Private sector security
Quantum Corporation today announced new product lines and capabilities which significantly expand its video surveillance and physical security product portfolio. The expanded portfolio includes: A new line of network video recording servers A new line of servers for building management systems and GPU-based video analytics New capabilities for the VS-HCI Series, which the company launched in 2019 to provide hyperconverged infrastructure (HCI) for surveillance recording, video manag...
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with...
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced its plans for Security and Policing 2020, taking place at Farnborough International Exhibition and Conference Centre, from 3-5 March 2020 (Stand B19). Genetec will be displaying its suite of solutions that make up a strategic decision support centre (SDSC), with experts on hand to give attendees live demonstrations and explain how the technology can help reduce or r...
Pulse Secure, the provider of software-defined Secure Access solutions, announced a new research report that highlights improving hybrid IT, BYOD, access management and IOT security as the top priorities for UK healthcare organisations. 92% report ‘Unauthorised Data Access and Data Leakage’ has led to impactful incidents within the last 12 months. The Q1-2020 State of UK Healthcare Secure Access report by Pulse Secure surveyed more than 60 senior information security and decision-ma...
Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel...
Arc Monitoring will share their range of services at Security TWENTY 20 Birmingham. Set in the central location of the Hilton Metropole NEC in Birmingham on Thursday, 20th February 2020, the Conference will bring together top security industry speakers and is supported by a large exhibition of cutting-edge security products and services. Doors open at 8.30am allowing access to the exhibition with the conference running between 10.00am and 1.30pm. The exhibition will close at 3.30 pm. Lon...
Counter Terror Expo (CTX), UK’s networking event for security professionals from industry, infrastructure, government and policing, has released its inaugural Counter Terror Industry Survey report, summarising the conclusions of the counter-terror survey conducted by the CTX team in November 2019. The report compiles findings obtained from public and private sector security professionals on the current state of counter-terrorism in the UK. Issues facing the counter-terror industry Survey respondents from police and law enforcement, ambulance, fire and rescue, military and industry were asked questions across a range of issues facing the counter-terror industry. Issues addressed include how successful respondents feel that UK stakeholders are in countering terrorist threats; levels of concern regarding the threat from state and non-state actors; awareness of government counter-terror strategies and their effectiveness; and preparedness levels for attacks among the UK government, business and industry. In the UK we face an evolving terror threat which is changing beyond expectations" The report’s findings provide insight into the views of security professionals, and offer an opportunity for all stakeholders to further understand the current perceptions of counter-terrorism issues, and where partnerships need to focus their efforts. Evolving terror threat “In the UK we face an evolving terror threat which, as the tragic events of 2017 illustrated, is changing beyond expectations,” Scott Fyfe Wilson, Director Crisis Management Solutions (Formerly, National Co-ordinator Protect and Prepare, National Counter Terrorism Policing), commented in the report foreword. “It involves more individuals, including the vulnerable and volatile, in less coherent, more atomised structures connected across the world.” “This larger scale operation utilises ever more simplistic tactics to attack increasingly soft targets. Although the UK threat level has recently been lowered from “Severe” to “Substantial”, the risk of a terrorist attack remains high. We can only keep our communities safe by working together. A change of mindset is underway: protecting our communities is not a task only for the police, it’s one for all to embrace, businesses, security professionals and the general public.”
New ways to identify fake security devices on banknotes, passports and other secured documents will be at the heart of the Optical Document Security conference for central banks, ID issuers and authorities, banknote and ID printers / integrators and secure document component suppliers. The Optical Document Security conference, which takes place in San Francisco, California (January 29 – 31, 2020), will provide insight and guidance for everyone involved in improving the specification, design, production and examination of security documents. Optical document security features The 2020 event will focus on the latest innovations in optical document security features. Among the topics will be caustic optics, asymmetric microstructures and plasmonic technologies from international industry leaders. This well-established and respected conference takes place as the transition from the physical to the digital world gathers pace, so it brings together the best aspects of each being used to secure personally sensitive and financial information. Only people with a legitimate interest in the topic will be accepted for it The Short Course which precedes the conference has forensic examiners from Interpol and the US Department of Homeland Security explaining how they set about examining documents and detection and the trends they are seeing in fraudulent optical features. Given the sensitive nature of this course, only people with a legitimate interest in the topic will be accepted for it. Anti-counterfeiting strategies Sessions will examine human factors and design in optical document security, novel materials, production methods and the rapid adoption of smartphone technology in anti-counterfeiting strategies. The conference, organised by Reconnaissance International, an authoritative source on secured documents, is for people in the public and private sectors involved with the design, production or examination of government issued security documents including financial, tax and ID documents. An essential part of the conference is the exhibition of novel optical security features which takes place during the conference dinner. This allows participants to examine and learn more about items covered in the conference papers. Smartphone recognition The conference comes as a timely opportunity to engage in the debate and examine the most pressing issues" Conference director Dr Mark Deakes, of Reconnaissance International, said, “We are living through a watershed period in how we manage what must be secure documents and secure information. So, the conference comes as a timely opportunity to engage in the debate and examine the most pressing issues, particularly as the co-existence between the physical and the digital worlds gathers pace.” There will be papers from SICPA on caustic optics, OVD Kinegram on asymmetric microstructures and SURYS on its latest plasmonic features. Plasmonics also features in papers from OpSec and Shanghai Jiao Tong University, a newcomer to ODS. Conference newcomers PulseTech Security, Demax and Polytechnique Montreal will present on reflection holograms with QR codes for smartphone recognition, plasmonic colour control for smartphone verification, and electrochromic materials respectively. Central banks are also on the agenda - a paper from the European Central Bank will focus on analysing fake Euro holograms while the Bank of Canada will report on its work on perception studies.
