Public sector security
Allied Universal, a renowned security and facility services company in North America, announces the appointment of Robert J. Wheeler, Vice President of Aviation/Maritime Operations for Allied Universal’s National Government Services as Maritime Sector Chief at InfraGard San Diego. InfraGard is an FBI-affiliated nonprofit organisation whose mission is to mitigate criminal and terrorist threats, risks and losses for the purpose of protecting the region’s crucial infrastructure and peop...
An innovative streamlined perimeter security system, capable of stopping a 7,200 kg vehicle travelling at 50 mph, is now available to protect Critical National Infrastructure sites from vehicle ramming attacks and forced entry attempts. The StronGuard Beam is the latest development in impact-tested perimeter security from ATG Access, the world’s designer and manufacturer of road blockers, bollards and vehicle barriers. Impact and forced entry tested The new s...
Intelligent Insights is a new software tool that brings together every element from scene to screen, from intelligent cameras enabling video data capture and interpretation, to the visualisation and reporting of data in one simple overview. Using data to improve security, safety, and business decisions has become increasingly important to the market and continues to grow. Now, Bosch has introduced an affordable software solution called ‘Intelligent Insights’ that enables customers t...
STANLEY Security, a global integrator of comprehensive security solutions and an electronic security company, has announced its investment in Evolv Technology, the globally renowned company in artificial intelligence (AI)-based touchless security screening. This investment, backed by STANLEY Ventures, the venture capital arm of Stanley Black & Decker, forms a strategic partnership between the two companies. Evolv Express Evolv Express, the company’s touchless security screening syst...
Viasat Inc., a global communications company, announced the availability of its Viasat Dynamic Video Encoding (DVE) capability, a new satellite communications technology enhancement that optimises sensor data for military aircraft on Intelligence, Surveillance and Reconnaissance (ISR) missions. The new DVE capability allows aircraft to optimise their available bandwidth and video transmissions for high-speed, high-quality video feeds from the aircraft. Optimise ISR data feeds In ISR missions,...
Milipol Qatar 2020, the Middle East’s international event for Homeland Security and Civil Defence which returns to Doha this October, will feature a powerful three-day seminar program in which decision makers and security experts will outline major strategies for a safer post-COVID 19 world amongst other main foresights. The program will run alongside the 13th Milipol Qatar at the Doha International Exhibition and Convention Centre from October 26-28. Biometrics, Cybersecurity And Contac...
Allied Universal®, a security and facility services company in North America, received a letter of appreciation from the U.S. Department of Justice’s United States Marshals Service. The letter of appreciation was regarding the apprehension of Gerald Hunter, who was #1 on the Most Wanted list of the Drug Enforcement Administration’s (DEA) St. Louis Strike Force’s West Central Region. Crucial security intelligence This is due to his suspected role in the illegal trafficking of Fentanyl. Allied Universal’s security team provided crucial intelligence to the U.S. Marshals which led to the successful capture of the fugitive. With information provided by Allied Universal, Gerald Hunter was recently apprehended by the U.S. Marshalls An arrest warrant had been issued for Gerald Hunter, charging him with “conspiracy to distribute and possession with intent to distribute Fentanyl” in 2017. Hunters evaded DEA agents for several years, being described by the DEA and his con-conspirators as a ‘ghost” who was proficient in separating his name from everything he touched, often being three levels removed. Provided U.S. Marshals with the tactical advantage In concert with information provided by Allied Universal, Gerald Hunter was recently apprehended by the U.S. Marshalls at an apartment building in Los Angeles, where Allied Universal is the security service provider. Allied Universal personnel provided the U.S. Marshals with the tactical advantage they needed, allowing them to execute their plan and successfully apprehend Hunter. “This team represents Allied Universal’s Be Phenomenal™ culture which strives for excellence and connects us closer the communities in which we serve,” said Steve Jones, Chairman & CEO of Allied Universal. “The team’s dedication and commitment to safeguarding our communities, as well as the people of our nation, is extremely honourable and courageous.”
