This year’s Global Security Exchange in Chicago will see Synectics (booth 2088) demonstrate why the powerful capabilities of its Synergy 3 command and control platform were selected for a next-generation mission control hub for one of Europe's largest urban rail networks. With a comprehensive integration ecosystem combining security, surveillance, and operational sub-systems – through features like workflows, workforce management, cloud-based evidence management, and mobile applicat...
You don’t need to continue using keys and key cards. When you want effective first-line security for private doors in public spaces, you no longer need cumbersome kit. To keep opportunist hands off your belongings, the Code Handle 4-digit code-operated electronic handle locks without any wires, expensive hardware or software, mechanical keys or changes to your existing doors. PIN codes unlock so many features of our daily lives, from a smartphone to your online bank account. Now you can u...
When a company the size of TE Connectivity, a global provider of connectors and sensors, works to change the future, the positive results can be felt around the world. TE details how it is working toward its purpose of building a safer, sustainable, connected and productive future through its products, partners and business practices in the 2018 Corporate Responsibility Report. "Our employees genuinely want to feel like they are leaving the world a better place for the next generation and helpi...
Innovator of road blocker, bollards and vehicle barrier systems, ATG Access, has promoted Iain Moran to sales and marketing director. Having worked at ATG Access for the past 18 years, Iain is hugely experienced and has helped to shape the company’s success in the UK and internationally, including in Australia and the USA. As part as his new role, Iain will lead a team of eleven to deliver ambitious growth targets, both internationally and in the UK, as the business continues to expand an...
Videotec presents NTX, the new IP68 stainless steel thermal camera, developed to provide an efficient and preventative surveillance system in the most critical environmental conditions. The NTX thermal camera offers temperature detection based on the 4 central pixels of the image, and with the advanced version, the temperature of a specific object can be measured at any point in the image by means of defining a specific area. As well as this, the radiometric functions offer the option to set a...
The Sapura Group, Malaysia’s leading technology organisation, has confirmed that it will be host operator for TCCA’s Critical Communications World (CCW) 2019, the world’s premier event for critical communications professionals. CCW will be held in Kuala Lumpur from 18-20 June. Innovation and building capability Sapura operates the Government Integrated Radio Network (GIRN) which utilises some 600 TETRA base stations to serve more than 40,000 Public Protection and Di...
Expertise in safety-critical equipment for the rail industry has won significant contracts for Pickersgill-Kaye (Kaye), this time from Nabtesco Corporation, a Japanese firm manufacturing high performance train door operating units for the global market. Kaye and Nabtesco Corporation’s Italian subsidiary, Nabtesco-Oclap, jointly developed the Emergency Egress Device (EED) and Emergency Access Devices (EAD) for power doors currently being supplied by Nabtesco Oclap into a UK rail vehicle manufacturer for UK and Thailand operated new build vehicles. Supplying Emergency Egress and Access units We have worked together to design suitable safety equipment for all their units that can be used on vehicles around the world"Leeds-based rail industry specialist Kaye, whose range is part of the High Security & Safety Group, a division of ASSA ABLOY Opening Solutions UK and Ireland, is one of the most trusted names in access control solutions. The business has already sealed a deal with Nabtesco for supplying over 1000 Emergency Egress and Emergency Access Units that will be fitted to newly built vehicles for a huge suburban commuter network under construction in Thailand and for new train projects in the UK. Andy Hewitt, Kaye’s Rail Sales Manager, said: “Nabtesco-Oclap needed European-style EED and EAD devices for the train door gear it was manufacturing so they approached us. We have worked together to design suitable safety equipment for all their units that can be used on vehicles around the world, hence the UK and Thailand jobs.” Reliable and cost competitive products Nabtesco-Oclap’s Commercial Director, Stefano Losito, added: “Kaye has a lot of experience developing EED and EADs. They offer very reliable and cost competitive products. We are delighted to be working with them and look forward to doing so in the future.” Kaye’s EED and EAD kit comprise a handle which when pulled activates an electric switch that alerts the driver to the operation of the devices but prevents the door being opened while the vehicles are moving. If after a set time the driver fails to respond, the train will automatically stop. Kaye has built a solid reputation through the specialist design and manufacture of door locks and security systems Supplying essential safety critical equipment for the rail industry, such as internal egress and external access devices, has been at the heart of Kaye’s success. It has built a solid reputation through the specialist design and manufacture of door locks and security systems. Custom-built equipment and standard products, including pre-production models, can all be made to order at its flagship centre of excellence in Leeds. R&D hub to boost sales Owner ASSA ABLOY’s comprehensive renovation has turned Kaye’s manufacturing facility into an R&D hub for rail technology to further boost sales and help the business compete successfully on the global stage, designing and engineering the innovative solutions that train builders will require in the future. Nabtesco turned to Kaye for its safety critical systems because the Yorkshire company is a leader in safety critical equipment, guaranteeing products are manufactured with high quality materials and meet regulatory industry standards and specifications for the safe operation of trains, stations and infrastructure.