Iris ID, a provider of iris recognition technology, announced the integration of its handheld iCAM M300 multimode platform for biometric enrolment and verification with the FBI-certified Sherlock fingerprint scanner from Spartanburg, S.C.-based Integrated Biometrics (“IB”). The fingerprint reader snaps on to the iCAM M300 to create one lightweight portable unit for field use. Sherlock is certified by the FBI as a FAP 45 fingerprint scanner having met the bureau’s stringent image quality conditions in virtually any environment, including indirect or direct sunlight, dusty conditions and with dry or dirty fingers. The unit can simultaneously scan up to two fingerprints and run for hours connected to the iCAM M300. iCAM M300 Iris ID’s Android-based iCAM M300 is designed for field use in law enforcement, access control, national ID programs, border control and time and attendance situations. The unit’s embedded cameras capture both iris and facial modes. Also included are magstripe and contactless card support, as well as an MRZ reader to verify ePassports. Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, 4G LTE and more. The combination of the iCAM M300 and Sherlock provides an ideal portable identity enrolment and verification solution “IB is extremely pleased for the Sherlock to be chosen for integration into such a cutting-edge mobile multi-modal identification device,” said David Gerulski, executive vice president of Integrated Biometrics. “Our lightweight, low-power devices, based on IB’s patented Light Emitting Sensor film, are enabling a completely new approach to identification for police, border authorities and more.” Portable identity enrolment and verification solution Mohammed Murad, vice president global sales and business development, Iris ID, said the combination of the iCAM M300 and Sherlock provides an ideal portable identity enrolment and verification solution for both public and commercial organisations. “Equipped with Sherlock, the iCAM M300 offers access to the three leading modes of biometric authentication; iris, fingerprint and facial, in a lightweight unit that performs virtually anywhere,” he said. “Sherlock integration is a tremendous enhancement to the growing Iris ID line of biometric authentication solutions.” The Security Industry Association named the iCAM M300 the 2018 New Product Showcase award winner for best mobile app.
The Security Industry Association (SIA), the trade association representing more than 1,000 companies and organisations developing and delivering security solutions, thanks the National Institute of Standards and Technology (NIST) for its thoughtful and diligent work producing a report evaluating the performance of current facial recognition technology across demographic groups. Facial recognition is a fast-advancing technology in a constant cycle of improvements and is widely adopted across the public and private sectors. Reports from non-biased organisations like NIST are immensely valuable. SIA commends NIST for encouraging research organisations to examine this issue comprehensively, rather than publish incomplete research in order to generate attention. Benefits for homeland security Demographic differentials are lessening due to high-performing algorithms producing fewer errors Facial recognition solutions offer tremendous benefits for homeland security and public safety applications, and the clear advantages of this technology necessitate that steady improvements be made and documented to ensure that the public can trust this technology’s public benefits. The NIST report found that demographic differentials are lessening due to many of the high-performing algorithms producing fewer errors. The report also emphasised that many facial recognition use scenarios require trained humans to remain integral to the process. Whether in an investigation of a potential crime or identifying an individual at a port of entry, SIA believes trained personnel are critical to the successful deployment of this technology. Facial recognition processing algorithms In light of the NIST report, SIA encourages its members and all facial recognition technology companies to strive to eliminate bias from within facial recognition processing algorithms, and SIA encourages such firms to enlist diverse data sets when testing their algorithms. “The NIST study provides clear data that can help shape advances in facial recognition,” said Don Erickson, CEO of SIA. “SIA encourages collaborative efforts by member companies and involving key stakeholders with the goal of improving facial recognition algorithms and eliminating significant accuracy variation or potential bias. Our members look forward to a strong continued working relationship with NIST and its scientists as these technologies improve and go even further in protecting human lives.”
