FelenaSoft announced the release of Xeoma software version capable of detecting people that are or are not wearing protective facial masks. With the start of the pandemic a facial mask has become an essential part of the everyday life and an integral element of the safety rules in many governments. Thanks to current technological advances, cutting-edge solutions like Xeoma can aid humanity in the struggle. Xeoma’s Mask Detector is a fully automated, artificial intelligence-powered feature...
The manufacturer Synectics has published a white paper aimed at transport operators on the increasingly urbanised future. With estimates suggesting that 70 percent of the world’s population will be living in towns and cities in three years’ time – the free paper aims to help operators handle and secure urban flows, and implement safety improvements, towards the goal of a Smart Transport Network. Smart Transport Networks The paper – titled ‘Smart Transport Network...
Videotec is launching NVX, an IP FULL HD super low-light camera with high corrosion resistance. This camera incorporates the DELUX imaging and encoding technology for recording incredibly clear colour video day or night. Its extremely sensitive light sensor works with the DELUX technology to provide high colour rendering and maximum noise reduction in very low light conditions of 0.006 lux, or 0.0006 lux in black and white. Video images can be transmitted via network with H.264/AVC, MPEG4, MJPE...
Mitie Security has launched new fever-screening solutions, using thermal imaging to identify individuals potentially suffering from COVID-19. The solutions are designed to support both businesses on the frontline of the coronavirus pandemic such as hospitals, and those preparing to return to business post lockdown, such as retailers, venues and buildings with a significant number of employees. Mitie Security is helping businesses mitigate against the spread of Coronavirus with the launch of a n...
Body temperature measurement, detection of face masks and the counting of visitor flows - Geutebrück has expanded its portfolio to enable the retail trade, public authorities and operators of public transport and industry to adjust their protective measures to the current situation. Without having to resort to biometric data, the intelligent and highly available video security systems process images in real time. This way, both customers and personnel are being protected, and compliance wi...
Hikvision UK & Ireland has announced offering security installers, integrators and end users the opportunity to undertake free online training on its fever screening thermal products and solutions. Hikvision thermal cameras Hikvision’s newly developed thermal cameras can be configured to aid high level screening by detecting elevated skin-surface temperatures, and are suitable for use in rapid preliminary fever screening in office buildings, factories, railway stations, airports and...
Further consolidating its leadership in enabling mission-critical communications (MCC or MCX), Softil announces that its BEEHD technology has been selected by South Korea's RF-Comm equipment provider to build the next generation of LTE-R high-speed train communications devices for KORAIL, South Korea's national railroad network. The LTE-R devices will be deployed on the Daegok to Sosa KTX intercity line, the highest class of KORAIL services, and will enter service in early 2021. The deployment is consistent with South Korea's government's policy that all public service communications including trains, police and firefighting services switch to broadband technologies. Softil's BEEHD technology We chose to build RF-Comm's new LTE-R communications devices for KORAIL using Softil's BEEHD technology" RF-Comm's CEO Dong Hyung, Kim, comments, "South Korea is now on a par with China and Japan as the world's leading high-speed railway network and only the finest communication equipment and devices can be used in bullet trains for stable and secure communications. We chose to build RF-Comm's new LTE-R communications devices for KORAIL using Softil's BEEHD technology as it offers the best quality, most advanced standards-compliance, and significant time-to-market advantage." "Secure and stable communications systems in railway networks running in excess of 400 km/h are now must-have and Softil's BEEHD technology is the fastest route to providing the market with LTE-R-based systems," adds Pierre Hagendorf, CEO. Global System for Mobile Communications - Railway (GSM-R) Softil's BEEHD technology is a cross-platform client framework designed for chipset vendors, device manufacturers, system integrators, application developers and service providers to develop IP-based mission-critical voice and video communications over LTE (VoLTE and ViLTE) solutions. LTE-R supports voice communication among drivers, control centre operators, maintenance and other railway staff The Global System for Mobile Communications - Railway (GSM-R) has been the standard for digital railway communications for many years. But with LTE-R based devices offering lower latency, higher data capacity and better security than GSM-R systems, railway networks are now migrating to LTE-R communications devices for wireless voice and data communications inside trains, from the train to the ground and from train to train. Data communication for train control signalling LTE-R supports voice communication among drivers, control centre operators, maintenance and other railway staff supporting push-to-talk group communication, broadcasting, location-dependent addressing and multilevel prioritisation. RF-Comm's devices will also allow data communication for train control signalling and other operations and maintenance as well as text messaging during voice communication. The devices will allow multimedia communication for wireless video surveillance, mobile video conference, file sharing, mobile office and passenger infotainment services.