Boon Edam Inc., a global provider in security entrances and architectural revolving doors, announces the 40th anniversary of the launch of the company’s renowned Tourlock security revolving door. The demand for this reliable security entrance, first built in 1980, continues to grow as the risks to organisations due to unauthorised entry increase. The Tourlock is used in thousands of facilities worldwide including commercial campuses and government buildings due to its high level of throughput and ability to prevent unauthorised access without the need for manned supervision. In addition, the Tourlock has always been an automatic, “touchless” security solution requiring no contact from users during activation and operation, making it as relevant today as it was decades ago. Prevent unauthorised access Tailgating is the most common way intruders can slip into a secure facility. The Tourlock, by design, prevents an unauthorised user from following an authorised user in the trailing compartment. This working principle removes the burden on people to “be impolite” by refusing to hold open a swing door for a stranger. If more than one person is detected, the door will stop rotating and alarm, then slowly rotate backwards An added feature of the Tourlock is that it stops rotating in the “plus position” during a tailgating attempt. This places a “wall” between the intruder and the secure area and the intruder can only turn back and step out of the door, while the authorised user continues onward into the secure area without any interference. Preventing Piggybacking The Tourlock combines premium construction with the option to include the intelligence of a sophisticated, near-infrared detection technology housed in the ceiling, called StereoVision®. StereoVision scans each compartment during rotation to verify that a user is alone before allowing them to enter a secure facility. If more than one person is detected, the door will stop rotating and alarm, then slowly rotate backwards, forcing both users to exit the door. The technology in StereoVision has been enhanced continuously over the decades and today is able to function reliably in a wide variety of lighting environments, including outdoor lighting. Its reliable performance over the years has proven to be an extremely reliable method of preventing piggybacking into a secure area without the excessive false rejections. Add-Ons for Increased Security Tourlock includes an integrated, IP-enabled software platform called BoonConnect that helps technicians diagnose the door For added security, the Tourlock security door on a building envelope can be outfitted with Level 3 bullet-resistant glass, capable of stopping three .44 magnum bullets. Additionally, biometric identity verification devices can be attached to the end post or a pedestal to provide a highly secure and touchless authorisation method. The Tourlock is capable of integrating with virtually any access system on the market. Integrated Diagnostic Software In recent year, the Tourlock was upgraded to include an integrated, IP-enabled software platform called BoonConnect that helps technicians diagnose the door and get it running quickly should there be an outage. An on-site technician simply logs in from a remote laptop, cell phone or tablet and can review performance data as well as diagnostic information about the door’s sensors, drive system, motor and more. This visibility can save hours or days of time resolving any issues. “We at Boon Edam owe a great deal of our success to the Tourlock in the last 10 years. It’s been critical in meeting the growing security requirements of the Fortune 500 and along with our turnstile offering has helped launch our Enterprise team to the level of success they have today,” says Valerie Anderson, President and Managing Director, Boon Edam, Inc. “Even after 40 years, the demand for reliable security at the entry has only continued to increase and the Tourlock continues to prove itself time and time again."
BlackBerry Ltd. has announced that it has partnered with Dedrone, a globally renowned market and technology solutions company in airspace security, to deliver advanced counter-drone technology to secure the world’s most critical sites. Advanced counter-drone technology As part of this embedded technology partnership, Dedrone, is integrating BlackBerry AtHoc software into its products, to enable real-time secure alerts, when a malicious or unauthorised drone is detected in airspace. “When an unauthorised drone enters restricted airspace, time is of the essence. The more effectively the on-site personnel can respond, the better their chances of countering whatever the drone is there to do. BlackBerry AtHoc’s advanced alerting capabilities combined with Dedrone’s drone detection technology, enable our customers to react precisely and in time to control the situation,” said Aaditya Devarakonda, President and Chief Business Officer, Dedrone. Dedrone technology The Dedrone technology portfolio combines machine-learning software with state-of-the-art hardware sensors The Dedrone technology portfolio combines machine-learning software with state-of-the-art hardware sensors, electronic attack methods like smart jamming, and defeat weapons to provide early warning, classification of, and mitigation against drone threats. Dedrone’s capabilities are used by hundreds of customers globally, including the U.S. military, allied and coalition forces, correctional facilities, airports, utilities, as well as other public and private organisations. Integration with BlackBerry AtHoc software Working with the BlackBerry AtHoc API, Dedrone has integrated directly to BlackBerry AtHoc’s extensive and granular alerting functionality. This allows the creation of automated, highly targeted alerts based on a range of criteria, including flight zones, drone behaviour, and user groups – for a more efficient, focused response to the presence of an unauthorised drone. “New advanced technologies have the potential to solve some of today’s most pressing challenges, however, they also introduce new security risks,” said Christoph Erdmann, Senior Vice President of Secure Communications, BlackBerry. Countering rising threat of unauthorised drones He adds, “Drones are one of the many IoT endpoints that add to the growing chaos that security experts must navigate. We’re excited to partner with Dedrone to offer a critical solution that organisations around the world can use to keep citizens and the public safe.” BlackBerry is a globally renowned company in secure communications and the BlackBerry AtHoc software is used by key organisations around the world, including 70% of the US Federal Government.