Videonetics, the visual computing platform development company, announces a technology partnership with Solus, a developer and manufacturer of security/ access control solutions. The seamless integration between Videonetics Intelligent VMS with iSolus access control enables operator to gain end-to-end control over the physical access points through one centralised interface with real-time monitoring and video verification. The comprehensive integration allows customers to respond to incidents by visually verifying the identity of individuals requesting access. Capturing video-based evidence Intrusion events and alarms tagged with video will help reduce false alarms and their associated costs Moreover, intrusion events and alarms tagged with video will help reduce false alarms and their associated costs, while increasing the overall efficiency of security teams. Best-suited for small to large enterprises, the integration has highly intuitive GUI to accommodate multiple access points. By capturing video-based evidence along with access control records, customer can take more thorough and informed decision on any incident. “We are glad to be on board with Solus as a technology partner. I am sure that our IVMS integration with iSolus access will help our partners to design highly efficient surveillance solutions for both public and private sectors across the world.” Increasing security and situational awareness “With this integration, our customers can combine access control and video into a powerful, effective and intelligent solution that increases both security and situational awareness”, said Avinash J. Trivedi, VP – Business Development of Videonetics. “We are delighted to have Videonetics as Solus' technology partner. We are confident that the IVMS integration with iSOLUS access control systems will immensely assist Solus customers to accomplish an exemplary surveillance solution. With this integration, Solus customers can combine access control and video to achieve a completely integrated solution that gives a quantum leap to their security” said Bharath JP, VP – Sales & Marketing at SOLUS.
Rapiscan Systems, a global supplier of security inspection technology, is exhibiting at this year’s International Security Expo (Stand D30, 3-4 December, London Olympia). The company will demonstrate its security and screening technology excellence with its products and solutions for the aviation, event security, critical infrastructure and law enforcement sectors. Highlights on the stand include the RTT 110 Explosive Detection System, Itemiser 4DN Narcotics Trace Detection, the 920CT advanced cabin baggage screening system and TRS Tray Return System, some of Rapiscan’s most innovative and effective security screening solutions. Reducing delays and increasing efficiency RTT 110 Explosive Detection System (ECAC certified for highest performance standard) - Widely used by airports and air cargo screening facilities worldwide, the RTT 110 offers its customers faster, more efficient and more effective hold baggage and air cargo screening. With the belt running at 0.5m per second and the ‘Dynamic Window’ providing minimal gaps between items, the RTT 110 seeks to provide industry-leading throughput, able to exceed 1,800 bags or 2,500 parcels per hour. The portable desktop unit enables instant deployment and is ideal for use in checkpoints across customs and border High resolution 3D imaging and low false alarm levels ensure operators work with confidence and consistency, reducing delays and increasing efficiency. The RTT 110 recently obtained the exacting ECAC 3.1 performance standard, which is the highest testing standard for EDS systems in Europe. Quick analysis and results Itemiser 4DN (Enhanced narcotics and drugs trace detection) - The Itemiser 4DN is optimised for enhanced narcotics detection, with quick analysis and results in just 8 seconds. It can detect a broad range of current market threat narcotics without the use of a radioactive source, thereby eliminating the need for annual wipe tests and licensing, while reducing shipping challenges. Designed to take in trace sample swabs from packages, mail, human skin, clothing, among other items, the Itemiser 4DN ensures highly selective and sensitive detection of familiar narcotic threats, as well as synthetic cannabinoids and opioids. Fast interpretation of results, along with the ability for custom and upgradable trace libraries, enable system optimisation in the field, keeping its customers one step ahead of ever-evolving threats. The portable, ergonomic desktop unit enables instant deployment and is ideal for use in checkpoints across customs and border, prisons, critical infrastructure and law enforcement applications. State of the art technology 920CT and TRS (Ground-breaking technology meets contemporary design) - At the forefront of checkpoint security, Rapiscan’s 920CT Explosive Detection System for Cabin Baggage (EDSCB) screening solution improves passenger experience while increasing their safety. With ever-increasing global threats and new regulations being introduced, the 920CT encompasses state of the art technology, designed to meet the strictest of current and future regulations. The 920CT detects threats quickly and makes decisions based on what it sees Approved by ECAC, the 920CT allows passengers to leave their large electronics, laptops, and liquids in the bag. It provides the highest resolution 3D image, which allows exceptional On-Screen Inspection and Resolution (OSIR) for the operator, reducing the need to open and manually search bags. The 920CT detects threats quickly and makes decisions based on what it sees. Its intuitive and simple-to-use touchscreen makes inspection easier and faster. X-ray baggage scanners In addition to Rapiscan Systems’ standard X-ray baggage scanners, 920CT can easily integrate with its own security checkpoint Tray Return System (TRS), designed to allow for increased throughput, reduction in staff tray handling and the ability to increase passenger focus. The advanced and effective TRS keeps airline passengers moving swiftly through the security checkpoint, even at the world’s busiest airports. Rapiscan Systems’ products and solutions keep customers at the forefront of industry performance and technology. For more information, join the Rapiscan Systems team on stand D30 at International Security Expo 2019, 3 – 4 December.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training security officers Governments and organisations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism programme. And organisations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customised training for their members to improve their own response and business continuity plans. Mass notifications systems Whether an organisation is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centred on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organisation is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organisation is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency notification system All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organisation does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organisations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using live map tracking The benefit of using these advanced and more integrated approaches – often categorised as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organisation is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organisation’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security centre can immediately see their exact location and advise them accordingly. Supporting dispersed mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognising the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination between response agencies The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations centre can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control centre and its first responders and other team members on the ground. The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving emergency response strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organisation’s crisis management plans have been fully tested against a range of possible incident scenarios.