Pelco by Schneider Electric, a global provider of trusted video surveillance solutions, announced the immediate availability of the new Spectra Professional 4K cameras to their portfolio of high resolution (4K) fixed and Pan Tilt Zoom cameras. From license plates to faces, the rugged outdoor camera features state-of-the-art surveillance camera resolutions and compression standards to clarify details of interest in crowded or poorly lit areas such as city surveillance, airports, metro stations, waterways, roadways, bridges, and other outdoor commercial applications. Ability to zoom in with greater detail With 4K resolution, one camera can cover a large area and offer the ability to zoom in with greater detail"Areas such as seaports and waterways are particularly in need for better surveillance technology, with an estimated 50 billion U.S. dollars in loss annually according to the National Cargo Security Council. The Spectra Professional 4K provides a solution for organisations who are frustrated with the inability to zoom into crowded, outdoor areas with low levels of light. “Traditionally, when operators zoom-in on 1080P video, the details can become indistinct because there are only so many pixels,” explained Rob Yockey, Pelco’s Senior Product Line Manager. “With 4K resolution, one camera can cover a large area and offer the ability to zoom in with greater detail. This technology greatly improves security operations in both live monitoring as well as in forensic analysis.” Infrared illumination up to 150 metres The Spectra Professional 4K camera technology enhances the ability to recognise and identify objects at greater distances. It also provides infra-red illumination up to 150 meters, streams video in H.265, H.264 or MJPEG formats, and can see 15 degrees above the horizon. Spectra Professional 4K’s features capture outstanding detail in low-light conditions and is ideal for tracking people and vehicles" “Pelco continues to expand its 4K resolution camera offering with the Spectra Professional 4K line of PTZ cameras by providing detailed images more clearly than ever before at greater distances,” Yockey continued. “Spectra Professional 4K’s innovative features capture outstanding detail in low-light conditions and is ideal for tracking people and vehicles across wide spaces.” Key features of Spectra Professional 4K In addition to the benefits that the Spectra Professional 4K camera provides with outstanding image quality, smart compression technology and sharp 4K detail, the new camera also includes the following key features: Improved detection: With up to 4K resolution at 30ips, the Spectra Professional 4K can cover a large area with clarity of detail to record information such as license plates numbers or faces of people. Primarily for outdoor applications with poor lighting conditions, the camera provides IR capabilities like Esprit Enhanced IR modelsIntegrated IR: Primarily for outdoor applications with poor lighting conditions, the camera provides IR capabilities like Esprit Enhanced IR models. In response to some cities passing laws to restrict white light pollution near apartments or in empty parking lots, the camera provides IR illumination that enables operation in the absence of visible light. Operational efficiency: The camera offers operators H.265 video encoding and Pelco Smart Compression that reduce the storage required while preserving image quality. With excellent PTZ responsiveness and features such as patterns and frame scan, Spectra Professional 4K enables close manual tracking of people or vehicles as well as ability to cover spaces in an automated fashion. Tilt to + 15º Above the Horizon Look-Up: Allows for extended viewing area above most dome cameras that can only see to the horizon. EIS (Electronic Image Stabilization): Reduces blurring associated with camera motion in environments subject to vibration.
As strong, heritage brands in the high security and rail industries, CLCS, ILS and Kaye each offer their own specialisms and sector expertise. By bringing these well-known brands together under one new group, ASSA ABLOY Opening Solutions UK & Ireland will provide a stronger, more comprehensive offering to different sectors. High security locking solutions Each brand enjoys its own areas of expertise, with CLCS a prominent supplier of high-security locks to custodial, secure healthcare, government and secure education environments. ILS is a global manufacturer of high security locks for safes and vaults, providing solutions to the banking, construction, leisure and jewellery sector. Kaye is a globally renowned in design and manufacture of highly robust, specialist door locks for the architectural and railway industries. The CLCS, ILS and Kaye divisions will continue as distinct brands within the High Security & Safety Group, which will sit alongside ASSA ABLOY Opening Solutions UK & Ireland’s other specialist business units. These include the Door Group, Door Hardware & Access Control Group and the Project Specification Group. High Security & Safety Group Simon Teagle, Managing Director, High Security & Safety Group, said: “The creation of the new High Security & Safety Group will help signpost our specialist high security, safety and rail brands to the market, giving them one point of contact and access to a wider range of products, as well as a more tailored solution. Utilising the strength of the brands, the quality of the products and their experience in these areas, ASSA ABLOY Opening Solutions UK & Ireland now has a dedicated Group covering the specific needs of high security and safety customers.”
IP communications enabler Softil today releases its Outlook 2019 for the Mission Critical Communications industry. For Softil, enabling Mission Critical Communications (MCC or MCX) will be its fundamental mission for the year ahead accelerating the transition to 21st century technologies for people whose jobs help and save the lives of others. "Softil sees 2019 as the year when MCC solutions and services finally get into the hands of First Responders be they the armed forces, police, ambulance or other emergency service groups, as well as professional radio users in the fields of transportation and mining among others," says Sagi Subocki, Softil's Vice President, Products and Marketing. "The year will see First Responders and professional radio users becoming better supported in their tasks through the applied use of technology." Dual-mode devices The emergency worker's device is not an interworking appliance, but instead, it can simply allow users to be connected to both worlds - simultaneously The year 2019 will see First Responders begin supplementing the humble radio so trusted by multiple generations of firefighters, police officers and emergency workers over the years with smartphones. At first, these might also be dual-mode devices, combining LMR and LTE capabilities. Once smartphones become commonplace in MCC, all will be able to work faster and better. It is nice to envision how new generation of the technology replaces the old generation in a blink of an eye - just like you see in the movies. This is not how it happens in real life - the old and new must peacefully coexist for a while. Moreover, they do not just coexist, but rather interwork. The emergency worker's device is not an interworking appliance, but instead, it can simply allow users to be connected to both worlds - simultaneously. High speed rail networks We should see LMR devices being extended with MCPTT capabilities first before full-blown MCX devices completely replacing them. Softil predicts that quite a few dual-mode radios will appear on the market during 2019. Mission Critical Communications for trains, commonly referred to as LTE-R, are already deployed, but on a limited scale. Today, South Korea is leading the railway world with new MCC LTE-R terminals deployed on its high speed rail networks. However, as the standards for MCC for Railroads are in the final stages with 3GPP Release 15 providing the base, and Release 16 defining the necessary changes in architecture, Softil expects many more LTE-R trials and deployments over the next 2-3 years - especially as GSM-R (old communication technology for trains) will sunset in 2025. Unassociated videos The console will become the critical element in the interconnection of the LMR and MCX worlds and be in service before the end of 2019 The Dispatch Console is a critical element of emergency communications - someone has to have a ‘10,000 foot view’ of everything happening with First Responders in real time to coordinate all activities. This is where the dispatch console operator comes into play. As MCC over LTE trickles onto the front line in 2019, dispatch consoles will manage video streams, video communication, chats and more. The console will become the critical element in the interconnection of the LMR and MCX worlds and be in service before the end of 2019. It is essential to keep track of what is happening on the front line - we need to create records of all the activities of emergency workers at all times. In the past, voice and some unassociated videos were recorded, but in the new MCX world, there is a mass of data that needs to be recorded and archived. Provide reliable connectivity This spans audio, video, chat, location and much more from a vast array of supplementary data from ‘Life-saving things’, commonly known as IoT devices. The industry will see the first recording solutions appearing in 2019 as they are critical for the overall MCS umbrella. In the mining industry, communication is a key element of the ecosystem and on a par with all the sophisticated machinery and tools in use. MCC over LTE new communication capabilities, such as video, chat and file exchange, offer