ANSecurity, a specialist in advanced network and data security, announces a successful ‘always-on VPN’ security solution for The Stafford Railway Building Society that is helping to meet security, continuity and remote working requirements for the award-winning, local financial services provider. Originally championed by a small group of railway workers, The Stafford Railway Building Society was established in 1877 and is still going strong with a focus on straightforward, good value products backed by a plain-speaking, friendly service. In 2018, the society scooped the coveted ‘Best Local Building Society’ in the Mortgage Finance Gazette Awards. Automation of internal functionality The Society is firmly committed to embracing the changes and challenges of today’s society Although proud of its tradition, the Society is firmly committed to embracing the changes and challenges of today’s society. In late 2017, the Society migrated its Core IT system to Mutual Vision, a private cloud-based application. This provides the Society with improved capability to further develop both a more efficient, automated member-facing process and significant scope for the automation of internal functionality. During 2018, the Society concentrated on embedding the new core system and utilising the additional features it had to offer. The first significant enhancement being the introduction of SRBS Mortgage Hub to give Mortgage Brokers a digital connection to the Society. The IT team also began a dual-use project to implement more remote working with the aim of increasing flexibility for staff while also strengthening its business continuity planning so that it can work remotely in the event of any site impacting issues at its head office. Highest levels of security “Continuity planning and security are two major requirements for us,” explains Heather Hamilton Head of IT for Stafford Railway Building Society, “Although we have disaster recovery arrangements it would be difficult to operate our service in the event of a major outage. In terms of security, any type of remote access needs to have the highest levels of security to meet our regulatory requirements as well as industry best practice.” We wanted to make the process simple for our staff to use and the IT department to manage" “Lastly, we wanted to make the process simple for our staff to use and the IT department to manage - what we wanted was a solution that could solve all three challenges in an elegant way.” Hamilton contacted ANSecurity for advice following a recommendation from an IT contractor that had carried out an earlier project at the Society. Successful proof of concept “ANSecurity did an assessment and created a solution that would ensure that all of our access, both internally and from remote workers would be validated by an always-on VPN along with digital certificates embedded on each device,” explains Hamilton. Following a successful proof of concept, the full roll-out of the Pulse Secure VPN took place over a two-day period, including staff training. “The solution allowed us to turn off the secondary WIFI network and now everything runs over a single network and is automatically validated before the user can access any applications,” she explains. This strangely has been one of those things that we deployed, and we've actually had positive feedback" “The login is really easy to use for the staff, as all the additional checks are all happening in the background. This strangely has been one of those things that we deployed, and we've actually had positive feedback where we've had staff come to us and say... ‘oh that always-on VPN is really good,” Hamilton adds. Delivering clear return on investment The Society is now rolling out remote working to staff in stages and the initial feedback has been very positive. “It not just for home working,” she says, “We have also had positive feedback from our executives who can now quickly and securely access our key apps without any issues while away from their desks in meetings on or off site.” The solution has delivered a clear return on investment, reduced the number of calls to its IT helpdesk and proven extremely reliable. “ANSecurity has been with us every step of the way during this project,” says Hamilton, “They have been both professional and helpful and delivered a solution that easily exceeded our expectations,” Hamilton concludes.
The security industry provider in purpose-built video surveillance recording appliances, BCDVideo, announced the launch of a new line of harsh environment, rail, and in-vehicle servers. The new product line delivers quality performance in diverse environments with a long product life for customers with complex requirements worldwide. Video servers BCDVideo’s new line of Harsh Environment Video Recording Servers features Intel® Core™ Processors, coupled with up to 10 TB of max storage. The video servers include a fanless design that performs in temperatures between -14°F and +131°F and has additional options such as cell, GPS, and WiFi modules. The Harsh Environment Video line also includes a 3-year advanced replacement warranty that lowers the total cost of ownership to ensure project success. RAIL Certified Servers The RAIL Certified Servers feature Intel® Core™ Processors, extended temperature, and up to 20TB of storage “We are excited to expand BCDVideo’s innovative video surveillance recording products to new customers working in harsh environments around the globe. With our latest product line of harsh environment, rail, and in-vehicle servers, clients receive peak performance, long lifespans, and cutting-edge technology, no matter where they work,” says Tom Larson, Chief Technology Officer. The RAIL Certified Servers feature Intel® Core™ Processors, extended temperature, and up to 20TB of storage. The servers are certified with both EN50155 as well as MIL-STD-810G. Each model supports cell, GPS, and WiFi modules, with a 3-year advanced replacement warranty. In-Vehicle Servers The In-Vehicle Servers feature Intel® Core™ Processors, up to 16 POE Ports and up to 20TB of max storage. The in-vehicle servers support vibrations up to environmental standards (IEC) 60068-2-64, as well as temperatures from -40° to +158°F. A 3-year advanced replacement warranty is included to lower the overall cost of ownership.