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centres on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximising benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximising the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organisation. A panel of security leaders emphasised the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organisation being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organisation presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomised by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realising it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyse applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
As physical security systems increasingly resemble the architecture of an IT (information technology) network, the cybersecurity risks are increasing. Sometimes hacks in physical security go unrecognised because of poor detection. Here's part two of our Cybersecurity series. Going forward, the physical security industry should adopt the same principles as the information security market, embracing new elements such as risk assessment and certifications. A change in culture is needed to align and embrace cybersecurity and make necessary improvements, says Terry Gold of D6 Research. Independent testing and access control There are signs of progress. Increasingly, access control systems today are designed to be more cyber-resilient and are tested extensively to discover and address any vulnerabilities. Data capture form to appear here! For example, the latest version of Tyco’s C-Cure 9000 undergoes independent testing to discover and address any critical vulnerabilities, and new firmware and software updates are tested to ensure they do not open any ‘back doors.’ Tyco’s Cyber Protection Program is part of the company’s ‘holistic approach’ to supplying customers with quality solutions. If cybersecurity is managed properly, the new wave of access control systems are as secure as previous systems. In some cases, more secure. For example, the new generation of smart cards, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS, use protocols that are much safer than the last generation Wiegand systems. New secure protocols such as OSDP version 2 are a better alternative to Wiegand. The new wave of access control systems are more secure than previous systems and use protocols that are much safer than the last generation Protocols for wireless electronic locks Wireless electronic locks use security protocols such as encryption and authentication that prevent cybercriminals from accessing the network to get data and intercept commands. In short, the information in an IP-based access control system is at no greater risk than any other information being transmitted over the network, as long as smart decisions are made on how systems are connected and data is transmitted and stored. Standards are one approach to ensure a minimum level of cybersecurity for physical security products and systems. For example, Underwriters Laboratories (UL) seeks to work with manufacturers to up their game on cybersecurity and to certify compliance to a minimum level of cybersecurity ‘hygiene.’ Requirements for software cybersecurity The UL Cybersecurity Assurance Program (CAP) has developed the UL 2900-1 standard, which offers General Requirements for Software Cybersecurity for Network-Connectable Products. It was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/Life Safety & Security industry, was published in September 2017. Cybersecurity should be an element in physical security as the risk for data to be physically removed from a building is greater than ever Physical security integral to cybersecurity Not only should cybersecurity be an element in physical security, the reverse is also true: Physical security should be seen as integral to cybersecurity. Looking at the intersection of cybersecurity and physical security from this opposite angle uncovers a world of opportunity to make the enterprise safer. Physical risks to cybersecurity include insider and outsider threats, poor or non-existent screening, and the presence of a seemingly innocent personal item. Off-the-shelf devices such as SD cards, external hard drives, audio recorder and even smart phones can be used to transport audio, video and/or computer data into and out of a building. For the private and public sectors, the risk for data to be physically removed from a building is greater than ever, and physical security systems can protect against this vulnerability. Missed part one of our Cybersecurity series? Click here. Part three, coming soon.
VIVOTEK, the global IP surveillance provider, has deployed its IP surveillance cameras in the residential project “New Borovaya,” constructed by A-100 Development, one of the largest developers of residential and commercial real estate in Belarus. This deployment has been carried out by long-standing distributor DataStream DEP, and has successfully put into action the high-quality products and brand value of VIVOTEK. On land with a total area of more than 100 hectares, a whole district is being actively developed in line with the most modern European trends of improved urban living environments. Based on the principle of SMART and SOCIAL, the “New Borovaya” project is one of the most innovative and upscale developments in Minsk, the capital of Belarus. In order to ensure public safety and protect private property, А-100 Development pays special attention to the security of the huge residential complex. Bullet network cameras To meet the demanding requirements of the project, including high-quality imagery, reliable equipment from a global brand, excellent technical characteristics and optimal price, the distributor DataStream DEP had complete confidence in recommending VIVOTEK’s IP surveillance solutions. VIVOTEK is honoured to have this decade-long strategic partnership with A-100 Development VIVOTEK’s IB8369A and IB8367A bullet-type network cameras were selected for video surveillance of streets, playgrounds and outdoor parking, while the FD8369A-V dome type cameras were chosen for the entrances of residential buildings. A single data transmission network has been built at the facility, which unites all cameras and provides easy-access to any camera. Surveillance solutions Commenced in 2014, development of the "New Borovaya" project will last for 10 years. In the first two quarters, solutions based on VIVOTEK IP surveillance cameras were implemented, the success of which has led developer А-100 Development to proudly place VIVOTEK solutions in its marketing materials, and confidently declare the reliability of this brand during both operation and for further cooperation. VIVOTEK is honoured to have this decade-long strategic partnership with A-100 Development and looks forward to providing its latest surveillance solutions again in the near future.