FLIR Systems, Inc. announced availability of the FLIR Occupancy Management Solution for FLIR Brickstream 3D Gen2 to automate occupancy counting within high traffic and capacity-limited areas. To support social distancing guidelines during and following the COVID-19 pandemic, the Occupancy Management Solution provides organisations with an easy-to-use, real-time capacity counting and display tool for multiple entries and exits. Organisations can automate capacity counting for high foot-traffic spaces to maintain social distancing compliance. “Many organisations are manually measuring occupancy, but this process is often inaccurate, cumbersome and expensive,” said Paul Clayton, General Manager, Components Business at FLIR Systems. Automated monitoring solution “FLIR addressed this challenge by introducing a cost-effective, scalable, self-contained, and automated monitoring solution suitable for a variety of locations from grocery stores, stadiums, theaters, transportation hubs, to manufacturing plants, and office spaces.” Current Brickstream 3D Gen2 customers can purchase and add this feature with via a remote firmware upgrade The Occupancy Management Solution is platform agnostic with an integrated IoT architecture, which can be implemented within existing Wi-Fi access points, offering a complete edge-based solution with the Brickstream 3D Gen2 hardware. It provides a simple display dashboard for capacity updates that can be viewed by staff or customers on devices with a web browser. Remote firmware upgrade It may be used as a standalone or integrated into existing perimeter systems, making it ideal for most environments where occupancy must be closely managed. Current Brickstream 3D Gen2 customers can purchase and add this feature with via a remote firmware upgrade. This solution is part of FLIR Systems’ COVID-19 response product portfolio, which includes the FLIR EST camera series, to help organisations improve safety in public places and other high traffic areas. The FLIR Occupancy Management Solution for Brickstream 3D Gen2 is available from FLIR and its global Brickstream distribution partners.
ASIS International, the world’s association for security management professionals, has announced its educational lineup for Global Security Exchange Plus (GSX+) 2020, taking place 21-25-September. The impressive slate includes more than 100 scheduled and on-demand sessions, organised into five subject matter areas, and reinforces ASIS’s commitment to providing the most diverse, thought-provoking, educational programs for security professionals worldwide. Through GSX+, attendees can earn up to 25 CPEs. Attendees with an All-Access pass will be able to access GSX+ sessions through 31 December. Security professionals “With GSX+, security professionals from across the globe can learn, network and connect with the latest ideas and technologies in the security management space,” said Mark Schreiber, CPP, GSX+ 2020 Call for Presentations Selection Committee Chair. “This year has presented much disruption and some unique challenges for security professionals everywhere, and our committee has worked extremely hard to curate and develop the most informative educational lineup, while addressing the practical needs of global security management professionals-by security professionals for security professionals. This is a process that has been months in the making, and we continually adapted to address those subjects that resulted from the new environment we all find ourselves in.” Subject matter areas for security The GSX+ session lineup addresses the most pressing topics vital to today's security professional, delivered in a virtual format. The five subject matter areas include National Security, Physical and Operational Security, Risk Management, Digital Transformation/Information Security, and Leadership and Managing within Organisations-enabling attendees to find the sessions most relevant to their own educational and organisational needs. Keynote presentations include: General Stanley McChrystal4-star general and former commander of U.S. and International forces in Afghanistan, will address the topic, Leading in a New World. Taking lessons from his crisis management and strategic operations playbook, General McChrystal will provide practical and actionable guidance on what it takes to lead successfully in a rapidly shifting world landscape. Cybersecurity expert Keren ElazariCISSP, a former hacker turned cybersecurity expert, is an internationally celebrated speaker, researcher, and author on all matters of cybersecurity. Her 2014 TED talk, viewed by millions, helped shape the global conversation about the role of hackers and the evolution of cybersecurity in the information age. Her presentation, The Future of Cybersecurity, addresses how cybersecurity has evolved from protecting one’s secrets to becoming one’s way of life. Elazari will shed light on emerging security threats, attackers’ techniques, what one can learn from hackers, and practical ideas on how to build a safe future for any type of organisation seeking to maintain business as normal in these unprecedented times. To explore the complete list of educational sessions and subject matter areas, one may visit the company website.