NEC Corporation, a pioneer in the integration of IT and network technologies, announces that its face recognition technology achieved the highest matching accuracy in the Face Recognition Vendor Test (FRVT) 2018 performed by the U.S. National Institute of Standards and Technology (NIST), with an error rate of 0.5% when registering 12 million people. NEC's technology ranked No. 1 in NIST testing for the fifth time, following its top placement in the face recognition testing for video in 2017. The high performance of NEC's technology is reflected in the test results which placed the company significantly ahead of the runner-up. Convenience of biometric authentication technology The use of face recognition technology is rapidly expanding across a wide range of fields throughout the world In recent years, the growing convenience of biometric authentication technology, improved security awareness, and the remarkable development of artificial intelligence (AI), have driven companies around the world to begin adopting biometric authentication technology. Specifically, the use of face recognition technology is rapidly expanding across a wide range of fields throughout the world. Face recognition technologies are now being used in areas that require high reliability, convenience and long-term use, such as identity verification and national infrastructure, transaction settlements, bank account establishment, and passport verification. 49 organisations, including companies from the United States, China, Russia, Europe, and Japan, participated in the NIST's FRVT 2018, where the evaluation of face recognition accuracy was performed. Reducing the identification error rate These tests are the most rigorous and fair benchmarks implemented by the NIST as each organisation is required to submit and be evaluated on programs that were developed during the same period. By performing multi-stage matching, an impressive search speed of 230 million matchings per second was achieved. NEC aims to further expand the scope of this technology's application to include store transaction settlements Furthermore, leveraging NEC's deep learning methods to significantly reduce the identification error rate, NEC accurately matched images of a subject taken over a 10 year interval with an error rate that was 4 times lower than the runner-up. Going forward, NEC aims to further expand the scope of this technology's application to include store transaction settlements, services in public facilities, such as buses, railways, airports, city offices, and hospitals; and helping to protect and care for children and the elderly. Biometric identification solutions Based on the NEC Group AI and Human Rights Principles established in April of this year, NEC gives top priority to the consideration of privacy and respect for human rights when using AI and biometric data. NEC also aims to contribute to further improvements in the usability of biometric identification and video analytics technology, including face recognition. "NEC's portfolio of biometric identification solutions, 'Bio-IDiom', which includes face recognition technology, is critical to the ways that NEC is helping to build safer and more productive societies as part of the 'NEC Value Chain Innovation'," said Hitoshi Imaoka, NEC Fellow at NEC Corporation. "These technologies create new value by sharing information on the status of communities, things, and processes across the entire value chain, and are a meaningful source of growth in our Mid-term Management Plan 2020 and 'NEC Safer Cities', which support the realisation of safe, secure, efficient, and equal cities."
This year’s Global Security Exchange in Chicago will see Synectics (booth 2088) demonstrate why the powerful capabilities of its Synergy 3 command and control platform were selected for a next-generation mission control hub for one of Europe's largest urban rail networks. With a comprehensive integration ecosystem combining security, surveillance, and operational sub-systems – through features like workflows, workforce management, cloud-based evidence management, and mobile applications – Synectics solutions are used by organisations worldwide to bring simplicity and control into a single unified platform. Drawing attention to Synergy 3 functionality Our focus at this event is on drawing attention to the exciting, and ground-breaking, functionality within Synergy 3"Greg Alcorn, Divisional Director at Synectics, explained: “More and more customer objectives are inextricably linked to broader data management goals critical to their entire security and operational infrastructure. Our focus at this event is on drawing attention to the exciting, and increasingly ground-breaking, functionality within Synergy 3 that our customers are already using to achieve these goals.” Synectics boasts a global project portfolio in applications where security and surveillance are paramount, including: Transportation – developing a solution to enable smart, centralised management of network-wide safety, service, and security for S-Bahn Berlin GmbH, a subsidiary of Deutsche Bahn AG. Aviation – delivering an Airport Operational Command & Control Center (AOCC) for Jakarta's Soekarno-Hatta International Airport. Power Utilities – providing a federated security and surveillance system with a centralised Alarm Receiving Center (ARC) for a major European power distributor. Gaming – supporting one of the largest surveillance projects in North America with a comprehensive command and control solution for Encore Boston Harbor. Addressing critical operational challenges Synergy 3 is an ever-evolving platform that addresses customers' critical operational challenges"Alcorn continued: “Tailoring our solutions to meet the business needs of our customers is one of the reasons behind our success, and Synergy 3 is an ever-evolving platform that addresses their critical operational challenges. Meeting these is where we excel as a company and forms the basis for how we innovate our products, through deep customer engagement, to address specific market segment and business problems.” Synectics is a pioneer in the design, integration, control, and management of advanced surveillance technology and networked security systems for environments where security is operationally critical. With over 30 years’ experience, they have gained an intimate understanding of the daily pressures, priorities, and challenges faced by their customers in Oil & Gas, Gaming, Transport & Infrastructure, and High Security & Public Space.