Your Homes Newcastle (YHN) manages more than 26,000 properties on behalf of Newcastle City Council. They are piloting an innovative fire detection system in partnership with OpenView Security Solutions, the UK’s largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services to the public and private housing sector. MOBOTIX thermal imaging cameras have been installed in 3 multi-storey blocks across the city to continually monitor temperatures in the buildings’ bin chute rooms. The thermal cameras will send an alarm to OpenView’s central control centre and the fire service immediately if an unexpected heat pattern is detected. The early detection system provided by the OpenView now means that residents can be reassured of much faster response times from the fire service in the event of an incident, minimising the potential impact on occupants and their properties, so that they and their homes are far safer as a result. Risks and Challenges Ensuring safety of residents through early detection and prevention of potential fires To be able to react quickly to verify a fire situation Alerting the fire service within seconds of a potential fire so they can respond rapidly Keeping residents safe and minimising damage to property in the event of a fire The risk to lives and property caused by rapid spread of a fire in high-density apartment blocks Solution provided by MOBOTIX and OpenView MOBOTIX M16 thermal cameras installed in bin chute rooms of 3 YHN multi-storey blocks Thermal technology continuously monitors temperature, triggering an alarm if an unexpected heat pattern is detected Operators in OpenView’s central control room assess and monitor the situation Fire service instantly alerted ready for rapid response MOBOTIX cameras integrated into existing infrastructure with no disruption to residents Potential risk to lives and property minimised through early fire detection Installation of thermal imaging cameras YHN has installed thermal imaging cameras in 3 of its 45 multi-storey blocks across the cityYour Homes Newcastle (YHN) manages community and public housing on behalf of Newcastle City Council. Set up in 2004, the organisation oversees more than 26,000 properties for the council. With fire safety in tower blocks having been in the spotlight since the Grenfell Tower tragedy in 2017, YHN took the decision to pilot an innovative fire detection system. In a trial partnership with OpenView Security Solutions, the UK’s largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services to the public and private housing sectors, YHN has installed thermal imaging cameras in 3 of its 45 multi-storey blocks across the city. “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-storey blocks under a microscope, but we have been trialling new measures in our multi-storey properties for some time,” says David Langhorne, YHN’s Assets and Development Director. ONVIF compliant thermal cameras OpenView Security designed and installed an early fire detection system using MOBOTIX dual M16 thermal cameras, featuring one thermal and one optical sensor. MOBOTIX thermal sensors measure minute differences in mid-wavelength infrared radiation emitted from an object or body based on its temperature, allowing them to pick up temperature differences of 0.05 of a degree within a temperature range of -40 to +550 degrees Celsius. The ONVIF compliant MOBOTIX cameras contain a powerful CPU that can deliver up to 3 video streams simultaneously The ONVIF compliant MOBOTIX cameras contain a powerful CPU that can deliver up to 3 video streams simultaneously and fulfil the H.264/ONVIF standard, making it easy to combine them with other systems to create unique solutions to real-world problems. By integrating the cameras into YHN’s existing infrastructure, which uses OpenView installed equipment, it was possible to implement the new system without any disruption to residents. Alerts central control room in case of fire Operators are able to monitor images from the thermal lens to pinpoint the exact location of hotspotsThe MOBOTIX M16 cameras were installed in bin chute rooms, where they continually monitor the temperature, sending an alert to the OpenView’s central control room instantly if an unexpected heat pattern is detected. Operators are then able to monitor images from the thermal lens to pinpoint the exact location of hotspots, such as smouldering fires, as well verify the situation via a live feed from the optical lens. An alarm is also raised with the fire service within seconds of a potential fire, making them ready to respond rapidly to a potential emergency situation. According to Andy Ward, Sales Director of OpenView Security Solutions, the innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimise the incidence of false alarms: “It now forms part of our expanding portfolio of fire and life safety solutions, which is one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sectors.” Faster response times from fire service The early detection system provided by the OpenView now means that residents can be reassured of much faster response times from the fire service in the event of an incident, minimising the potential impact on occupants and their properties, ensuring that they and their homes are far safer as a result. We have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers and bin room sprinklers"“This trial system is one of many fire safety measures currently in place in the blocks we manage across the city. We also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers and bin room sprinklers,” Langhorne explains. “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere,” he adds. Meeting requirements of integrator and end-users Frank Graham, MOBOTIX Regional Sales Manager UK & Benelux, said of the partnership with YHN and OpenView: “We are very happy to be working so closely with both YHN and OpenView in the development and provision of an innovative solution for such a serious issue. “MOBOTIX cameras have inbuilt intelligence to meet all the requirements of integrator and end-users alike and we look forward to a longstanding and fruitful partnership with both organisations moving forward.”