great advantages to miners over the traditional radio. However, common LTE towers cannot provide reliable connectivity inside mines and such deployments will require private LTE. Softil expects pilot Private LTE with MCS (Mission Critical Services) setups to go into trials in 2019, with full-scale deployments in 2020/2021. Offering greater speeds 5G developments are advancing quickly, driven by the insatiable appetite for speed, bandwidth and full QoS/QoE spectrum of humans and machines alike 5G developments are advancing quickly, driven by the insatiable appetite for speed, bandwidth and full QoS/QoE spectrum of humans and machines alike. Core 5G trials are already under way around the world, but that doesn't affect MCX at the moment. However, Softil expects to see some alignment of MCX technologies with 5G networks and architectures in the next 3GPP Release 16 (due December, 2019) and further enhancements in Release 17. The year 2021 will most likely will be the year when MCX will commercially start running on top of 5G, offering greater speeds and capabilities. ProSe is the 3GPP standard for direct, or so-called Device-to-Device communications. This is essential for MCC as it is always possible that in the course of emergency operations, the macro network will become unreachable. First responder smartphones In this event, First Responders must still be able to communicate with each other, so this is a critical need to make daily use of MCX over LTE possible. The year 2019 might be the year when ProSe begins its journey. However, thanks to dual-mode devices, LMR will still be there for device-to-device communications. Voice controls are not new - Siri and Alexa have been helping with everyday tasks for several years now, but as First Responder smartphones appear, Softil expects that voice controls will be elevated to the next level of importance in 2019 with commands such as ‘alert all my group members,’ ‘show me the map,’ ‘start recording my video,’ and ‘switch my primary camera’ becoming commonplace - all while wearing gloves. Early market trials MCC over LTE devices will get into the hands of users adding the ability to use special goggles with embedded screen and eye control Climbing mountains or even stairs is done one step at a time. MCC over LTE devices will get into the hands of users adding the ability to use special goggles with embedded screen and eye control. This is already available in many virtual reality (VR) games and will become a natural extension. Softil does not expect VR UI to become mainstream in 2019, but some early market trials should see the light. Emulating the Black Mirror anthology TV series that explores how humanity's greatest innovations and darkest instincts collide, Softil expects that adding Augmented Reality capabilities to VR UI goggles will emerge in 2020/2021. Looking at a person's face, a car's license plate or a store's name, these smart goggles will quickly produce and visualise all the information available on any person or object. Practical solutions The Internet of Things (IoT) is a vast space of tiny sensors, devices, modules and systems - all communicating with each other and producing petabytes of data aided by AI capabilities to make sense of it all in real time. Nothing is immediate with IoLST, but expect some interesting trials to begin in 2019, and practical solutions coming to market in 2022-2025 When it comes to the world of public safety and emergency communications, IoLST holds tremendous promise, offering capabilities such as detection of ‘shots fired,’ ‘officer down,’ the ability for a firefighter in a building to take control over sprinkler systems and emergency valves from his/her MCX handset, and to connect and communicate with any car or infrastructure on the road (collectively known as V2X) and much more. Nothing is immediate with IoLST, but expect some interesting trials to begin in 2019, and practical solutions coming to market in 2022-2025. Unbreakable trust relationships Blockchain technology allows the establishment of strong, secure and unbreakable trust relationships amongst a large enclave of ‘things’ Every industry has jumped on the blockchain bandwagon looking for practical use and applications for such a promising technology. Without any regards to the blockchain, MCC is currently living its own revolution in moving from the traditional radio to broadband technology. Once broadband MCX becomes mainstream, the public safety and emergency communications industries will look into blockchain technology as a possible solution to streamline and simplify day-to-day operations. It is unlikely that blockchain powering First Responder communication solutions happens before 2023, if at all.
Ava Group, a provider of risk management services and technologies, announces new enhancements to its FFT Aura Ai-2 advanced fibre optic detection controller, which offers superior intrusion detection location accuracy together with extended range performance. The system is perfect for monitoring pipelines, perimeters and communications networks. Mark Horton, Global Sales and Marketing Director at Ava Group comments, “The Aura Ai-2 is our next generation controller and was released to industry acclaim last year, being recognised for its ground-breaking performance. However, the system has had further performance upgrades and now offers monitoring of optical distances of 80km for perimeter fence detection or 110km for pipeline or covert buried detection.” Fence mounted application “Accuracy has also been enhanced, the system can now pinpoint an intrusion location down to within +/- 2m metres on a fence mounted application. The controller is also able to cover different applications simultaneously, for example, fence mounted and covert buried detection. This essentially offers two units in one, saving on both procurement and operational costs.” The Aura Ai-2 controller works by pulsing laser light along optical fibre cables connected to each of its two detection channels The Aura Ai-2 controller works by pulsing laser light along optical fibre cables connected to each of its two detection channels. Dependent on the application these cables are either: laid adjacent to a pipeline, attached to a perimeter fence or buried along a perimeter boundary. Minute disturbances cause changes in the scattered light and the Aura Ai-2 controller automatically analyses this reflected light to detect, locate and report disturbances. Reduces nuisance alarms Advanced optical signal processing algorithms, combined with artificial intelligence, accurately and reliably analyse the reflected light to discriminate between intrusions and other causes of disturbance. This significantly reduces nuisance alarms whilst maintaining full awareness of any situation. When wired in a redundant loop configuration the two-channel controller provides cut resilience and continues to provide detection in the event of a deliberate or accidental cable cut. Dr Jim Katsifolis, CTO at Ava Group Technology Division comments, “As is the case with any fibre optic system, the key to increasing performance over distance is to maximise its optical power budget, that is, the maximum allowable optical signal loss the system can tolerate while still maintaining proper operation. We have enhanced our Aura Ai-2 platform by designing new ultra low-noise detection electronics that significantly increase its dynamic range (and consequently its optical power budget).” Protection solution for critical infrastructures “When combined with other design improvements that minimise noise while increasing detected signal strength, the Aura Ai-2 now has an industry leading power budget of 13.5 dB. We’ve achieved higher signal-to-noise ratios across the whole sensor, maximising the signals detected from both the near and far ends of the sensing fibre.” Aura Ai-2 is the ideal protection solution for critical infrastructures such as high-risk oil & gas pipelines, chemical or water pipelines As it utilises the sensitivity of fibre optic technology, Aura Ai-2 is also perfect for monitoring fibre optic communications networks. The system can monitor for tapping and tampering by connecting spare (dark) fibres inside each network cable to Aura Ai-2. Network cable disturbances, including removal of protective layers, attempted tapping or cable movement, will be instantly detected and generate an alarm indicating the location. Aura Ai-2 is the ideal protection solution for critical infrastructures such as high-risk oil & gas pipelines, chemical or water pipelines as they traverse often remote and inhospitable locations. It is also perfect for protecting long boundary perimeters alongside railway lines, airports and ports. Perimeter fence project Mark Horton added, “In the key terms of distance and accuracy, Aura Ai-2 easily outperforms its competitors and has already proven to be highly popular in the market. The system has already been chosen for a large Middle East pipeline and perimeter fence project, with the protection of both assets conveniently controlled from just one controller. In another project, the system has also been employed to monitor and alert of any rockfalls or landslides near a rail line that could endanger people or rolling stock.” Since its launch, Aura Ai-2 has already won awards including at the Securex Poland International Security Fair Awards in relation to its perimeter protection capabilities. With a combination of performance, reliability and flexibility, Aura Ai-2 is finding new and innovative uses as Mark Horton concludes, “This powerful solution has many potential uses and is already being utilised to protect the security of vital government facilities, military installations, critical infrastructure and custodial facilities.”