You don’t need to continue using keys and key cards. When you want effective first-line security for private doors in public spaces, you no longer need cumbersome kit. To keep opportunist hands off your belongings, the Code Handle 4-digit code-operated electronic handle locks without any wires, expensive hardware or software, mechanical keys or changes to your existing doors. PIN codes unlock so many features of our daily lives, from a smartphone to your online bank account. Now you can use them to unlock security door handles, too. Code Handle is a stylish handle with an integrated electronic PINpad. When you fit a Code Handle to your door, you make sure only authorised people get in. Without a 4-digit code, the handle stays locked and the door stays closed. Fire accredited Code Handle For such a simple device, Code Handle packs several clever features into its sleek, low-profile design“Code Handle is unique in comparison to common code door locks: it has the code function and battery incorporated inside its handle, so you don’t need to make extra modifications to your door,” explains Lars Angelin, Business Development Manager for Code Handle at ASSA ABLOY EMEA. For such a simple device, Code Handle packs several clever features into its sleek, low-profile design. When you close the door behind you, Code Handle locks itself, so you don’t need to put down whatever you are carrying. From inside, a Code Handle opens freely. It is also fire accredited (EN 1363). Code Handle is simple to install and retrofit. Everything you need for a simple, effective security barrier is inside the box. Two screws fit a new Code Handle to almost any interior door, with left- or right-hand opening. There is no need to cable the door, connect it to mains, or pay a specialist installer. Works with standard lock hardware Code Handle is the lock of choice for sensitive, low-security doors in all kinds of placesCode Handle works in tandem with standard lock hardware. You can keep your existing cylinder or lock mechanism and just change the handle. Two standard batteries (CR2) slot inside the Code Handle, and typically last 30,000 lock/unlock cycles before replacement. Code Handle is an attractive proposition, with an elegant contemporary design, in brushed stainless steel and satin chrome. No more ugly push-button-and-twist mechanical PIN locks spoiling the look of your office. Code Handle is the lock of choice for sensitive, low-security doors in all kinds of places. At libraries, airports, railway stations, gyms, schools, car dealerships, restaurants and offices, a Code Handle PIN lock keeps the public out of accessible private rooms. In company archives, stock rooms, customer toilets, management offices and medicine stores, Code Handle deters casual intruders and keeps your property safe and secure.
Today, customers are demanding immediacy, personalisation and seamless services from their providers and our desire for instant gratification means that those servicing the public need to provide easy, fast, smooth and continuous ways to meet customer expectations. This is where interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way. In recent years, kiosks have fast gained popularity, not only because they enhance customer satisfaction, as they operate in self-service mode, but they also provide crucial information or services to customers as and when they need it. Think about how you utilise such services, at a railway station to buy tickets, in a fast food outlet to order food or in other ways as you go about your daily business. Interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way Today, kiosks are typically placed in high foot-traffic environments such as retail stores, hospitals, banks, hotels, airports, courthouses, libraries, railway stations – you name it – providing customer access to information, products, websites, tools, or applications. For those less familiar, an interactive kiosk is a computer terminal featuring specialised hardware and software that provides access to information and applications for communication, commerce, entertainment, or education. Kiosk software platforms are easy to deploy Integration of technology allows kiosks to perform a wide range of functions, for example, kiosks may enable users to order from a shop's catalogue when items are not in stock, check out a library book, look up information about products, issue a hotel key card, or enter a public utility bill account number in order to perform an online transaction. Kiosks are computing platforms where the user interface needs to be limited to serve a specific purposePut simply, kiosks are computing platforms where the user interface needs to be limited to serve a specific purpose. Whether it is a citizen-facing platform in a government building or a device in a train station, the common theme is that the user is constrained to undertake very specific tasks with that device i.e. buy a train ticket. The device itself might have a full-blown operating system but all the user can see is the app and what they need to do. Therefore, it is very important for kiosk software platforms to be very easy to deploy and they must provide a very intuitive user experience. It is very much about the interaction the user is undertaking and little beyond that, which means the software must be optimised for user interaction in that context. But what that means is that security is often a secondary consideration, with many kiosk software providers paying lip service to security, while they focus primarily on ease of use and ease of management. Thinking of a kiosk as just a terminal that wouldn’t be of interest to a hacker is precisely why they are so attractive to attacks The threat of cyber attacks However, today we are seeing cyber-attacks escalating and becoming an everyday occurrence; as adversaries seek out new methods of attack and new threat vectors, so kiosks are becoming more of a target and an attractive platform for cyber adversaries to attack. Most kiosk software platforms just provide a management layer to configure an endpoint device in that kiosk. If you think about a traditional endpoint device such as a laptop, they are more likely to have a greater set of defence tools deployed, actively managing and monitoring the device, regularly patching and updating it. This is not the same where kiosk platforms are concerned. Kiosks are becoming more of a target and an attractive platform for cyber adversaries to attack So why is this? Often, the business can’t justify having a full-blown operating system and sophisticated defence tools on that platform, especially if they have a large number of kiosks deployed out in the field. They are normally in highly remote or widely geographically dispersed locations, which means there are significant costs involved to go out and fix them. Protecting devices in a more robust way Likewise, organisations don’t always have the local IT resource in many of these locations to maintain the equipment and its security. Or, if there is a patch management process in place it might not always be timely. For example, if you adopt an Android platform, Google regularly announces the vulnerabilities they have patched. This means the device manufacturers have to try and create patches for the vulnerabilities that have been announced publically to the cybercriminals. Adversaries know there is a window of opportunity they can exploit because the software author has told them about it. That time delay can be even worse in kiosk ecosystems, where there may be a diverse geographic spread of devices. We need to increasingly think about how we protect these devices in a more robust way Or the kiosk might simply be old. One of the reasons the WannaCry ransomware attack ended up being so widespread, is that there were old computing terminals throughout the NHS, running old operating systems. Any unpatched version of Windows is susceptible, so it can end up being a false economy by attempting to run these legacy systems for too long. As we continue to exploit and expect technology in every far-flung corner of the world, we need to increasingly think about how we protect these devices in a more robust way. Thinking of a kiosk as just a terminal that wouldn’t be of interest to a hacker is precisely why they are so attractive to attacks, because they know the security might not be as tight as it should be. Making kiosks more secure could be the difference between you being breached and remaining safe.
