AI video analytics solutions at the Midfield Terminal Building signifies a significant leap forward for the aviation industry," said Sophiene Marzouk, Ipsotek’s UAE Country Manager. Sophiene Marzouk adds, "We are proud to collaborate with Atlas Security to deliver state-of-the-art technology that enhances operations, security, and safety in one of the world's most iconic airport buildings." Ipsotek's solutions Ipsotek's solutions also play a crucial role in optimising queue management and crowd control “Atlas Security aspires to implement the best technology for security systems in airports and we therefore look to partner with companies bringing innovation in security applications with Artificial Analytics. One company that brings this cutting-edge technology is Ipsotek and Atlas Security is proud to work in the Midfield Terminal Building with Ipsotek,” said Khizer Rehman, Project and Technical Manager at Atlas Security. Ipsotek's solutions will also play a crucial role in optimising queue management and crowd control throughout the airport. By analysing video feeds, the software can determine queue lengths and alert airport staff to potential bottlenecks. New standards for excellence The intelligent system will empower operators to proactively manage queues, allocate resources effectively, and ensure a smooth flow of passengers. As travellers eagerly anticipate the unveiling of the Midfield Terminal Building, the deployment of Ipsotek's AI video analytics solutions is set to improve the airport experience, from safety to security and operations setting new standards for excellence in the aviation industry and turning an impossible mission into a successful deployment.


Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Products
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