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components has announced that The Cathedral of Saint John the Divine, the largest Cathedral and fifth largest church building in the world, recently completed installation of a Vicon Valerus video management system to secure the Cathedral and surrounding 11.3-acre complex in Manhattan. Valerus VMS As the seat of the Episcopal Diocese of New York, the Cathedral is the site of daily religious services, community programing and social outreach. It also plays host to a busy schedule of art exhibitions, concerts, receptions, public and private events and visiting dignitaries, who have included Nelson Mandela, The Most Reverend Desmond Tutu and President Bill Clinton. The new Valerus system combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers The new Valerus system, installed by the Long Island office of ITsavvy, an IT products and technology solutions provider, combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers. The system’s wide range of cameras include models with powerful zoom that provide detailed coverage of surrounding city streets, and others chosen for their ability to perform well in the low and challenging light inside the Cathedral. Vicon IP cameras Cameras also provide coverage of the Cathedral’s’ exterior, administrative and residential buildings that support the Bishop, clergy and Diocese, a world-class textile conservation laboratory, visitor center, information booths and surrounding grounds and gardens. The Valerus system is vital for providing safety for all visitors, staff, residents and students, as well as protecting the property and its many valuable artifacts. Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents. They also document, for the police, any incidents that arise from the Cathedral’s service to the mentally ill and indigent. Live and recorded video from the Valerus system is frequently shared with NYPD and local security forces from Columbia University and other neighboring institutions. Crime prevention and incident management Keith Hinkson, Director of Security at The Cathedral of Saint John the Divine, says, “The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen. This is huge for an institution like ours. I can go from one camera to the next with no trouble whatsoever.” “Vicon is incredibly proud that a world-class institution as prestigious as The Cathedral of Saint John the Divine has entrusted its security to an end-to-end Vicon solution, including our latest Valerus software. Our participation in this project illustrates that Valerus can deliver security effectively to the most high-profile of installations,” said Bret McGowan, Vicon’s Senior V.P. of Sales and Marketing.
HID Mobile Access integration with HRMIS means management can view all staff records on one platform A government department in Malaysia sought to upgrade their access control system and integrate the new system with their internal human resource system, HRMIS. With the proliferation of smart devices in the country, the agency took advantage of the “bring your own device” (BYOD) trend by moving their access control system to an innovative mobile solution. Public service human resources This government department in Malaysia is one of Malaysia’s federal government offices. The department is responsible for the development and implementation of public service human resources in the country. Their functions include planning, development and management of all areas pertaining to human resources for the public sector, to ensure that Malaysia’s public agencies have the human capital and infrastructure to function at optimal efficiency and effectiveness. As the functions of the agency continue to expand in breadth and scope, in accordance with the demand for the public services in the country, their staff has steadily grown over the past years. And, similar to other organisations, an increase in personnel also means an increase in management challenges. Improving security with integrated access control By early 2015, this department had a total of 350 civil servants under its employ. Looking to upgrade its time and attendance system that was tied to a card-based access control system, they sought a new, innovative solution to provide a better user experience for its staff. According to the facility officer in government department of Malaysia, the old access control system had been in place since 2002, and it was a perfect time to upgrade based on current technological developments. “We’ve had a card-based access control system at our entrance for a while, one which has served us well since the requirements we had were very basic,” said the officer. “However, with new technology comes new ways for us to improve our system. It is time for us to embrace change.” Minimising security threats from lost cards Improving security was another goal this department wanted to accomplish with a new solution. With a card-based system, a misplaced access card could result in a security threat – anyone who picked up a lost card could gain access to the department. Also, due to their small form factor, the loss of cards often went unnoticed and was reported late. Thus, another requirement of the new access control system was that it had to minimise the possibility and magnitude of security threats from lost and misplaced cards. The department also wanted a solution that can be integrated into their HRMIS human resources portal The department also wanted a solution that can be integrated into their HRMIS human resources portal, so information about staff attendance and schedules could be viewed online under a unified platform. “In addition to improving the user experience, we also wanted to tie our previously siloed systems together to provide the management with better information about our staff’s time in and out of the office. This would allow us to have the complete picture of each staff member’s availability for better manpower allocation,” said this officer. HID Mobile Access control system The government department in Malaysia procured the services of Prymax Technologies Sdn Bhd, an HID Global partner that provides ICT system integration in the education, government and private sectors. After assessing HID Global’s products and solutions, they chose to deploy HID Mobile Access to enhance its access control system at their building’s entrance. The solution includes HID Mobile IDs and multiCLASS SE RP40 mobile enabled readers, as well as a VertX EVO V2000 reader interface and a network gateway controller. The deployment took less than three months. With more and more staff bringing and using their own smart devices to the office, this department embraced the BYOD trend fully through its