Pulse Secure, a renowned provider of software-defined Secure Access solutions, announced that Enterprise Management Associates (EMA) has honoured Pulse Secure among the industry’s top secure access platform vendors. Pulse Secure was selected by EMA as a “Top Three” vendor in enabling secure remote access across hybrid business networks. According to the 2020 EMA Secure Access Decision Guide, remote workforces increasingly require access to business applications, data, and services from a variety of devices through the Internet and unsecured public networks, increasing exposures to attack and risks of compliance failures. Secure remote access We surveyed IT decision makers to identify the top 10 key secure access initiatives" Secure access solutions with identity and device security features must create intuitive, compliant and protected connections for workers to access essential IT resources across business networks, private clouds, and SaaS environments. In 2020, requirements for enabling secure access from remote workers to hybrid IT business networks accelerated rapidly and substantially. As a result of the COVID-19 pandemic and global stay-at-home orders, workforces in nearly every business sector were suddenly required to enable remote access capabilities in order to continue operations. Solutions enabling employees to work remotely became a critical lifeline during the most challenging days of operational restrictions and trends towards increased workplace flexibility and permanent work from home requirements are expected to define secure remote access capabilities as a key element of IT enablement into the future. Minimise risk profiles The EMA Decision Guide provides actionable advice on the best practices and solutions organisations should adopt to empower end-user productivity and minimise risk profiles when enabling secure access to business IT resources. “We surveyed IT decision makers to identify the top 10 key secure access initiatives and then evaluated over 100 products across these business priorities by analysing a broad array of vendor product briefings, case studies and demonstrations,” noted EMA Research Director and Report Author, Steve Brasen. Access business applications Pulse Secure brings together core secure access capabilities with required interoperability for hybrid IT "EMA's detailed and independent assessment of this market clearly identified Pulse Secure among leading secure access platform providers and top three solution for enabling workforces to remotely and securely access business applications, data, and IT services across hybrid IT environments." Pulse Secure brings together core secure access capabilities with required interoperability for hybrid IT. The company’s Zero Trust value proposition is realised through its Pulse Access Suite, which delivers protected connectivity, endpoint compliance, operational intelligence, and threat mitigation across mobile, network, and multi-cloud environments. Data protection requirements Pulse Connect Secure (PCS), the company’s flagship secure remote access solution, offers rapid deployment and single-pane-of-glass management while ensuring user productivity with easy, optimised and protected access to data centre and multi-cloud applications. “Pulse Secure enables enterprises to accelerate their digital transformation strategies and flexibly migrate from data centre to multi-cloud computing while addressing diverse user, business and data protection requirements,” said Scott Gordon, Chief Marketing Officer at Pulse Secure. Clientless web access portal Pulse Secure has also extended its Pulse Cares programme through September 30, 2020 “EMA’s recognition of Pulse Secure as an industry-leading secure access vendor for hybrid IT is testament to our focus on enabling user productivity and our passion to innovate while being mindful to optimise our customers’ business opportunities, resources and investments.” Pulse Access Suite and Pulse Connect Secure capabilities highlighted in the EMA report include: Extensive Secure VPN connection modes: always-on, on-demand, or only when utilising specific applications, as well as split tunneling and multi-tunneling. Layer 2, layer 3 and layer 7 access security with broad application support. Ensures compliance with support for MFA and SSO authenticators (e.g., SAML IdP and SD), and user and device security before and during connections. Simplifies administration with wizards, granular policy settings, and adaptive access with built-in UEBA. Pulse One management platform to automate appliance and policy administration while viewing an operational dashboard. Unified Client, agent and agentless, for VPN, SDP and NAC, as well as clientless web access portal. Accelerate digital business Organisations can try Pulse Connect Secure and other integrated solutions that comprise the Pulse Access Suite by visiting the official website of the company. Pulse Secure has also extended its Pulse Cares programme through September 30, 2020, providing flexible licensing and expedited deployment and capacity enhancement to support business continuity as organisations extend workplace flexibility and accelerate digital business in the wake of the COVID-19 global health crisis. The abridged version of the “2020 EMA Top 3 Report and Decision Guide for Enabling Secure Access to Enterprise IT Services” can be downloaded from EMA website.
The COVID-19 pandemic is the defining global health crisis of our time. In order to be able to fight against it, mask detection and temperature measurement have become daily routines for everyone. In this situation, Merit LILIN, with over 40 years of experience in IP video manufacturers of IP cameras, recording devices, and software, have created a cost-effective COVID-19 solution to ensure end-user health and safety. Temperature measurement Many solutions should provide temperature information, with alert settings that trigger alarms when temperatures are high. The main component of LILIN Temperature Measuring Camera is a dual-lens camera with two sensors, one a visible image lens and the other a thermal array sensor. This design not only provides temperature information and color image information but also high-temperature alert settings when the temperature exceeds. Mask detection With COVID-19 rules and regulations now incorporating person protection equipment such as masks, many solutions are now geared towards mask detection. LILIN has its own mask detection AI, which can be run on an i3 CPU-supported PC. Using the LILIN AI system and Aida NAV server, the system can recognise if the person is wearing a mask or not. If the system identifies a user that is not wearing a mask, an alert goes out with an image of the person. It allows the application to run automatically and enforces the wearing of masks in many situations. A notification is sent to an administrator when an image of a person is captured. Social distancing measures In addition to temperature measurement and mask detection becoming daily epidemic prevention matters, maintaining social distance is extremely significant as well. Through the LILIN Aida detection system, people can calculate the social density and use it with alarm notifications, if an area exceeds the density threshold. Moreover, the LILIN COVID-19 solution has a wide range of applications in different sectors, including schools, public transportation systems, offices, retail and more. By doing so, extensive safety measures can combat COVID-19, providing the public with intelligent epidemic prevention solutions, through innovative AI detection systems.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
Axis Communications has introduced a body-worn camera solution, which the company says represents a natural extension of their corporate vision, business strategy and core competence. The new body-worn cameras and other elements of the system will provide Axis new opportunities to grow by tapping into existing and new customers. The fast-growing body-worn camera market is an attractive one, and Axis sees opportunities to extend the use of body-worn cameras beyond the current core market of police and corrections officers. Private security applications for the technology include healthcare, education, banking, public venues, retail, logistics, transportation and places of worship. The new body-worn camera system was designed with Axis partners and ecosystem in mind, says Martin Gren, Founder and Director of New Projects at Axis. “We try to make it fit with existing customers.” Deploying and using the system The new body-worn camera system was designed with Axis partners and ecosystem in mind Gren says the system is easy to deploy and use. The Axis W100 camera provides 1080p images, wide dynamic range (WDR) and has dual microphones, operating 12 hours on a single charge. GPS/GNSS global satellite navigation provides location, and a six-axis gyroscope and accelerometer offer additional data beyond the video image. For example, sensors might be triggered in some situations to initiate recording. One-bay (Axis W700) or eight-bay (Axis W701) docking stations enable high-speed supervised data offloading and battery charging, and a system controller (Axis W800) provides a central point for integration and management. Use of Zipstream compression technology saves on bandwidth and storage. Video cannot be accessed in the field, but only when a camera has been docked. There are many layers of security, and encryption protects all data used in the system from being accessed by outside agents. The USB interface cannot be connected to an ordinary computer but only to the docking station. Open standards Open standards ensure easy integration with video management systems and/or evidence management systems, whether on-premises or in the cloud. At the time of release, the Axis body-worn camera system is already integrated with Milestone XProtect, Genetec Security Center, and Axis Camera Station VMSs. It is also integrated with the Genetec Clearance cloud-based evidence management system. An application programming interface (API) will facilitate additional integrations over time. The body-worn cameras will be sold through the current Axis channels The body-worn cameras will be sold through the current Axis channels of distributors, systems integrators and resellers. The camera is part of the Axis “ecosystem,” which includes the company’s familiar network cameras as well as recent additions such as access control, network audio systems (including loud speakers), intercom door stations, a radar detector and other Internet of Things (IoT) devices. “The more things you integrate, the more value you add to customers,” said Gren. The new body-worn camera systems are core products for Axis; they are not made by another original equipment manufacturer (OEM) and merely sold under the Axis label. “When we decided to do body-worn cameras, OEMing was not an option,” said Gren. “Instead we took some experienced Axis engineers and a bunch of new ones to develop this product line to ensure the same Axis quality and compatibility.” Introducing the new product The body-worn camera system was unveiled remotely in a press conference webinar; the original plan was to introduce the new product at ISC West, which was cancelled to minimise spread of the novel coronavirus. In addition to announcing the new product, the Axis executives provided commentary and insight into the ongoing coronavirus crisis. “The security industry is a close-knit community that is connected in more ways than one,” said Fredrik Nilsson, Axis Vice President of the Americas. “We are all in this together. The industry has always exemplified resiliency, ingenuity and vision to address such challenges.” We are all in this together. The industry has always exemplified resiliency, ingenuity and vision" “There is some disruption in the Axis supply chain, but we have a broad partner-based supply chain when it comes to our sub-suppliers, our seven global CLCs (Configuration and Logistics Centers) and the distributors who keep inventory for integrators,” said Nilsson in the March 18th press call. “There is some stress on some components, but things are working relatively well under the circumstances. We are monitoring it on a day-to-day basis, but so far we have been able to hold things up very well.” Gren offered a comment on the possible use of thermal cameras (which Axis makes) to measure body temperature during the COVID-19 crisis: “When we designed our thermal cameras, that was a common question,” he said. “But in general, it is difficult to use a thermal camera to get an accurate reading. We have one model – the Q2901 – that is a temperature-accurate thermal camera, and if you look straight into the camera, it is accurate to around 1° F. However, there are more efficient ways to [measure temperature]. In general, it’s not a business application I would recommend.”
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilising the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualisation and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimising physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specialising in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognise the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customised solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximise their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
Airports are transportation hubs often located within close proximity to hotels, eateries, retail stores and sports venues. For this reason, large airports can have thousands of people approach their perimeter each day. With such a high throughput of people, security technology that detects and deters external threats is essential. When it comes to intrusion detection systems, there are several technology options, including buried pressure sensor cables, fibre optic sensors and behavioural analytics. However, an effective solution seeing increased adoption recently are thermal imaging cameras with built-in analytics. Lessons can be learned from integration firms like Ojo Technology, who oversaw the deployment of a FLIR perimeter intrusion detection system (PIDS) at Norman Y. Mineta San Jose International Airport (SJC) in 2017. Here are four advantages of thermal cameras that Ken Castle, vice president of business development at Ojo, described based on the SJC deployment. Video analysis and monitoring Thermal cameras produce images based on heat signatures rather than light. Consequently, thermal cameras capture video in total darkness, see through foliage and perform in adverse weather conditions like rain, wind and smoke. Thermal cameras provide a significant advantage for airports. As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images “The combination of darkness and distance demands a different solution, one that can be provided by thermal imaging cameras,” said Castle. “These need no auxiliary illumination, and their field of view can extend for hundreds of feet.” Low false alarm rates As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images ideal for video analytics, detection and classification. “With thermal cameras, the embedded analytics can immediately distinguish between an animal at 50 yards and a human at 300 yards, following their direction of movement,” Castle explained when discussing the PIDS project at SJC. Visual proof to provide qualified alerts Deploying thermal cameras in a PIDS project provides video verification for each alert. Thermal cameras provide the data and visual confirmations that are lacking from traditional fibre-based ‘shaker fence’ systems" “Thermal cameras provide the data and visual confirmations that are lacking from so-called traditional fibre-based ‘shaker fence’ systems, which generate alarms when objects strike a fence or something creates vibration,” Castle said. “The problem is that such alerts could be caused by dogs, wildlife, bicyclists bumping into the fence, tree branches or winds — none of which pose security threats. Those incidents then need to be independently confirmed by cameras. That takes extra steps and therefore consumes what could be valuable time.” Long-range detection and flexible coverage Airport perimeter solutions must have the ability to monitor vast exterior areas, from the parking lot to the terminal to the tarmac to the hundreds of portals in between. Thermal cameras provide that long-range monitoring capability. Castle reiterated this point when describing the FLIR solution deployed at SJC. “The FLIR perimeter camera system is designed to identify any attempted breaches by individuals who might try to gain access to the tarmac or aircraft from outside of the airport boundaries,” Castle said. “It also provides ongoing visibility of vehicle and cycling traffic along the outer fence line, as well as the movement of aircraft, cargo loaders, delivery trucks and service vehicles within the perimeter. Bottom line is that the safety of passengers, airline employees and service workers is greatly enhanced.”
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernisation process, the company decided to deploy new centralised CCTV systems to enhance the security level of passengers and drivers. First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command centre in real time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command centre. Customised mobile solution To help ARST revamp its bus security system, a customised Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras is integrated in the control room via DSS4004, where emergency calls, geo-localisation of vehicles and statistics can be managed. Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are: data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board and geo-localisation via DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. High performance sensor It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via wireless network - 3G/4G/WIFI. In addition, the device can also support connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than city bus, this device can be used in various applications, such as school bus, taxi, police car, train, truck, etc. The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high quality images and ensures real-time transmission. Also, it adopts a high performance sensor to provide incomparable performance even under extreme lowlight environment. Manage mobile devices The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses The Starlight feature allows capturing of more details and recognising accurate colours at night or in scenes with limited illumination. At the control room, Dahua DSS platform was utilised to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimise driving route to generate more profit. High-definition monitoring With upgraded Dahua system, the command centre can communicate with every single vehicle of ARST Bus Company in real time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command centre in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses, and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operation. The Dahua mobile solution mounted on board has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
FLIR PT Series cameras were used in a surveillance project to detect and monitor illegal fishing and poaching activities along the Spanish Galician coast. The FLIR thermal imaging cameras combined with maritime video analytics from Gradiant were ideal for spotting illegal vessels on a 24/7 basis and at a long range. The vastness of the Galician coastline and the multitude of fishing and farming activities call for a more automated surveillance approach. Fishing, shellfish harvesting, and marine aquaculture - mainly mussel farming in inshore waters are important economic activities in Galicia (northwest of Spain). Local public authorities strictly control these activities to prevent exploitation, fish stock depletion and resulting economical losses. They are fighting a constant battle against this unfair and illegal competition that affects thousands of professionals who make a living from the fishing and seafood industry. Challenges of coastal monitoring Illegal fishing and poaching has an enormous impact on the environment and food safety Illegal fishing and poaching of seafood resources also has an enormous impact on the environment and food safety; especially during periods of toxic algal bloom (red tides), when fishing conditions are hazardous for public health. The detection of unauthorised fishing and shellfish harvesting is of paramount importance for the Galician authorities. However, monitoring and protecting all of Galicia’s inshore and offshore fisheries, shellfish harvesting areas, and marine aquaculture farms is a challenging task. Galicia has 1,200 km of coastline. Its protection involves the surveillance of activity in 122 ports, including around 5,000 fishing boats, 400 beaches dedicated to shellfish harvesting, and 47 mussel aquaculture farms, with a total of more than 3,000 bateas (floating mussel farms). Long-range thermal imaging Moreover, most illegal activity takes place at night, making it extra difficult for law enforcers to detect any type of vessel. The Galician climate does not help either. With an average of 128 days per year of rain, visibility conditions are usually not ideal for surveillance operations. Manned surveillance patrols can only do so much; they are hindered by the climate and visibility conditions, making it impossible (from a practical and financial standpoint) for coast guards to cover the entire Galician coastline. In 2017, the Galician Coast Guard started a project to test video surveillance of the coastline based on thermal imaging cameras. The pilot included the use of FLIR’s PT Series multi-sensor camera, combined with maritime video analytics software from Gradiant (Pontevedra, Spain). Multi-sensor installation FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications The multi-sensor installation was extensively tested on two different locations along the Galician coast. One set-up was used to monitor illegal vessels on coastal waters at short/medium range, while another set-up was used for long-range monitoring. The PT Series thermal cameras allowed the Galician Coast Guard to monitor the required area over a long range on a 24/7 basis, even at night and in adverse weather conditions. In addition, the FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications. This software is specifically adapted for monitoring coastal environments and allowed the coast guard to detect, track and geo-localise people and vessels, including small wooden and plastic boats. Visible-light camera The software enabled the thermal cameras to detect objects and people despite adverse maritime conditions, such as high waves, low contrast due to low light, fog and rain, reflections on the sea surface, camera vibrations, and the presence of distractors, such as birds and vessel wakes. The FLIR PT Series is a high-performance multi-sensor pan/tilt security camera, incorporating an uncooled thermal camera with sensitivity of <35mK and a visible-light camera with 36x optical zoom. While the thermal camera is used to detect threats over a long range based on their heat signatures, the visible-light camera can be used for verification and identification. Long-range surveillance The requirements for this long-range application were extremely challenging for any thermal camera" “FLIR is the reference for long-range surveillance applications with thermal imaging,” says José Antonio Rodríguez, Head of Video Analytics at Gradiant. “The thermal performance of the camera and the fact that this technology is easy to set up makes it ideal for this type of application. In addition, FLIR supported us from the start for lens selection, calibration of the system and much more.” “The requirements for this long-range application were extremely challenging for any thermal camera,” says Nikitas Koutsourais, Product Marketing Manager at FLIR Systems. “Thanks to the FLIR PT Series’ unique thermal sensitivity of less than 35mK, we could provide the best image performance in the market.” IP video streaming Two different configurations were used in this application. The long-range surveillance station used a FLIR PT-606 camera, and was able to detect a rubber inflatable boat at 4,000m. Despite its narrow field of view, this camera allowed for wide coverage thanks to the high-precision pan/tilt unit. The camera was able to sweep a wide field of view span in a pre-programmed sequence of pan/tilt presets. The port surveillance station used a PT-625, offering a good compromise between detection range and field of view with a single pan/tilt preset. The integration of the video analytics software with the camera was easy thanks to IP video streaming and the camera’s ONVIF compliant interfaces for pan/tilt control. Long-range surveillance typically requires the use of lenses with a narrow field of view, which is a problem when you want to monitor wide areas. Coastal protection applications The FLIR thermal cameras provided the Galician coastguard with increased situational awareness However, the video analytics from Gradiant was able to take advantage of the Preset Sequencing mode of the FLIR PT Series. This allowed the coastguard to cover a wide field of view with a single camera and to perform video analysis on each pan/tilt preset. The FLIR thermal cameras provided the Galician coastguard with increased situational awareness and allowed them to respond much quicker to illegal fishing activities. The pilot project was performed in a realistic surveillance environment along the Galician coast and generated very positive results. The combination of a multi-sensor system with Gradiant’s maritime video analytics proved to be effective to deal with the intricate Galician coast lines and a lack of open view. In addition, this technology combination is a cost-effective alternative, making automated surveillance applications accessible for fish farm companies worldwide. Extremely rugged systems Finally, the PT-Series are extremely rugged systems, which makes them ideal for coastal surveillance, especially in an extremely humid environment such as the Atlantic coast of Spain. The system’s vital core is well protected against dust and water ingress, and complies with IP66 requirements.
Teleste Corporation has been selected as a vendor of on-board video surveillance and public announcement systems to Stadler’s FLIRT trains for Wales & Borders in the UK. The end-customer in the project is Transport for Wales Rail Services. Teleste’s deliveries to Stadler will take place in 2020–2023. The on-board video security and surveillance system will include internal, external and pantograph front-facing cameras, video recorders and user interfaces. Additionally, IP amplifiers, passenger intercommunication systems, and driver microphones will be delivered to the trainsets as part of the public announcement system. “We are delighted to continue our cooperation with Stadler as a supplier on modern, state-of-the-art on-board systems to the FLIRT Electric Multiple Unit platform. Our solutions have been designed and tested for consistent high quality over the course of many years, and we are confident that they will provide Stadler with the right tools for building these innovative high-speed regional trains for safe and enjoyable travel,” said Jörn Grasse, Vice President of Rail Information Solutions at Teleste.
Teleste Corporation and a renowned international rail vehicle construction company Stadler have agreed on deliveries of Teleste’s passenger information and CCTV systems to Stadler’s new FLIRT trains for Norwegian State Railways. The deliveries will take place in 2019–2021, continuing the cooperation between Teleste and Stadler that was started in 2009. The deployment will include on-board passenger information (PIS) and CCTV systems for more than 20 trains complemented with video security cameras and video recorders, intercommunication and public address systems as well as TFT and LED information displays. The flexible and future-proof system works seamlessly together with the existing PIS systems, delivered during earlier stages of the cooperation, and includes upgrades such as enhanced cyber security. Rolling stock manufacturers We have been able to fulfil Stadler’s requirements for high-quality delivery of passenger information" “Today, transport operators and rolling stock manufacturers need to stay at the cutting edge of on-board technologies to deliver an excellent travel experience for the growing number of public transport users who wish to be informed about their travel at every step of the journey." "We are pleased that we have been able to fulfil Stadler’s requirements for high-quality delivery of passenger information on their trains to Norway, and we are looking forward to continuing our cooperation,” stated Jörn Grasse, Vice President of Rail Information Solutions at Teleste. Effective transport system Teleste’s on-board passenger information system is based on modular software architecture, which makes it possible to use the system technology for different kinds of applications. The system provides a flexible option for the delivery of passenger information for rolling stock manufacturers and operators who wish to build and run an effective transport system that can carry large volumes of passengers smoothly and safely every day. Customers can visit the company’s website for more information about the solution and its benefits.
viisights, the developer of innovative behavioural understanding systems for real-time video intelligence based on AI, announced that it has deployed a smart city traffic monitoring system in the city of Ashdod, leveraging the NVIDIA Metropolis intelligent video analytics framework. “This project signifies how smart cities like Ashdod increase safety, mobility and quality of life by state-of-the-art traffic monitoring driven by computer vision-based on AI,” said Asaf Birenzvieg, co-founder and CEO of viisights. “viisights traffic monitoring capabilities are based on our revolutionary video understanding technology that helps in analysing hundreds to thousands of real-time traffic video streams and alerting on complex traffic situations, including accidents, hazards and predicting and managing traffic congestion. We see this project as an example of how a city can be really smart and as a validation of the growing demand for our behavioural understanding solutions.” Intersection blocked Using NVIDIA GPUs and the DeepStream SDK within NVIDIA Metropolis, viisights’ innovative traffic monitoring system provides highly scalable and cost-effective solutions for real-time analysis of thousands of video streams. viisights video intelligence system deployed in Ashdod provides real-time advanced behavioural understanding of traffic actions and events in live video streams by monitoring intersections, crossroads, roads and streets. This enables municipalities to quickly address events of interest such as accidents, disturbances to traffic (for example, vehicles stopping in a junction or on a sidewalk), road hazards (for example, people getting in and out of vehicles in dangerous areas) and monitor traffic flows and report on various statistics. viisights technology protects public privacy by only analysing general behaviour patterns of individuals, groups, vehicles and traffic-flows. It does not identify faces or licence plates. Car collision information This cutting-edge, first-of-its-kind technology from viisights assists municipalities to secure traffic flow, prevent blockage and attend to road hazards, while also enhancing their essential role in securing the life and safety of inhabitants; first responders can arrive faster at scenes of life-threatening situations, minimise injuries, and attend to dangers in traffic and more. “We are extremely proud to be at the forefront of smart city technology by being the first city in Israel to define and use this behaviour recognition technology for the benefit of Ashdod citizens,” said Gamliel Edri, technologies & CCTV control room department manager for the city of Ashdod Municipality. “The viisights’ system strengthens our ability to ensure the safety and security of our citizens and even save lives. We look forward to broadening our successful collaboration with viisights to other parts of the city.”
Round table discussion
Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting utilities?
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?