The 38th International East - West Security Conference organised by Capricorn Conferences and Exhibitions was held on 5th and 6th November 2018 at the elegant Hotel West End on the Promenade des Anglais, Nice, France. Delegates representing private and public sector organisations from the Russian Federation and Ukraine participated in an intensive two days of presentations by speakers drawn from the UK, USA, Italy and Russia, supported by simultaneous translation in English and Russian. Conference Chairman, Patrick Somerville QPM, welcomed the delegates and under the theme of ‘Protecting Yourself and Your Business’ reflecting the recent collapse of several retail and other sector businesses, introduced a programme that included the development of corporate governance and regulation in the UK with emphasis on the ‘Comply or Explain’ approach to compliance with codes of conduct and management. National critical infrastructures The need for business continuity and planning based on the international ISO22301 Framework was discussed against the background of global threats The issues of integrated security management and fraud prevention practices were highlighted by actual case histories from various jurisdictions, together with understanding of the ‘Audit Expectation Gap’ that exists between stakeholders and auditors evidenced by the failure to the discovery of fraud at all levels during formal audits. The need for business continuity and planning based on the international ISO22301 Framework was discussed against the background of global threats to business from cyber-crime and related activities. New cyber counter measures including the growing use of artificial intelligence, video analytics and biometrics as tools in the fight to protect national critical infrastructures, businesses and public services outlined how governments and industries were raising the levels of protection required against increasingly sophisticated and penetrating threats. Russian commercial activities Various speakers addressed the importance of protecting corporate assets with emphasis on due diligence procedures to prevent insider crimes and fraud. Case studies of elaborate schemes and compliance failures in both commercial and banking sectors resulting in massive losses and illegal gains demonstrated the considerable efforts needed to investigate and successfully prosecute those responsible. Insights into the operation of Russian commercial activities, including measures to prevent money laundering and terrorism financing in a business engaged in the leasing of plant and stock for the operation of railways and other enterprises contributed to the range and diversity of the topics discussed. Current concerns about identify theft, data security and protection from cyber-attacks featured prominently in the programme. Best business practices At the conference closing banquet several delegates expressed their appreciation of the opportunity to meet with colleagues from other countries Delegates were again urged to ensure that awareness of new developments and systems and the protective measures needed were not only understood at Board level in all organisations but were recognised and endorsed as Board level responsibilities for effective implementation and oversight where required. At the conference closing banquet several delegates expressed their appreciation of the opportunity to meet with colleagues from other countries, sharing professional experiences through presentations and discussions, and gaining knowledge and understanding of best business practices in countries represented. The International East West Security Conferences are promoted twice yearly by Capricorn Exhibitions and Conferences in cooperation with several other supporting bodies and held in various European cities to promote understanding and the exchange ideas and information between those engaged in managing security in public and private sector organisations in United Kingdom, Member States of the European Union, the Russian Federation and other countries in Eastern Europe.
Today, customers are demanding immediacy, personalisation and seamless services from their providers and our desire for instant gratification means that those servicing the public need to provide easy, fast, smooth and continuous ways to meet customer expectations. This is where interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way. In recent years, kiosks have fast gained popularity, not only because they enhance customer satisfaction, as they operate in self-service mode, but they also provide crucial information or services to customers as and when they need it. Think about how you utilise such services, at a railway station to buy tickets, in a fast food outlet to order food or in other ways as you go about your daily business. Interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way Today, kiosks are typically placed in high foot-traffic environments such as retail stores, hospitals, banks, hotels, airports, courthouses, libraries, railway stations – you name it – providing customer access to information, products, websites, tools, or applications. For those less familiar, an interactive kiosk is a computer terminal featuring specialised hardware and software that provides access to information and applications for communication, commerce, entertainment, or education. Kiosk software platforms are easy to deploy Integration of technology allows kiosks to perform a wide range of functions, for example, kiosks may enable users to order from a shop's catalogue when items are not in stock, check out a library book, look up information about products, issue a hotel key card, or enter a public utility bill account number in order to perform an online transaction. Kiosks are computing platforms where the user interface needs to be limited to serve a specific purposePut simply, kiosks are computing platforms where the user interface needs to be limited to serve a specific purpose. Whether it is a citizen-facing platform in a government building or a device in a train station, the common theme is that the user is constrained to undertake very specific tasks with that device i.e. buy a train ticket. The device itself might have a full-blown operating system but all the user can see is the app and what they need to do. Therefore, it is very important for kiosk software platforms to be very easy to deploy and they must provide a very intuitive user experience. It is very much about the interaction the user is undertaking and little beyond that, which means the software must be optimised for user interaction in that context. But what that means is that security is often a secondary consideration, with many kiosk software providers paying lip service to security, while they focus primarily on ease of use and ease of management. Thinking of a kiosk as just a terminal that wouldn’t be of interest to a hacker is precisely why they are so attractive to attacks The threat of cyber attacks However, today we are seeing cyber-attacks escalating and becoming an everyday occurrence; as adversaries seek out new methods of attack and new threat vectors, so kiosks are becoming more of a target and an attractive platform for cyber adversaries to attack. Most kiosk software platforms just provide a management layer to configure an endpoint device in that kiosk. If you think about a traditional endpoint device such as a laptop, they are more likely to have a greater set of defence tools deployed, actively managing and monitoring the device, regularly patching and updating it. This is not the same where kiosk platforms are concerned. Kiosks are becoming more of a target and an attractive platform for cyber adversaries to attack So why is this? Often, the business can’t justify having a full-blown operating system and sophisticated defence tools on that platform, especially if they have a large number of kiosks deployed out in the field. They are normally in highly remote or widely geographically dispersed locations, which means there are significant costs involved to go out and fix them. Protecting devices in a more robust way Likewise, organisations don’t always have the local IT resource in many of these locations to maintain the equipment and its security. Or, if there is a patch management process in place it might not always be timely. For example, if you adopt an Android platform, Google regularly announces the vulnerabilities they have patched. This means the device manufacturers have to try and create patches for the vulnerabilities that have been announced publically to the cybercriminals. Adversaries know there is a window of opportunity they can exploit because the software author has told them about it. That time delay can be even worse in kiosk ecosystems, where there may be a diverse geographic spread of devices. We need to increasingly think about how we protect these devices in a more robust way Or the kiosk might simply be old. One of the reasons the WannaCry ransomware attack ended up being so widespread, is that there were old computing terminals throughout the NHS, running old operating systems. Any unpatched version of Windows is susceptible, so it can end up being a false economy by attempting to run these legacy systems for too long. As we continue to exploit and expect technology in every far-flung corner of the world, we need to increasingly think about how we protect these devices in a more robust way. Thinking of a kiosk as just a terminal that wouldn’t be of interest to a hacker is precisely why they are so attractive to attacks, because they know the security might not be as tight as it should be. Making kiosks more secure could be the difference between you being breached and remaining safe.
A deep native integration of Bosch cameras with software from ISS proactively catalyses the best in security and surveillance, while providing advanced intelligent video tools. ISS SecurOS provides intelligent enterprise video management solutions with emphasis on providing scalability and flexibility to meet the customer’s needs. Deeply integrating built-in video analytics from Bosch cameras improves operator efficiency and situational awareness to manage complex environments. ISS SecurOS maximises camera performance for license plate recognition, face recognition, and container/train carriages recognition. The cameras meet the performance needs for advanced analytics, ensuring the success of projects and saving time, resources, and cost. The partnership has delivered multi-thousand-camera safe city deployments, industrial analytics solutions, and systems for large-scale transport providers. The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each vehicle License plate capture The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each and every vehicle. Operations managers are accountable for efficient logistical flows and effective use of roads and parking lots. Knowing the ins and outs of the transport infrastructure and what’s going on at all times provides the knowledge required to ensure operations are running safely, efficiently and in compliance with the rules and laws. An important part of this comes from monitoring which vehicles are entering an area and ensuring they are allowed to be there. Capturing license plates of every vehicle moving in an area provides knowledge of traffic flows and usage patterns. Such a solution should also allow a customer to easily configure and manage monitoring preferences and permit easy data exchanges with other operational management systems and services to manage an infrastructure and logistics as a whole. Reliable license plate data Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments As transportation infrastructures are often operating around the clock, reliable vehicle identification data is required 24/7. This means that the cameras capturing this data should work in all lighting and weather conditions, for both slow- and fast-moving vehicles. Cameras must be built to produce usable images 24/7 in all weather conditions. For quality license plate recognition in both day and night, the cameras make use of supplementary infrared light. A special License Plate Recognition (LPR) mode, developed in collaboration with LPR software, delivers readable license plates even with glaring headlights and with fast moving vehicles. Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments. License Plate Capture solution The SecurOSTM AUTO system of ISS, when used with Bosch cameras, provides easy to deploy solutions for all of these requirements. It recognises license plates from many countries, manages and matches white, hot and blacklists and notifies the operator either in the GUI or through a messaging interface to other management systems. Additionally, the system can be used and managed as a standalone or embedded in other management systems on the premises.
Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need only to watch the television when a major incident is being reported. The images are often from a witness at the scene who recorded it on their device. It is madness that it has until now been easier for people to share information around the world via Facebook and YouTube etc, in a matter of minutes, than it is to transmit it to those that need to coordinate the response. The public as an additional security and safety sensor In the UK, a marketing campaign designed by government, police and the rail industry is currently running. Aiming to help build a more vigilant network on railways across the country and raise awareness of the vital role the public can play in keeping themselves and others safe, the ‘See It. Say It. Sorted’ campaign urges train passengers and station visitors to report any unusual items by speaking to a member of rail staff, sending a text, or calling a dedicated telephone number. Essentially, the campaign is asking the public to be an additional safety and security sensor. However, with the help of the latest mobile app technology, it is possible to take things to a whole new level and this is being demonstrated by a large transport network in the US. This organisation recognised that the ideal place to begin its campaign of connecting smart devices to the control room as an additional sensor, was by engaging its 10,000 employees (incidentally, this is approximately twice the number of surveillance cameras it has). These employees have been encouraged to install a dedicated app on their mobile devices that enables them to transmit important information directly to the control room, as well as a panic button for their own safety. This data can be a combination of images, text, audio, video and even live-streaming, to not only make the control room aware of the situation but give them eyes and ears on the ground. For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information Combatting control room information overload For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information. For example, if an alert comes in about a fire on platform 3, the operator doesn’t necessarily require any of the information from the other sensors, nor does he need to verify it’s not a false alarm. He knows that the information received has been ‘verified’ in-person (it is also time and location stamped) and that there is an employee located in the vicinity of the incident, who they can now directly communicate with for a real-time update and to co-ordinate the appropriate response. Compare this to a 24/7 video stream from 5000 cameras. It is in stark contrast to the typical issue of sensors creating information overload. The employee only captures and transmits the relevant information, so in essence, the filtering of information is being done at source, by a human sensor that can see, hear, and understand what is happening in context. So, if an intruder is climbing over a fence you no longer need to rely on the alert from the perimeter alarm and the feed from the nearest camera, you simply send a patrol to the location based on what the person is telling you. Furthermore, if the control room is operating a Situation Management/PSIM system it will trigger the opening of a new incident, so when the operator receives the information they are also presented with clear guidance and support regarding how to best manage and respond to that particular situation. Transport networks are using staff and the public as additional safety and security sensors Application of roaming smart sensors To be clear, this is not to suggest that we no longer need these vitally important sensors, because we do. However, one major reason that we have so many sensors is because we cannot have people stationed everywhere. So, in the case of the US transit company, it has been able to add a further 10,000 roaming smart sensors. This can be applied to other industries such as airports, ports, warehouse operations, stadiums, and arenas etc. Now, imagine the potential of widening the scope to include the public, to truly incorporate crowdsourcing in to the day-to-day security function. For example, in May, it was reported that West Midlands Police in the UK would be piloting an initiative that is asking citizens to upload content relating to offences being committed. Leveraging existing hardware infrastructure Typically, when introducing any form of new security sensor or system, it is expected to be an expensive process. However, the hardware infrastructure is already in place as most people are already in possession of a smart device, either through work or personally. What’s more, there is typically an eager appetite to be a good citizen or employee, just so long as it isn’t too much of an inconvenience. Innovations in smart mobile devices has moved at such a pace that whilst many security professionals debate if and how to roll-out body-worn-cameras, members of the public are live-streaming from their full HD and even 4K ready phones. The technology to make every employee a smart sensor has been around for some time and keeps getting better and better, and it is in the pockets of most people around the world. What is different now is the potential to harness it and efficiently bring it in to the security process. All organisations need to do is know how to switch it on and leverage it.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
There’s a new big player – and familiar household name – coming into the security marketplace with the announcement of Motorola’s intent to acquire Canadian video manufacturer Avigilon Corporation, provider of video surveillance and analytics. Motorola Solutions points to an “avalanche of video in public and private sectors” as a motivation for the acquisition. Motorola Solutions’ dominance in the public safety market – where the Chicago company supplies police technologies, radios and other products – will provide new opportunities for Avigilon in a realm where it previously has not been dominant. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings. Meanwhile, Avigilon will “bring [its] advanced video surveillance and analytics platform to [Motorola’s] rapidly evolving public safety workflow,” according to Motorola, and enhance the larger company’s portfolio of “mission-critical communications technologies.” Avigilon’s end-to-end security and video surveillance platform includes cameras, analytics, video management and video storage. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings The broader solution Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as “a natural extension to global public safety and U.S. federal and military” applications, according to the company. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt. Not a bad price considering Avigilon’s stock price has traded as low as $13 a share in the last year. Avigilon has 1,200 employees with locations in Vancouver and Richmond, British Columbia, and Dallas and Plano, Texas. Revenue was $354 million in 2016. The transaction is expected to be completed in Q2 of 2018. Deploying pre-engineered solutions As an innovator in the security market, Avigilon has spearheaded an end-to-end solutions approach. Their success has even prompted some component manufacturers to expand their proposition into a broader “solutions” sale. Led largely by Avigilon, the industry pendulum has swung toward the simplicity of deploying pre-engineered end-to-end solutions. Open systems integrated using best-in-breed components from several manufacturers still have their devotees, and are needed in some situations, but Avigilon has made a strong case for the end-to-end alternative. Others have followed. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt Avigilon has also lately been a leader in implementing artificial intelligence and deep learning, including Appearance Search technology that can locate a vehicle or person from video across a site. Avigilon’s video surveillance platform seeks to transform video from reactive – looking back at what has taken place – to proactive, issuing alerts in real time. Avigilon also recently introduced Avigilon Blue cloud service platform to enable video system users to manage more sites with fewer resources. Investing and building Motorola is not a completely new name to the security market. Old-timers will remember Motorola Indala, a previous presence in the RFID access control market that was sold to HID Corp. in 2001. More recently, Motorola Solutions has invested in Vidsys, a provider of converged security and information management (CSIM) software and has implemented Vidsys CSIM through its Protect Series unified platform that aggregates and analyses information from multiple inputs for military and federal government properties. Motorola is also known as the inventor of the Six Sigma quality improvement process - and commitment to quality plays well among security integrators and end users. Motorola would presumably continue Avigilon’s licensing program, but rules-based video analytics patents’ importance may fade Avigilon owns 750 U.S. and international patents, including some covering basic underlying principles of video analytics, for which several video companies currently pay licence fees. Motorola would presumably continue the licensing program, although the importance of rules-based video analytics patents may fade as new deep learning and artificial intelligence (AI) approaches to video analytics emerge. Channel conflict A possible concern surrounding the acquisition is the issue of channel conflict. When it comes to larger end user customers, Motorola has embraced a direct-to-user approach that could be problematic in the eyes of Avigilon’s 2,000 resellers. Among the benefits Motorola says they bring to the table is the ability to “leverage [their] direct enterprise safes force for large deals.” They also say they “complement Avigilon’s channel with [Motorola’s] channel network.” The security industry has a spotty history of larger companies entering the market to buy existing businesses. Some have been a good fit, while others have not. The entrepreneurial spirit of more than one successful security company has suffered under larger corporate ownership, sometimes withering as new corporate overlords cut costs and stifle R&D. The more successful recent large acquisitions in our market – notably Canon’s acquisition of Milestone Systems and Axis Communications – have worked well because the acquired companies have retained some degree of independence and preserved the existing corporate culture. In the case of Motorola and Avigilon, obviously, time will tell.
Abdullah A. M. Al-Khodari Sons Company is a multifaceted contracting company in Saudi Arabia. This company conducts business in diverse sectors such as civil engineering, roads and bridges, railways, buildings and infrastructure, water and waste water treatment, oil-gas and pipelines. It has 25 construction sites across Middle East. Managing time-attendance, shifts, overtime and leaves of 20,000 employees at different locations was a challenging process for them. They wanted a centralised time-attendance solution that would enable them to manage attendance data from a central location and speed up the payroll process. Project Highlights Time-attendance solution for 25 construction sites Access control solution for 25 sites Centralised attendance management for 20,000 employees Managing time-attendance data Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East. Managing time-attendance, shifts, leaves and overtime of 20,000 employees at different locations is very time consuming and a tedious task. Previously, the customer was using Hand geometry solution, which was very time consuming. Workers also found it difficult to place their palms in the proper position. Managing time-attendance data of all employees on a central level was also becoming difficult for the company. Furthermore, the head office was using a different time-attendance solution in comparison to other sites. The head office processed the salary of employees after receiving an attendance summary from each of their branches. The process of salary calculation with respect to working hours and overtime of each employee took around 10 days. Moreover, there were chances that the attendance data was inaccurate, leading loss of efficiency and employee dissatisfaction. To overcome such challenges, the company required a centralised time-attendance and access control solution which could be managed and controlled from the head office. Faster and accurate salary calculation After discussing all of their problems and requirements Matrix offered web based COSEC CENTRA time-attendance and access control solution for their multi located branches across the Middle East. It automated all time-attendance processes right from recording entries to processing salaries. COSEC CENTRA access control solution allows controlling access on three simultaneous dimensions – user, zone and time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected Optical fingerprint based time-attendance and access control terminal COSEC DOOR FOP was installed to mark the attendance and get access using fingerprint credentials. As per assigned access rules and time-attendance policies, access is allowed or denied, and event data would be pushed from all devices to the COSEC CENTRA server in real-time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected centrally. Various types of time-attendance reports and charts can be generated for faster and accurate salary calculation. Error free time-attendance Time required for salary calculation reduced by 30% Productivity increased by 20% Control of all sites through a live monitoring window Error free time-attendance and overtime data Database management of all employees Centralised report generation Products installed COSEC DOOR FOP - optical fingerprint and RF card based door controller COSEC ENROLL FINGER - fingerprint enrolment station COSEC LE PLATFORM - web based application software platform COSEC LE TAM - time-attendance and leave management module COSEC LE ACM - access control module COSEC LE USER10000 - 10000 user license for LE platform
Siemens Mobility and globally renowned mission critical communications (MCX or MCC) enabler, Softil have jointly announced an agreement that will see a range of next generation communications solutions come to market for use in Long Term Evolution-Railway (LTE-R) railways as well as Mission-Critical Push-To-Talk (MCPTT) metro applications like underground/tram buses, etc. Siemens Mobility adopts Softil's BEEHD client framework to bring best-of-breed mission critical communications solutions to LTE-R rail networks; solutions will also support the UIC's FRMCS strategy to build a Global Rail Traffic Management System for the entire rail industry MCX solutions The MCX solutions will support the Future Railway Mobile Communications Systems of the UIC The MCX solutions will support the Future Railway Mobile Communications Systems (FRMCS) of the International Union of Railways (UIC) to build a Global Rail Traffic Management System (GRTMS) for the entire rail industry, bringing significant economic and operational benefits and efficiencies to operators in the process. "The rail industry is at the forefront of the mission-critical communication revolution and GSM-R based systems have already been replaced by LTE-R solutions in Asia Pacific (APAC) and the trend is expected to widen across other markets in 2019/20," says Pierre Hagendorf, Softil's CEO. "With Softil's BEEHD client framework at the heart of Siemens Mobility's next generation LTE-R offerings, the rail industry will have a range of supremely reliable solutions packed with rich communication features." The new radio system for the Railway industry has to guarantee the interoperability with GSM-R while delivering on these three main areas: Critical communications - Secure voice communication between driver and signaller, provision for emergency and group calls, real-time video imagery for any occurring incidents and the intelligent bearer for European Train Control System (ETCS) and Automatic Train Operation (ATO) operation; Performance communications - Track condition monitoring, Connected Driver Advisory System (C-DAS), on-train telemetry, maintenance of non-critical infrastructure, non-critical real-time video, wireless communication for on-train-staff; Business communications - passenger information system, passenger entertainment and passenger communication connections. Siemens Mobility will enable existing GSM-R users to develop a migration plan that will enable all of the above. BEEHD client technology LTE-R is the foundation for the railway variant of the 3GPP MCC over LTE/5G (MCPTT) standard "The rail industry is facing unprecedented challenges in handling increasing numbers of passengers and freight traffic loads," says Russell Clarke, General Manager, Mobile Communications at Siemens Mobility. "After careful analysis of market options, Siemens Mobility chose Softil's BEEHD client technology as the outstanding Software Development Kit (SDK) for our developers to build best-of-breed LTE-R communications solutions for the rail industry in the shortest timeframe." LTE-R is the foundation for the railway variant of the 3GPP MCC over LTE/5G (MCPTT) standard. What sets the LTE-R technology apart from the currently used GSM-R is that it brings the full power of broadband networks including voice, video, text, images, location and more and not just simple voice. LTE-R technology The Softil BEEHD framework is LTE-R compatible and will enable Siemens Mobility's solutions to deliver stable voice as well as data communications on trains running at speeds in excess of 400km/h. LTE-R technology makes possible live tracking of a train and transmitting railroad information to engine drivers, and also enables multimedia-based group calling and SMS services on top of voice call services. Additionally, real-time group/individual communication is made possible between train engineers and control centers. BEEHD IP communications solution is a cross-platform framework designed for system integrators BEEHD IP communications Softil's BEEHD IP communications solution is a cross-platform framework (SDK) designed for chipset vendors, device manufacturers, system integrators, application developers and service providers looking to accelerate the development of IP-based voice and video over LTE (VoLTE, ViLTE and MCPTT/MCX) solutions. The quality of the award-winning SDK is unmatched within the communications industry and BEEHD was proven to satisfy all required key performance indicators (KPIs) set by the 3GPP MCX standard, as well as often even stricter KPIs required by global carriers and service providers.
CoreRFID supplies the UK's largest outsourcing company Serco with 100,000 RFID access cards for its Caledonian Sleeper railway service. The cards will provide passengers with access to rooms and will improve security on routes between London and Scotland. The cards are completely re-usable and replace paper-based RFID tickets, which were judged to not be as cost effective in the long-term. Specialist locks Serco had specialist locks provided by a Spanish company and needed cards which were compatible" Munzi Ali, technical director of CoreRFID comments: “Our knowledge and experience on similar work in the hotel industry helped us to meet the challenges of this project. Serco had specialist locks provided by a Spanish company and needed cards which were compatible. Consultancy is a big part of the larger projects we undertake and we were able to solve the issue with Serco.” The Caledonian Sleeper service, which is operated by Serco as a standalone franchise, can trace its origins back to 1873. It serves a number of destinations in Scotland - including Inverness, Aberdeen, Fort William, Glasgow and Edinburgh - on route to and from Euston Station. RFID solutions Graham Kelly, guest experience director at Serco Caledonian Sleeper, said: "Our new trains are designed to improve every aspect of the guest experience. We strive to deliver a hotel experience and a major part of that is having keycard entry for rooms. We've only been running our new trains for a few weeks but the feedback from guests on the keycard has been excellent, with CoreRFID's solution proving extremely effective." Ali added: “RFID solutions can provide real benefits in efficiency, costs and in this case significantly cutting down on waste.” CoreRFID's clients include ICL, London Underground and Thomas Cook.
Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland has supplied a number of high security steel doorsets to Network Rail for the upgrade of its remote signal rooms. The project was commissioned through Kent-based trade customer Taylor Refit, who removed the existing doors and installed new high security steel doorsets certified to LPS 1175 security ratings from the Powershield range. Network Rail specified that the high security doors supplied needed to offer maximum protection to the remote rooms The upgrade comes as part of Network Rail’s plan to heighten the security level to its signal rooms following the recent vandalism. High security doors for Network Rail Network Rail specified that the high security doors supplied needed to offer maximum protection to the remote rooms, whilst also providing a cost-effective solution. ABLOY Protec cylinders were also incorporated into the specialist locks throughout the sites. Due to the easy-to-install products, Taylor Refit was able to remove and install the security doors in just one day, resulting in minimal disruption to services. Superior security doorsets Chris Cole, Area Sales Manager (SE & London) for Door Group, ASSA ABLOY EMEA comments: “We are delighted that Network Rail gave us the opportunity to provide superior security doorsets to this project and we hope to build on our relationship in the future. We had to ensure that the doorsets we were supplying offered maximum security, as per the customer’s specifications" "We pride ourselves on supplying high quality products and we work closely with our customers to understand their specific requirements and to provide specialist and tailored solutions. We had to ensure that the doorsets we were supplying offered maximum security, as per the customer’s specifications.” Door Group’s work with Network Rail follows a number of high-profile contracts with Transport for London and Crossrail Limited. Brian Sofley, Managing Director for Door Group, added: “We pride ourselves on our portfolio of well-respected clients that choose to work with us time and time again. We attribute this to our comprehensive service offering and expert advice throughout each project.”
A video surveillance system installed by Daemon Fire & Security, based on an AMG Systems-supplied Ethernet switch network, is helping to protect the UK’s first new inland rail freight hub for over a decade: iPort Rail. The iPort project near Doncaster, South Yorkshire, offers 6 million square feet of space across 337 acres. The massive park is already home to enormous distribution facilities for companies like Amazon, CEVA, Fellowes and Lidl, and its occupancy is set to expand in the coming years. The newly developed iPort Rail terminal, located on its own 30-acre site within iPort, is connected to the electrified East Coast Main Line via the South Yorkshire Joint Line. It offers integrated access to iPort, meaning occupiers can directly approach the rail terminal using their own specialist vehicles on the facility’s private roads. Implementing video surveillance system The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System"The terminal can handle up to six trains a day, operating 24-hours, six days a week. Each train can be the maximum UK length of 775m. iPort Rail has an 800m reception siding and two 400m handling sidings, with storage capacity for 1,500 shipping containers. With iPort Rail playing such a crucial role in developer Verdion’s iPort transportation strategy, there was a pressing need to ensure that the terminal has effective ongoing video monitoring. Buckingham Group Contracting Ltd was responsible for the work on iPort Rail, and they worked with CCTV specialist Daemon Fire & Security to implement the video surveillance system for the perimeter of the terminal. Chris Tattersall, Technical Director at Daemon, said the system runs on a redundant fibre optic network. “AMG Systems assisted us with the fibre optic network design.” Tattersall said. “The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System. The cameras are on towers from Altron, and the networking is from AMG.” Cameras for intrusion detection The cameras utilise Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through"There are 32 cameras mounted on 18 towers around the rail terminal site perimeter. Tattersall explained that the cameras are primarily used as detectors to monitor for trespass or intrusion. “The cameras utilise Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through,” he said. “The cameras are monitored live by the 24-hour security team in the site gatehouse. The system is networked using equipment and expertise from AMG Systems. Daemon and AMG designed a failsafe fibre optic ring system together,” Tattersall said. “From the gatehouse there’s a fibre optic cable which goes and loops around every camera tower and goes back to the gatehouse,” he said. “It’s a redundant ring, so if they get a fault or deliberate cut, everything will carry on working. We’re using industrial PoE Ethernet switches in the towers so they can withstand low temperatures, which is particularly important during cold winters in a relatively open site like this.” Operative in extreme temperatures The industrial managed switches are able to operate in temperatures ranging from -40 deg C to 75 deg CThe industrial managed switches, 20 of which were used in this project, are able to operate in temperatures ranging from -40 deg C to 75 deg C and are designed for medium to large network environments to strengthen network connections. AMG Business Development Director Sara Fisher said AMG was thrilled to be involved in this project. “We were delighted to be asked by Daemon to contribute our design and product expertise to help protect this important and growing freight hub,” she said. Daemon’s video surveillance project took around 10 weeks in total, including implementation and commissioning. It was handed over on time and installed on target. Tattersall said the smooth running of the project could be put down to Daemon’s good working relationship with contractor Buckingham, distributor Pro-Vision, networking and transmission expert AMG Systems, and product suppliers Bosch and Altron.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify potential benefits In particular, the retender process for the security contract with National Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardised data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required monthly reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the Natural History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease of deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance customer satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organisations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.