new access control system. By deploying HID Mobile Access, the department enabled the staff to use their own mobile phones to replace cards for office access. Connected smart devices The multiCLASS SE RP40 mobile enabled card readers support Bluetooth and work with both iOS and Android devices, as well as a range of credential technologies. The readers are connected to the VertX EVO V2000 controller via a TCP/IP network wired with CAT6 cabling to processes all access control decisions in real-time. At the entrance, the staff member can conveniently tap their mobile device to the reader or use HID Global’s patented “Twist and Go” gesture technology, an option configurable by department’s IT staff. "The HID Mobile Access solution provides and exceeds the level of security we were looking for, while improving the convenience of our staff" The users’ HID Mobile IDs and access rights are provisioned over-the-air to end-user mobile devices via the intuitive HID Mobile Access Portal administration, and can be revoked remotely by the administrators in case the devices are lost or stolen. HID Mobile Access also communicates with their HRMIS portal and relays staff attendance data to the server. Their staff can now view and remark on attendance, as well as send records online through the portal. Integrated resource management solution “The majority of our staff welcomes the change, citing the convenience of using their own mobile phones to check in at work is a great improvement over carrying yet another card for this purpose. From the management perspective, using mobile devices to verify a staff member’s attendance ensures that we are getting the real attendance records, as it completely eliminates card skimming. Also, since reporting is done on a browser, the administrators can generate reports easily at any time,” said the facility officer. HID Mobile Access integration with HRMIS also means that management can view of all staff records on one platform, streamlining the evaluation and allocation of personnel for projects. This also provides management with unprecedented insights into staff productivity to identify highly productive workers. “Like any other government agency around the world, we take security very seriously. Hence, any solution we deploy has to fulfill a stringent set of requirements. The HID Mobile Access solution not only provides and exceeds the level of security we were looking for, but it also does so while improving the convenience of our staff members. We are very pleased with the results of this project,” said the officer.
The IVX, Inc. is a revolutionary technology startup founded by industry veterans from Cisco, Jupiter and Motorola. The company is dedicated to providing innovative, high performance, fully integrated solutions for the public safety sector that effectively manage collaboration among multiple agencies and improve crisis management response time. The IVX enables real-time surveillance data collection, synchronisation and collaboration across the private and public safety sectors. Public safety challenge In the wake of recent mass shootings and terror attacks on high profile cities, public safety is once again at the top of the agenda. The growing number of higher specification surveillance cameras and the huge amount of data they generate, combined with longer data retention periods and real-time response requirements, are pushing the boundaries of what traditional storage approaches can handle. With these market conditions building, The IVX set off to look for an alternative solution for video surveillance. From proprietary to open source to private and public cloud solutions, The IVX tried different approaches, but they failed to deliver the necessary performance and cost efficiency. Both NetApp and EMC solutions required expensive software licenses and would incur hardware and maintenance costs, while open source software lacked reliability, software manageability and support. Additionally, encryption and data security concerns are still inhibiting the widespread use of the public cloud for surveillance solutions. Promise solution at The IVX After testing and conducting proof of concept, The IVX concluded that Promise Technology’s purpose-built hyperconverged infrastructure – VSkyCube – was the only solution to meet all of their current needs while providing a path for the future. By using the VSky Cube software defined approach, The IVX can deploy and launch surveillance services with just a few clicks VSkyCube pre-integrates computing, storage, and networking into hyperconverged nodes, giving a pre-integrated and adaptable cluster with a unified pool of resources that can be deployed, adapted, scaled, and managed quickly and easily. It is specifically optimised for video surveillance workloads and brings the benefits of the hyper-scale datacentre to the market. By using the VSky Cube software defined approach, The IVX can deploy and launch surveillance services with just a few clicks. They also have the ability to manage, monitor, scale and adjust compute, storage and networking resources all in the same web interface with the centralised management software, VSkyView. As the number of cameras and the amount of video they capture continue to increase, the IVX can dynamically scale out to multiple PB for 24x7x365 intensive workloads without interruption, thanks to Promise’s software-defined cloud storage – VSkyStor. And, most importantly, all sensitive data is protected by RAID and RAIN. High resilience and high availability features prevent drive and server failure, making for uninterrupted video capture and access. Promise solution business benefits With 24/7 support from Promise Technology, The IVX has successfully delivered surveillance services through a virtual private cloud on top of VSkyCube. The IVX can now handle 250 TB of HD surveillance video data, and is enjoying a 20-40% reduction in budget that was previously going to things such as hardware and software licensing and operating costs.VSkyCube is the only enterprise-class surveillance infrastructure that delivers the highest levels of performance, resiliency and data protection, all without the cost, complexity and skills typically required by virtualised environments. Anson Chen, Vice Chairman and Co Founder of The IVX Inc. said: “VSkyCube is an advanced hyperconverged system with all of the enterprise storage features we need. It is a perfect fit for solution providers like us who need a reliable solution that can grow over time, and allow us to maximize budgets. Promise Technology delivered on everything they promised! The close collaboration and timely support from Promise’s global teams help us provide excellent service to our customers.”