A deep native integration of Bosch cameras with software from ISS proactively catalyses the best in security and surveillance, while providing advanced intelligent video tools. ISS SecurOS provides intelligent enterprise video management solutions with emphasis on providing scalability and flexibility to meet the customer’s needs. Deeply integrating built-in video analytics from Bosch cameras improves operator efficiency and situational awareness to manage complex environments. ISS SecurOS maximises camera performance for license plate recognition, face recognition, and container/train carriages recognition. The cameras meet the performance needs for advanced analytics, ensuring the success of projects and saving time, resources, and cost. The partnership has delivered multi-thousand-camera safe city deployments, industrial analytics solutions, and systems for large-scale transport providers. The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each vehicle License plate capture The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each and every vehicle. Operations managers are accountable for efficient logistical flows and effective use of roads and parking lots. Knowing the ins and outs of the transport infrastructure and what’s going on at all times provides the knowledge required to ensure operations are running safely, efficiently and in compliance with the rules and laws. An important part of this comes from monitoring which vehicles are entering an area and ensuring they are allowed to be there. Capturing license plates of every vehicle moving in an area provides knowledge of traffic flows and usage patterns. Such a solution should also allow a customer to easily configure and manage monitoring preferences and permit easy data exchanges with other operational management systems and services to manage an infrastructure and logistics as a whole. Reliable license plate data Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments As transportation infrastructures are often operating around the clock, reliable vehicle identification data is required 24/7. This means that the cameras capturing this data should work in all lighting and weather conditions, for both slow- and fast-moving vehicles. Cameras must be built to produce usable images 24/7 in all weather conditions. For quality license plate recognition in both day and night, the cameras make use of supplementary infrared light. A special License Plate Recognition (LPR) mode, developed in collaboration with LPR software, delivers readable license plates even with glaring headlights and with fast moving vehicles. Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments. License Plate Capture solution The SecurOSTM AUTO system of ISS, when used with Bosch cameras, provides easy to deploy solutions for all of these requirements. It recognises license plates from many countries, manages and matches white, hot and blacklists and notifies the operator either in the GUI or through a messaging interface to other management systems. Additionally, the system can be used and managed as a standalone or embedded in other management systems on the premises.
Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need only to watch the television when a major incident is being reported. The images are often from a witness at the scene who recorded it on their device. It is madness that it has until now been easier for people to share information around the world via Facebook and YouTube etc, in a matter of minutes, than it is to transmit it to those that need to coordinate the response. The public as an additional security and safety sensor In the UK, a marketing campaign designed by government, police and the rail industry is currently running. Aiming to help build a more vigilant network on railways across the country and raise awareness of the vital role the public can play in keeping themselves and others safe, the ‘See It. Say It. Sorted’ campaign urges train passengers and station visitors to report any unusual items by speaking to a member of rail staff, sending a text, or calling a dedicated telephone number. Essentially, the campaign is asking the public to be an additional safety and security sensor. However, with the help of the latest mobile app technology, it is possible to take things to a whole new level and this is being demonstrated by a large transport network in the US. This organisation recognised that the ideal place to begin its campaign of connecting smart devices to the control room as an additional sensor, was by engaging its 10,000 employees (incidentally, this is approximately twice the number of surveillance cameras it has). These employees have been encouraged to install a dedicated app on their mobile devices that enables them to transmit important information directly to the control room, as well as a panic button for their own safety. This data can be a combination of images, text, audio, video and even live-streaming, to not only make the control room aware of the situation but give them eyes and ears on the ground. For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information Combatting control room information overload For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information. For example, if an alert comes in about a fire on platform 3, the operator doesn’t necessarily require any of the information from the other sensors, nor does he need to verify it’s not a false alarm. He knows that the information received has been ‘verified’ in-person (it is also time and location stamped) and that there is an employee located in the vicinity of the incident, who they can now directly communicate with for a real-time update and to co-ordinate the appropriate response. Compare this to a 24/7 video stream from 5000 cameras. It is in stark contrast to the typical issue of sensors creating information overload. The employee only captures and transmits the relevant information, so in essence, the filtering of information is being done at source, by a human sensor that can see, hear, and understand what is happening in context. So, if an intruder is climbing over a fence you no longer need to rely on the alert from the perimeter alarm and the feed from the nearest camera, you simply send a patrol to the location based on what the person is telling you. Furthermore, if the control room is operating a Situation Management/PSIM system it will trigger the opening of a new incident, so when the operator receives the information they are also presented with clear guidance and support regarding how to best manage and respond to that particular situation. Transport networks are using staff and the public as additional safety and security sensors Application of roaming smart sensors To be clear, this is not to suggest that we no longer need these vitally important sensors, because we do. However, one major reason that we have so many sensors is because we cannot have people stationed everywhere. So, in the case of the US transit company, it has been able to add a further 10,000 roaming smart sensors. This can be applied to other industries such as airports, ports, warehouse operations, stadiums, and arenas etc. Now, imagine the potential of widening the scope to include the public, to truly incorporate crowdsourcing in to the day-to-day security function. For example, in May, it was reported that West Midlands Police in the UK would be piloting an initiative that is asking citizens to upload content relating to offences being committed. Leveraging existing hardware infrastructure Typically, when introducing any form of new security sensor or system, it is expected to be an expensive process. However, the hardware infrastructure is already in place as most people are already in possession of a smart device, either through work or personally. What’s more, there is typically an eager appetite to be a good citizen or employee, just so long as it isn’t too much of an inconvenience. Innovations in smart mobile devices has moved at such a pace that whilst many security professionals debate if and how to roll-out body-worn-cameras, members of the public are live-streaming from their full HD and even 4K ready phones. The technology to make every employee a smart sensor has been around for some time and keeps getting better and better, and it is in the pockets of most people around the world. What is different now is the potential to harness it and efficiently bring it in to the security process. All organisations need to do is know how to switch it on and leverage it.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
There’s a new big player – and familiar household name – coming into the security marketplace with the announcement of Motorola’s intent to acquire Canadian video manufacturer Avigilon Corporation, provider of video surveillance and analytics. Motorola Solutions points to an “avalanche of video in public and private sectors” as a motivation for the acquisition. Motorola Solutions’ dominance in the public safety market – where the Chicago company supplies police technologies, radios and other products – will provide new opportunities for Avigilon in a realm where it previously has not been dominant. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings. Meanwhile, Avigilon will “bring [its] advanced video surveillance and analytics platform to [Motorola’s] rapidly evolving public safety workflow,” according to Motorola, and enhance the larger company’s portfolio of “mission-critical communications technologies.” Avigilon’s end-to-end security and video surveillance platform includes cameras, analytics, video management and video storage. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings The broader solution Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as “a natural extension to global public safety and U.S. federal and military” applications, according to the company. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt. Not a bad price considering Avigilon’s stock price has traded as low as $13 a share in the last year. Avigilon has 1,200 employees with locations in Vancouver and Richmond, British Columbia, and Dallas and Plano, Texas. Revenue was $354 million in 2016. The transaction is expected to be completed in Q2 of 2018. Deploying pre-engineered solutions As an innovator in the security market, Avigilon has spearheaded an end-to-end solutions approach. Their success has even prompted some component manufacturers to expand their proposition into a broader “solutions” sale. Led largely by Avigilon, the industry pendulum has swung toward the simplicity of deploying pre-engineered end-to-end solutions. Open systems integrated using best-in-breed components from several manufacturers still have their devotees, and are needed in some situations, but Avigilon has made a strong case for the end-to-end alternative. Others have followed. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt Avigilon has also lately been a leader in implementing artificial intelligence and deep learning, including Appearance Search technology that can locate a vehicle or person from video across a site. Avigilon’s video surveillance platform seeks to transform video from reactive – looking back at what has taken place – to proactive, issuing alerts in real time. Avigilon also recently introduced Avigilon Blue cloud service platform to enable video system users to manage more sites with fewer resources. Investing and building Motorola is not a completely new name to the security market. Old-timers will remember Motorola Indala, a previous presence in the RFID access control market that was sold to HID Corp. in 2001. More recently, Motorola Solutions has invested in Vidsys, a provider of converged security and information management (CSIM) software and has implemented Vidsys CSIM through its Protect Series unified platform that aggregates and analyses information from multiple inputs for military and federal government properties. Motorola is also known as the inventor of the Six Sigma quality improvement process - and commitment to quality plays well among security integrators and end users. Motorola would presumably continue Avigilon’s licensing program, but rules-based video analytics patents’ importance may fade Avigilon owns 750 U.S. and international patents, including some covering basic underlying principles of video analytics, for which several video companies currently pay licence fees. Motorola would presumably continue the licensing program, although the importance of rules-based video analytics patents may fade as new deep learning and artificial intelligence (AI) approaches to video analytics emerge. Channel conflict A possible concern surrounding the acquisition is the issue of channel conflict. When it comes to larger end user customers, Motorola has embraced a direct-to-user approach that could be problematic in the eyes of Avigilon’s 2,000 resellers. Among the benefits Motorola says they bring to the table is the ability to “leverage [their] direct enterprise safes force for large deals.” They also say they “complement Avigilon’s channel with [Motorola’s] channel network.” The security industry has a spotty history of larger companies entering the market to buy existing businesses. Some have been a good fit, while others have not. The entrepreneurial spirit of more than one successful security company has suffered under larger corporate ownership, sometimes withering as new corporate overlords cut costs and stifle R&D. The more successful recent large acquisitions in our market – notably Canon’s acquisition of Milestone Systems and Axis Communications – have worked well because the acquired companies have retained some degree of independence and preserved the existing corporate culture. In the case of Motorola and Avigilon, obviously, time will tell.
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekday on its 392 trains. Built-in Intelligent Video Analytics Powered by cameras featuring built-in Intelligent Video Analytics, the solution was installed and configured to the specific requirements at the train depots by Bosch integration partner, Taylor Technology Systems Ltd., over the course of six months. Video security system relies on machine learning algorithms to automatically sound alarms on security threats Fully operational at all twelve locations, the video security system relies on machine learning algorithms to automatically sound alarms on security threats, such as intruders and perimeter breaches. Beyond security applications, the system also tracks important metadata on the arrival times of trains, while also monitoring deliveries at the train depots, among other AI-assisted functions that it carries out. IP-based cameras with Starlight technology The cameras portfolio installed across the twelve depots replaces an analogue legacy solution with IP-based security cameras from the Flexidome, Dinion, and Autodome product lines of Bosch Security Systems. These smart cameras include Bosch’s Intelligent Video Analytics capabilities as a built-in feature, ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Because night-time security and surveillance is critical, especially at the five unmanned train depots on the network, the Bosch cameras rely on Starlight technology to provide full intelligent analytics at night and in low light levels. The Starlight technology supports colour filtering down to a light level of only 0.0077 lux, so as to deliver detailed monochrome images where other cameras show no image at all, and guard against intruders and unauthorised entry around the clock. Featuring digital ‘trip wire’ to counter false alarms Highly resilient against false alarms, the smart cameras can detect movement at the perimeters of the train depots using a digital ‘trip wire’. In case of a security breach, the system alerts Southeastern Rail Network’s watch personnel, who can view live camera footage, as well as recordings of incidents for heightened situational awareness and total perimeter security. Instead of relying on the pre-configured capabilities, such as vehicle tracking and more, security personnel can also use the built-in camera trainer function to ‘teach’ new functionality, such as detecting certain types of objects or situations. Remote video recordings storage with Divar recorders Recordings from the depots are safely stored and managed remotely with Divar recorders in encrypted format As an integral part of this end-to-end Bosch security solution, recordings from the depots are safely stored and managed remotely, using Divar all-in-one recorders in encrypted format. When looking at the bigger picture, the video security solution adopted by Southeastern Rail Network is part of an industry-wide evolution from cameras as mere video capturing devices to smart sensors capable of collecting rich metadata. Insights beyond security This metadata unlocks unique insights beyond security, including video analytics at the train depots that support applications such as monitoring deliveries to onsite buildings, providing access to personnel and logging the arrival and departure times of incoming trains. The system thereby not only ensures that all train depots remain fully guarded and protected 24/7 against criminal access, but also provides a data-based foundation to keep efficiency gains and cost savings on track in the long run.
Staff safety and customer service will be boosted across Sydney’s rail network with the deployment of SafeZone®, the pioneering safety, security and emergency management solution from CriticalArc. The technology will enable Sydney Trains to manage a wide range of situations, including mitigating risks to staff and customers and strengthening the capacity to respond to incidents and emergencies across the network. SafeZone will put up to 2,500 of Sydney Trains’ front-line staff directly in touch with security control room teams, letting them summon immediate assistance at the touch of a button via their assigned smartphone. This capability is as valuable on crowded city platforms at rush-hour as it is on more remote suburban stations where staff may be working alone late at night. Enhancing staff safety The investment in SafeZone will cover over 175 stations across the greater Sydney area and is the latest step in a modernisation drive to transform Sydney Trains’ operations, with more than a million customer journeys taken on the network every weekday. Employing proven technology such as SafeZone will help us solve day-to-day challenges" “Sydney Trains is committed to fulfilling our duty of care to all of our staff and enhancing our high safety standards in order to maintain and enrich customer service levels on station platforms,” explains Mark Edmonds, Manager of Security Capability, Network Operations. “Employing proven technology such as SafeZone will help us solve day-to-day challenges, further improving the safety of our staff and helping them work more effectively to continue to deliver world-class service.” Real-time situational awareness Across its transportation network, Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events. This makes possible a wide range of security management functions, such as sending targeted alerts to specific individuals and groups. It enables control room operators to pinpoint the location of individuals needing help so they can initiate the most efficient and rapid emergency response. “This visionary deployment by Sydney Trains will have a significant impact on the safety and wellbeing of staff and thus will produce dividends with regards to customer service and satisfaction, and the potential for streamlined operations moving forward,” says Glenn Farrant, CEO, CriticalArc. “With staff safety a primary concern for all rail operators internationally, implementation of this technology by Sydney Trains represents a significant step forward for the sector and will be the blueprint for many implementations to follow.”
Teleste Corporation has been selected as a vendor of on-board video surveillance and public announcement systems to Stadler’s FLIRT trains for Wales & Borders in the UK. The end-customer in the project is Transport for Wales Rail Services. Teleste’s deliveries to Stadler will take place in 2020–2023. The on-board video security and surveillance system will include internal, external and pantograph front-facing cameras, video recorders and user interfaces. Additionally, IP amplifiers, passenger intercommunication systems, and driver microphones will be delivered to the trainsets as part of the public announcement system. “We are delighted to continue our cooperation with Stadler as a supplier on modern, state-of-the-art on-board systems to the FLIRT Electric Multiple Unit platform. Our solutions have been designed and tested for consistent high quality over the course of many years, and we are confident that they will provide Stadler with the right tools for building these innovative high-speed regional trains for safe and enjoyable travel,” said Jörn Grasse, Vice President of Rail Information Solutions at Teleste.
Teleste Corporation and a renowned international rail vehicle construction company Stadler have agreed on deliveries of Teleste’s passenger information and CCTV systems to Stadler’s new FLIRT trains for Norwegian State Railways. The deliveries will take place in 2019–2021, continuing the cooperation between Teleste and Stadler that was started in 2009. The deployment will include on-board passenger information (PIS) and CCTV systems for more than 20 trains complemented with video security cameras and video recorders, intercommunication and public address systems as well as TFT and LED information displays. The flexible and future-proof system works seamlessly together with the existing PIS systems, delivered during earlier stages of the cooperation, and includes upgrades such as enhanced cyber security. Rolling stock manufacturers We have been able to fulfil Stadler’s requirements for high-quality delivery of passenger information" “Today, transport operators and rolling stock manufacturers need to stay at the cutting edge of on-board technologies to deliver an excellent travel experience for the growing number of public transport users who wish to be informed about their travel at every step of the journey." "We are pleased that we have been able to fulfil Stadler’s requirements for high-quality delivery of passenger information on their trains to Norway, and we are looking forward to continuing our cooperation,” stated Jörn Grasse, Vice President of Rail Information Solutions at Teleste. Effective transport system Teleste’s on-board passenger information system is based on modular software architecture, which makes it possible to use the system technology for different kinds of applications. The system provides a flexible option for the delivery of passenger information for rolling stock manufacturers and operators who wish to build and run an effective transport system that can carry large volumes of passengers smoothly and safely every day. Customers can visit the company’s website for more information about the solution and its benefits.
Redline, an Air Partner company and a renowned provider of global security solutions, announces it has secured a four-year contract to provide Align JV ("Align") with security consultancy support on the delivery of a key section of the High Speed 2 (HS2) rail line between London and Birmingham, known as the C1 package. Align, a joint venture of three international and privately-owned infrastructure companies, was awarded the C1 package of HS2, worth £1.6bn, in July 2017. C1 consists of 21.6km of high-speed rail infrastructure in a rural environment, including a 3.37km viaduct across the Colne Valley, a 16.04km twin-bored tunnel beneath the Chiltern Hills, and five vent shafts. Facilities management company Align engaged Redline in 2017 to support on this project and a dedicated Security Consultant has worked in-house with the Align team ever since as it has progressed the design and started important pre-construction activities. A Notice to Proceed was issued in April 2020 and Align has extended its contract with Redline for a further four years to ensure security measures are fully considered in the next phase of the rail infrastructure project. Redline will increase its consultancy support, with a Security Manager now joining the Security Consultant already in place. This contract extension follows on from the recent announcement that Redline has also won long-term quality assurance contracts with Aéroport Nice Côte d'Azur and the international facilities management company OCS Group UK. Improve quality and visibility The acquisition of Redline was the highlight of our last financial year and we are very pleased with its performance" In addition to the aviation sector, Redline has a well-established footprint within Critical National Infrastructure (CNI) and locations of special importance, as well as government buildings. Mark Briffa, CEO of Air Partner, said: "The acquisition of Redline was the highlight of our last financial year and we are very pleased with its performance since joining Air Partner. One of the reasons we acquired the business was its long-term contracted revenues with global blue-chip customers, which in turn will serve to improve the quality and visibility of the Group's overall earnings." Security consultancy services "This contract extension is a fantastic example of this, and we look forward to continuing to play an important role in this high-profile project." Paul Mason, Managing Director of Air Partner's Safety & Security division, added: "We are delighted to be continuing our work with Align as it embarks upon this next exciting stage of the C1 route. Redline has been working closely with the rail and CNI sectors for over nine years now and will continue to draw on this extensive experience and expertise to provide Align with the highest standard security consultancy services."
ASSA ABLOY High Security and Safety Group has been named as the preferred supplier of security solutions for the Intercity Express Project (IEP) and East Coast Open Access (ECOA). The new IEP trains from Hitachi, which had their first roll out in 2017, have been introduced to replace older fleets with new high-speed trains and improve the current network. Further projects featuring the Hitachi engineering are now also planned across the UK. Locking systems, emergency access and egress devices The Group, which is a tier one supplier to the IEP project, has supplied a range of products including locking systems, emergency access and emergency egress devices. Thousands of products have been supplied over the past four years for trains that will be deployed over the whole UK rail network, operated by multiple train operators, replacing trains that were built by British Railways back in the late 1970s. Following on from the success of the IEP projects, the Group has also been named as preferred supplier for locking systems, emergency access and emergency egress devices for Hitachi’s latest project named East Coast Open Access (ECOA).