SafeZone is fast, easy to implement, and alleviates the need to invest in additional physical security measures CriticalArc announced that its pioneering SafeZone personal protection and campus security system has been selected by Swansea University to boost 24/7 safety for its students and staff both on and off campus. Swansea University is the latest in a fast-growing list of UK higher education establishments to choose SafeZone, following its European launch in 2014. The university has more than 19,000 students, including many international students, studying on a range of courses from Engineering, Law and Criminology, Arts and Humanities, Science, Medical, Human and Health Science, and Business Management supported by just over 3,000 staff (includes academics). SafeZone campus security system SafeZone will be deployed at the two principal campuses, that is, the Singleton Park and the Bay Campuses, as well as 7 other sites frequented by students and staff in the Swansea Bay region, where it will offer enhanced protection for any staff and student when they are at risk or need urgent help. It will meet the need of the campus security teams to support an increasingly round-the-clock learning culture that offers safe 24/7 access to libraries, study hubs, and other facilities. A major benefit will be the creation of safe corridors between each campus, its halls of residence, and popular destinations such as the train and bus stations. Additional monitoring and response cover along these thoroughfares will offer extra protection for people walking alone late at night. SafeZone protection will also extend to designated areas off campus, for example, for individuals on field trips, research projects or international placements, anywhere in the world. Distributed command and control platform SafeZone will equip the University with a cost-effective, people-centred safety solution plus an effective distributed command and control platform for managing response and mass communication during small or large-scale emergencies. All staff and students will be able to download the free smartphone app that makes it easy for them to raise a location-based alert at the touch of a button, so eliminating potential language or communication barriers. "SafeZone will enhance our ability to respond appropriately to any event, whether it’s a call for first aid, fire alarm, or a major incident" Ideally suited to dispersed estates, SafeZone is fast and easy to implement, alleviating the need to invest in additional physical security measures such as help points. It will give Swansea University access to zero-cost, targeted mass notifications, privacy-compliant group management functionality and a host of features like lone worker check-in. These force-multiplier capabilities will significantly improve its ability to enable collaboration between security first responder and volunteers such as building wardens during critical incidents as well as improving the efficiency of everyday team operations. Integrated security strategy Darren Chalmers-Stevens, from CriticalArc said: “It is great to be working with Swansea University as our first Welsh University. The team at Swansea University share a similar vision for real time situational awareness to us and have a great vision for the solution to include collaborating with local authorities and private organisations alike for a smart city which is envisaged will lead to further safety and security initiatives that will benefit staff and students alike. We very much look forward to a close working relationship with Swansea University as an industry leader in this space.”Russ Huxtable, Head of Resilience & Business Continuity at Swansea University said: “We have implemented an integrated security strategy for our University in order to provide, as far as practicable, a secure and safe environment for those who use, study, or work at the university. We are always looking at innovative ways to further mitigate risk, enable rapid response readiness, and fulfil our duty of care. By complementing our existing health and safety measures, SafeZone will enhance our ability to respond appropriately to any event, whether it’s a call for first aid, fire alarm, or a major incident. Using SafeZone to ensure a consistent security approach across our campus locations and beyond will provide an extra level of protection to give all students and staff added peace of mind.” SafeZone went live at Swansea University in September 2016, initial reaction to the service is extremely positive matched by a strong continuous uptake for the scheme which is only expected to increase further when the new University term begins in September 2017.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Some Expert Panel Roundtable topics are more challenging than others. Occasionally a question will “stump” the panel – i.e., no one will choose to answer it. Other times, only one or two panellists will step forward to answer a question. One comment does not a “panel” make. Taken together, however, these varied comments offer their own range of insights into the evolving physical security market. Let’s look at some of these assorted Expert Panel comments over the last several months. Better to post them here than have them lost to posterity!
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
How plate reader technology increases your perimeter securityDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals