Enterprise PKI Manager in DigiCert ONE from DigiCert, Inc., a globally renowned provider of TLS/SSL, IoT and PKI solutions, supports security for today’s increasingly remote workforces via certificate automation to authenticate employees and their devices at scale, and encrypt data. Working from home is here to stay, with Gartner reporting that 74% of CFOs are looking to shift some employees to permanent remote work. Digital certificates are a proven, widely adopted solution for strong au...
Ping Identity, the intelligent identity solution for the enterprise, was recognised as one of the 25 Highest Rated Public Cloud Computing Companies To Work For During the COVID Crisis in a list released by Battery Ventures, a global investment firm and cloud investor, with data specifically provided by Glassdoor, the provider of insights about jobs and companies. The list highlights 25 publicly traded companies—all business-to-business, cloud-computing companies--where employees reported...
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enh...
It's a very common purchase for people to seek a smart security camera to remotely link them to their home whilst at work. Now the emphasis has shifted, with a lot more people working from home, business owners should consider a surveillance device to deter would-be thieves, protecting valuable equipment crucial for businesses to operate successfully. A robust security camera setup can aid existing security staff, and give business owners peace of mind out of h...
Nowadays, everything seems easier in the matter of surveillance. Sophisticated technology safeguards our valuables for us without asking for anything in return. But what if it’s not true? What if it comes with a price? Video surveillance systems are a popular way to keep the property under constant control. It’s not rare that the technological sophistication of these systems puts us in awe. They make us feel, and be, safe. Yet, there are doubts when it comes to ensuring privacy. And...
Sectigo®, a provider of automated digital identity management, embedded security, and web security solutions, and Green Hills Software, the pioneer in high-assurance operating systems, have announced a global reseller agreement. The agreement enables Green Hills Software to offer Sectigo's Icon LabsTM Embedded Firewall, integrated and optimised for use with Green Hills Software’s INTEGRITY® real-time operating system (RTOS) and its embedded high-performance TCP/IP v4/v6 host and r...
The Wisenet XNF-9010RV and XNF-9010RVM 12 megapixel fisheye cameras are the latest additions to the range of Wisenet X cameras equipped with Hanwha Techwin’s proprietary Wisenet7 chipset. The ground-breaking Wisenet7 chipset, which boasts an impressive list of technologies that significantly improve the cyber security credentials of Wisenet cameras, is UL Cybersecurity Assurance Program (UL CAP) certificated. It therefore enables Hanwha Techwin to provide users with peace of mind in knowing their confidential data will be kept safe from hackers. Video surveillance solutions In addition to setting a new standard for IP network video surveillance solutions in respect of cyber security, the feature-rich Wisenet7 also ensures the two new fisheye cameras, which have built in IR illumination, are able to capture superb quality images, regardless of the lighting conditions. A new ‘extreme’ Wide Dynamic Range (WDR) feature, for example, utilises new Local Contrast Enhancement and Scene Analysis technologies to capture ultra-clear images from scenes containing a challenging mix of bright and dark areas. The two cameras share a long list of other real-life practical features, with the mobile XNF-9010RVM having the addition of an M12 connector. Built to withstand vibrations, the EN50155 certificated XNF-9010RVM is designed to offer a robust solution for monitoring activity on buses, trains, trucks and other forms of transport. Potential video evidence A digital PTZ allows users to electronically pan, tilt and zoom in on specific areas for a more detailed view Both cameras have on-board dewarping and offer a variety of alternative viewing modes, including single panorama, double panorama and quad views. A digital PTZ allows users to electronically pan, tilt and zoom in on specific areas for a more detailed view, whilst at the same time, continuing to monitor the whole 360⁰ view. It also offers privacy masking, a 12VDC and PoE capability. In the event of network disruption, video is automatically recorded to on-board SDXC storage to ensure that potential video evidence is not lost. In addition to providing a powerful tool to deter and detect criminal activity, the two cameras are equipped with specialist business intelligence applications which enable users to achieve so much more from their video surveillance systems. Improving customer experience Collectively, the heatmap, people counting and queue management video analytics are able to assist businesses, and the retail sector in particular, with identifying opportunities to improve productivity, gain a greater understanding of customer behaviour and improve the customer experience. The two new cameras support H.265, H.264 and MJPEG compression formats, as well as WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression, according to movement in the image. Bandwidth efficiency is improved by up to 75% compared to current H.264 technology when WiseStream, which is unique to Wisenet cameras, is combined with H.265 compression. Intelligent video analytics Other key features include the following: 1.08mm fixed lens. Stereo graphic type lens enhances resolution within the peripheral regions of an image. Simple Focus: A single push of a button located at the back of the camera is all that is needed to automatically focus the camera via the Simple Focus feature, which can also be remotely accessed via the network. A suite of Intelligent Video Analytics (IVA), which includes defocus detection, directional detection, motion detection, appear/disappear, enter/exit, loitering, tampering, virtual line, audio detection. Sound classification: An audio analytics feature which recognises critical sounds such as raised voices, screams, broken glass, gunshots and explosions, and generates an alert to enable security personnel to quickly react to any incidents. Vandal resistant hard coated dome cover. Cyber security credentials “A single fish-eye camera will quite often offer the most efficient and cost-effective way of monitoring a large area, and particularly so when a number of standard cameras might normally be required to avoid any blind spots.” “They also offer a compact option for environments where aesthetics or space limitations might be an issue,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “Whilst there is no shortage of fish-eye cameras on the market, the cyber security credentials and image enhancing features of the XNF-9010RV and XNF-9010RVM, ensures they stand out from the crowd.”
Arcules, the globally renowned provider of unified, intelligent security-as-a-service solutions, has announced the addition of its new Edge Cloud solution to its platform, which will address the changing needs of an organisation’s video surveillance and security data capture and storage. Arcules Edge Cloud solution With the introduction of the Arcules Edge Cloud solution, businesses now have the ability to store all video data locally to address low-bandwidth challenges and usage for their video management while still benefiting from the value of the Arcules cloud approach to remote security services. As more businesses embrace the benefits of digital transformation, they are looking to migrate ever more infrastructure to the Cloud. According to a report from Inkwood Research, the global VSaaS (Video Surveillance as a Solution) market is estimated to grow with 20.77% CAGR through 2027. Customised cloud functionality The new Arcules Edge Cloud solution is designed to deliver customised cloud functionality The new Arcules Edge Cloud solution is designed to deliver customised cloud functionality based on specific security priorities, risk environment and operational priorities. It also addresses some of the main challenges that customers face when considering cloud-based options, such as internet connectivity issues, high camera counts and the need for network traffic optimisation. “Arcules delivers innovations that allow us to offer highly reliable and scalable services to our customers, while also enabling us to differentiate ourselves in the market, by lowering their acquisition and operational costs,” said Brent Edmunds, the Chief Executive Officer (CEO) at Stone Security. Enabling enterprises to embrace the Cloud Brent adds, “This new solution brings even more value to the table and delivers the flexibility that propels businesses to embrace the Cloud and configure their storage options in a way that reduces bandwidth and cost. As a result, our customers can accelerate their digital transformation goals with the option to move their security fully into the cloud in the future.” The Arcules Edge Cloud solution uses an average of 10 Kbps (up to 50 Kbps) of internet bandwidth per channel while recording video. This enables organisations with up to 500 cameras to operate inside limited bandwidth constraints (approximately 30 Mbps). Remote access to video data via the Cloud The Edge Cloud solution allows Arcules customers to leverage the power and functionality of the Cloud Setup, management, administration and configuration are managed in the Cloud, giving customers the ability to archive in the Cloud and protect video evidence for forensic purposes. Video data is stored on the edge using a gateway with the ability to show both live and playback video that is locally stored video remotely via the Cloud. The introduction of the Edge Cloud solution allows Arcules customers to leverage the power and functionality of the Cloud, while using existing network infrastructure and video surveillance technology for remote or disparate locations. Whether a site is storing video data on-premises or in the Arcules Cloud, customers will be able to seamlessly view and manage all of their sites together, unifying and centralising security. Accelerating digital transformation “2020 has accelerated digital transformation across all markets with cloud technology becoming more prevalent, and it’s now critical for us to offer greater options to our customers to help them achieve their security and operational goals,” said Andreas Pettersson, the Chief Executive Officer (CEO) at Arcules. Andreas further adds, “We keep pushing the boundaries of innovation so we can provide the cloud solutions that more IT and security leaders require to meet the evolving needs of their businesses. Edge Cloud is the next step in the evolution of the next-generation unified cloud platform designed to accelerate the adoption of cloud-based security-as-a-service.”
Claroty, the pioneer in operational technology (OT) security, announces new enhancements to the Claroty platform, making it the industry’s first OT security solution to offer remote incident management as a fully integrated capability that spans the entire incident lifecycle. The platform now enables cybersecurity teams to detect, investigate, and respond to security incidents on OT networks across the broadest attack surface area securely and seamlessly from any location. Standard operating environment IT and OT networks were already becoming more interconnected due to digital transformation, and the COVID-19-induced shift to remote work has accelerated their convergence even more. These combined forces have created an acutely expanded attack surface and volume of alerts for cybersecurity teams to manage. IT and OT networks were already becoming more interconnected due to digital transformation According to Gartner, “For those organisations whose cybersecurity operations capabilities are tuned to monitor events from their standard operating environment, the abrupt shift to a predominantly remote operating model could see events of cybersecurity interest being missed by the cybersecurity operations team. This will in large part be a result of the relocation of workers to new premises or to a remote working mode that suddenly expands the scope and complexity of the operating environment.” Variable work environment “Arming cybersecurity teams with the ability to detect, investigate, and respond to not only asset-based attacks, but also to identity-based attacks, is at the heart of the new enhancements to The Claroty Platform,” said Grant Geyer, Chief Product Officer of Claroty. “Our customers can now further evolve their OT security posture, strategy, and workflows for a variable work environment, while enduring adversarial activity and whatever else they might encounter on the network.” With its newly enhanced Secure Remote Access (SRA) 3.1 and Continuous Threat Detection (CTD) 4.2 components, The Claroty Platform now spans all three stages of the incident lifecycle. Remote user activity This reinforces the importance of quick detection and identification of unauthorised activities Detection: More than half of OT and IT security professionals say their organisations are now more of a target for cybercriminals since the pandemic began, according to Claroty’s recent survey report. This reinforces the importance of quick detection and identification of unauthorised activities. The Claroty Platform gives teams an early advantage with the ability to identify and differentiate authorised remote user activity from unauthorised ones that could impact process integrity. When users receive an alert from CTD, Claroty’s Wisdom of the Crowd capability utilises information from similar events across Claroty’s customer base to provide context into the potential impact of the alert, enabling users to respond more effectively and efficiently. Demanding quicker identification Investigation: The increase in both teleworking and malicious activity demands quicker identification in a remote setting. Claroty’s enhanced platform arms SOC teams with full visibility into remote user activity, insight into how indicators detected on the network have manifested in other areas, the ability to investigate incidents from any location, and greater context around the business criticality and process values of assets involved in such incidents. This minimises the need for onsite staff while optimising investigations with enriched assets, including both live SRA sessions including full-length video recordings, as well as threat alerts with reputational context from the Claroty community. Expediting remedial activities 62% of IT and OT teams have found it more challenging to collaborate Response: Even as IT and OT networks have become more interconnected since the pandemic began, 62% of IT and OT teams have found it more challenging to collaborate. The Claroty Platform bridges this gap with its integrated interface and the ability to disconnect potentially harmful OT remote sessions, minimising the need for onsite staff and expediting remedial activities. Integrations with ServiceNow and Swimlane enable teams to manage all IT and OT alerts from a single access point within the respective platforms. This allows organisations to adapt their OT incident response function and workflows for a remote or hybrid workforce. Greater operational resilience Collectively, these features allow teams to adapt their monitoring, inspection, and response management from on- or off-site premises without compromising efficiency or effectiveness. The result for the business is reduced exposure to risk and greater operational resilience. “Receiving vulnerability alerts in real-time is a must-have for our multinational mining, metals, and petroleum operations,” said Thomas Leen, VP Cybersecurity of BHP. “The Claroty Platform allows us to quickly identify which of our assets have led to vulnerabilities and prioritise the actions we need to take in order to reduce and eliminate potential risks to the business.”
Radio Physics announce winning the security category in Prosegur’s “COME IN”, open innovation programme. From amongst the more than 190 start-ups from 33 different countries, the winning companies will receive support from the different units at Prosegur, one of Spain's top security multinational, to develop and implement their projects worldwide. Radio Physics, a renowned provider of stand-off concealed threat detection, is pleased to announce winning the security category of the challenge aimed at finding security solutions with non-invasive methods for busy spaces or events. The winning proposal comprised Radio Physics’, Optracon concealed threat detection solution, a sensor system that uses a combination of radar, VCA, LiDAR and machine learning for the remote detection of hidden threats such as weapons or explosive devices. Threat detection solution Their talent, combined with the enormous potential of Prosegur's technological innovation Mark Pritchard, CCO said: “We are looking forward to forging a strong relationship with Prosegur. Working together using our state-of-the-art threat detection solution, Optracon, and Prosegur’s global reach to develop and implement our solutions worldwide, in collaboration with Prosegur's business units and their customers.” In the words of Prosegur's Director of Innovation, José Daniel García Espinel, "the excellent response to the programme highlights the impetus of the start-up ecosystem. Their talent, combined with the enormous potential of Prosegur's technological innovation, have turned future security challenges into real projects that will reinvent the way we protect our environment." International experience and projection Furthermore, he referred to collaborative models as "in combination with Prosegur's international experience and projection, the formula for success to incorporate the external talent of start-ups and accelerate the "go to market" process, thus revolutionising the security sector."
TRENDnet, a pioneer in reliable SMB and consumer networking and surveillance solutions, announces that its Gigabit PoE+ smart surveillance switch Series is currently shipping and available for purchase. These smart surveillance switches are the first network switches to be designated as ONVIF® Conformant, supporting ONVIF Profile Q. TRENDnet’s Gigabit PoE+ Smart Surveillance Switches are integrated with camera management functions which are easily accessible within the surveillance switch’s user interface. The new smart surveillance switch Series were originally planned to be on display at ISC West 2020 in Las Vegas. Camera firmware upgrades The Gigabit PoE+ Smart Surveillance Switches Series launches with two models, the 18-Port Gigabit PoE+ smart surveillance switch (TPE-3018LS) and the 12-Port Gigabit PoE+ smart surveillance switch (TPE-3012LS). Camera management functions available through the switch’s GUI include modifying camera administrator access, performing camera firmware upgrades, e-map support, and changing IP addresses. The ONVIF Conformant designation ensures users that Profile Q requirements have been met, which guarantees a level of interoperability with other ONVIF devices, such as NVRs, IP cameras, and software. The PoE self-healing support on these Smart Surveillance Switches include both PoE device-recovery, and switch power scheduling. If the Smart Surveillance Switch fails to respond, or if the network connection to a connected device is interrupted, TRENDnet’s Gigabit PoE Smart Surveillance Switch Series will auto-reboot or power cycle the affected PoE port and/or the entire switch. Critical network operations Managed switch features include IPv6, QoS, IGMP snooping, port bandwidth controls, and spanning tree support The PoE self-healing support featured on these Smart Surveillance Switches helps to reduce overall network downtime and the amount of onsite support required, which can be crucial especially during critical network operations. TRENDnet Gigabit PoE+ Smart Surveillance Switches are the first and only official ONVIF Conformant network switches currently available. They feature both PoE+ and standard RJ-45 ports, as well as SFP slots for long-distance fibre connectivity. The Smart Surveillance Switch Series also feature long-range PoE support that can reach up to 656 ft. (200m), double the current PoE standard distance. The front-facing LED display shows useful PoE power usage statistics. Managed switch features include IPv6, QoS, IGMP snooping, port bandwidth controls, and spanning tree support. Smart surveillance switch TRENDnet’s Gigabit PoE+ Smart Surveillance Switches are available online on the TRENDnet Store, or worldwide through select distribution and retail partners. TRENDnet originally planned to have working demos of the new Gigabit PoE+ Smart Surveillance Switch Series at their booth at ISC West; however, an alternative means to demo and review the switches and its interface are available on the respective product pages on the TRENDnet website. 12-Port Gigabit PoE+ Smart Surveillance Switch, TPE-3012LS 8 x Gigabit PoE+ ports 2 x Gigabit Ports 2 x SFP slots 110W PoE power budget Extend PoE+ signal up to 656 ft. (200m) at 10Mbps 24Gbps switching capacity 18-Port Gigabit PoE+ Smart Surveillance Switch, TPE-3018LS 16 x Gigabit PoE+ ports 2 x Shared Gigabit ports (RJ-45 or SFP) 220W PoE power budget Extend PoE+ signal up to 656 ft. (200m) at 10Mbps 36Gbps switching capacity
GeoVision has announced the release of its GV-Decoder Box Ultra, a compact, easy-to-install video decoder that allows digital monitors to display live views from ONVIF IP cameras. GV-Decoder Box Ultra Optimised for decoding H265 and H264 video streams, GV-Decoder Box Ultra supports displaying 64 IP videos in sequence or in 4, 6, 8 and 9 matrix view. The security administrator can monitor live events, take snapshots when necessary, and pause a channel when any event or incident occurs. GV‐Joystick V2 can be installed to control speed dome cameras if needed. GeoVision Decoder Box Ultra offers a cost-effective way of displaying live videos on a screen without the need of a PC. Key features include: 4K UHD TV HDMI video decoder Decode up to 64 IP streaming Sequence view and Matrix 4/6/8/9 PTZ control with GV-Joystick V2 (optional) Auto-discover ONVIF IP camera Integrated GeoVision solutions Integrated in GeoVision solutions Together with GV-Mobile Server, GV-Decoder Box Ultra can display fish-eye image in Quad, 360° and Dual 180° views. The motion matrix feature also provides live view pop-ups upon motion events only. With GV-Control Centre, live views from IP cameras can be projected through GV-Decoder Box Ultra directly onto a monitor. It is an ideal solution for assigning video channels to security posts with no PC.
Smart cities, airports, stadiums, hospitals and other organisations are now liaising with government bodies and law enforcement to propel a new dawn of collaborative security and communication. The influx of new technology coupled with the ever-changing political and social landscapes has meant security is having to evolve. Artificial Intelligence is now allowing law enforcement, security personnel and organisations to a transformational method of fighting crime, maintaining public security and significantly finding persons of interest. AI-powered surveillance cameras Utilising surveillance cameras with implemented AI has revolutionised finding missing persons. Facial recognition and IREX.ai’s “Searchveillance” have equipped both the public and private sector with the tools to collaboratively work together in finding persons of interest. The influx of new technology coupled with the ever-changing political and social landscapes has meant security is having to evolve Finding missing persons has been an underfunded and challenging issue across society, with many countries having no funding at all after the initial police investigation. Through artificial intelligence, surveillance cameras will never sleep on finding missing people by setting up alerts for once a missing person appears under surveillance. How it’s happening Technology like IREX.ai has delivered an AI collaborative security solution which is implemented into surveillance cameras enabling them to become “smart cameras”. Both public and private sector have not been able to collaborate through utilising their existing cameras, which are now powered by AI-backed smart video technology. With surveillance systems now veering toward becoming cloud based, this now allows an unlimited number of cameras for an organisation or city to connect to. The AI platform is helping bringing about a collaborative network to help monitor crowded public areas in real time, something that would have taken a lot of manpower, time and cost to produce. Quicker response through “searchveillance” This has now become a crucial element in the fight against COVID-19. The ability to track and trace has been very effective but this particular AI module may only just be getting started in the fight to find persons of interest. When an individual goes missing or is abducted, every second is crucial along with information gathered. Unfortunately, this brings in human-error, when a person believes they may have seen the person of interest, it can lead law enforcement and authorities critically, in the wrong direction. AI-powered Facial Recognition helps eliminate human-error through 99.5% accuracy success, leading authorities to definitive sightings and factual information through the help of AI. “Searchveillance” enables authorities to liaise with the public and private sector organisations who have implemented the AI into their surveillance to run a single search with the person of interest’s photo. Instantaneously the user receives immediate results of, if and when this person last appeared under surveillance. Long-term missing persons It’s common knowledge that after 72 hours, statistically speaking the chance of finding the individual quickly diminish, but that doesn’t mean people stop searching. This week alone, September 2020, US Marshalls found and rescued 25 missing children in Ohio, many of whom had been missing for years. AI-powered facial recognition helps eliminate human-error through 99.5% accuracy success Implementing AI into surveillance cameras is becoming more frequently adopted around the world, enabling alerts in surveillance cameras and notifying appropriate law enforcement when a missing person appears under surveillance are all extraordinary tools. The alert system from the persons photo in the software. Facial recognition allows law enforcement to receive real-time footage of the missing person and their location. It is of great assistance for law enforcement to simply receive a notification and a real time feed of individual they are looking for. Security is becoming a more collaborative effort In light of recent events throughout the world, with protests surrounding police brutality, rioting, violence and deaths, security is evolving and it has to. Enabling technologies and building security collaboration and communication platforms is assisting in the fight to find missing people. It’s not just smart cities and smart airports who are providing a fishing net for find persons of interest, it’s also stadiums. The Superbowl and other major sporting events generate some of the biggest human slavery and trafficking busts of the year. Stadiums are now harnessing the responsibility to help counteract this and set up these alerts, utilise the AI in their cameras and collaborate with authorities, thus playing their part in finding persons of interest. IREX.ai has helped deliver the AI and the platform for collaborative security and communication, as technology grows and becomes more in our lives than we care for it to be, you often forget of the results it can provide, such as reuniting a family.
We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line. How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location. Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realised in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorised party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorised locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realised) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorise monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security market Smart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognisable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Video Surveillance as a Service (VSaaS), simply stated, is a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending on the features of the plan (i.e. number of cameras, amount of storage, software features, etc.), and customers pay a monthly subscription price to use it. Internet Protocol (IP) cameras are installed at site locations, and the video is captured and streamed to a service provider’s data centre via an internet connection. The video management software (VMS) runs on backend infrastructure provided by the service provider’s cloud. All video processing is done in the cloud, and all that is required to view the footage is an internet-connected device and a web browser. Implementation of AI and deep learning The cloud facilitates implementation of artificial intelligence and deep learning in the video surveillance marketThe cloud also facilitates implementation of artificial intelligence (AI) and deep learning in the video surveillance market. One of the major challenges with developing deep learning-based applications is access to real-word data and the ability to train the applications to work in any environment. Companies need access to relevant datasets that need to iterate their solutions quickly. Cloud-based solutions are of significant advantage in this case, as they allow for continuous updates and easy collection of vast amounts of data. “We will see the continued adoption of cloud-based intelligent video solutions that aggregate business data through video and artificial intelligence,” says Andreas Pettersson, CEO of Arcules, one of our Expert Panelists. Leveraging AI and IoT technologies with video data is becoming more common as organisations strive to optimise business operations while also boosting security across their facilities. Actionable intelligence gathering “The possibilities for this level of actionable intelligence gathering is endless, as markets such as hospitality, manufacturing, retail and SMEs that have multiple locations to manage, look to make sense of video in intuitive, streamlined ways,” says Pettersson. “The ability for technology to aggregate and analyse video surveillance and connected sensor data, identify trends in that data, and apply predictive analysis in businesses will have a huge impact in the coming year.” Cloud systems can solve more problems than ever using artificial intelligence and machine learning Cloud systems can solve more problems than ever using artificial intelligence and machine learning, and the capabilities expand way beyond video analytics to include analytics in general, crunching a variety of data provided by Internet of Things (IoT) sensors. Another area of interest related to video in the cloud is the development of ‘smart codecs’ that security camera manufacturers are developing and marketing as a solution that goes beyond H.264 and H.265. Maximising video storage Customers are realising that cloud implementations are more cost-effective, easier to deploy and maintainThe ongoing need to better manage network bandwidth usage and to maximise video storage is further turning the emphasis toward smart codecs, which lend themselves to cloud applications. Extremely high-resolution video can now be moved around in a fraction of the time and solves the issue of transporting many cameras over constrained WAN connections. With the elastic computing power available in the cloud, one can now envision a time where cloud computing costs could be low enough for the masses of video security solution use cases to be solved. Customers are realising that cloud implementations are more cost-effective, easier to deploy and maintain, and in many cases, even more secure than traditional on-premise deployments. In partnership with the leading cloud providers, the security industry can carry this message to the customers and will gradually see a shift in the acceptance of cloud-based solutions in the traditional security markets.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-wave signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, Washington-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar technology for border surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar sensor for security applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
BIRD Aerosystems, the pioneering developer of Airborne Missile Protection Systems (AMPS) and Special Mission Aircraft Solutions (ASIO), has won a contract for the delivery and installation of its AMPS-MLRD solution, that includes the patented SPREOS DIRCM, on a customer VIP and Military aircraft in Africa. The SPREOS will be installed as part of the AMPS-MLRD solution on several types of aircraft. About AMPS-MLRD solution AMPS-MLRD missile protection system provides the most enhanced protection for military and civilian aircraft against the growing threat of ground to air missiles including MANPADS, Laser guided threats, and radar-guided threats. The system is designed to automatically detect, verify, and foil SAM attacks through the effective use of countermeasure decoys (Flares and Chaff) and additionally by Directional Infrared Countermeasures (DIRCM) that jam the missile's IR seeker and protects the aircraft. SPREOS DIRCM system The AMPS-MLRD includes BIRD Aerosystems SPREOS, a patented DIRCM system that provides Missile Verification, Tracking, and Jamming. As part of the program, all aircraft will be installed with the SPREOS (Self Protection Radar Electro-Optic System) that combines a Semi-Active Dual Band Radar and Directional IR Countermeasure. Sensors, interrogation and tracking Queued by the Missile Warning Sensors, SPREOS points towards the suspected threat, performs a Doppler based interrogation to confirm the existence of a valid threat, and extract its key parameters. In addition, SPREOS precisely tracks and points an advanced 5th generation solid-state Quantum Cascade Laser (QCL) towards the threat for the most effective jamming of the missile while continually assessing the jamming effectiveness. Advanced protection solution Ronen Factor, Co-Chief Executive Officer and Founder at BIRD Aerosystems: “After a careful examination process, the customer chose BIRD Aerosystems' SPREOS and the AMPS-MLRD to protect its VIP and military fleet.” “BIRD Aerosystems' AMPS with the SPREOS DIRCM makes it possible to identify and intercept high-velocity threat attacks such as enemy MANPADS and eliminate all of the systems False Alarms. Being the most advanced protection solution in the market today, SPREOS enables our customers to detect threats in a way that has never been possible before, ensuring optimal aircraft protection tailored to defeat each specific threat.”
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defence system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor centre. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organisation is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Centre helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Centre, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organisation to support customers by optimising spend, mitigating risk and enhancing their security programmes. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritise technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Centre are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organisation’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Centre near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Centre, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Centre (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Centre (RTCC) The Real Time Crime Centre (RTCC) already uses Security Centre to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Centre’s IT department also set up an event-to-action rule in the Security Centre platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Centre, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Centre (RTCC). Bill adds, “We love working with the Genetec Security Centre security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, and our mission is to give those administrators the best possible tools to do their jobs,” said Filip Kaliszan, CEO and co-founder of Verkada. “Whether it be monitoring the status of a server room, the temperature of a patient room in a hospital, or the air quality of a school, the SV11 gives facilities and staff unprecedented visibility and control over the sites they’re responsible for keeping safe and secure.” The SV11 is a simple-to-deploy, powerful sensing device that provides enhanced visibility into what is happening in a physical space. The cloud-managed device seamlessly integrates with Verkada’s enterprise video security solution, allowing organisations to review context and quickly associate sensor events with relevant video footage. Real-time insights and proactive alerts The interface delivers real-time insights and makes it easy to respond to proactive alerts or conduct investigations into past incidents. Customers across a range of industries, including healthcare, manufacturing, education, retail, and hospitality, have already deployed the SV11 to monitor: Air quality: Protect one's environment from invisible threats like gas and chemical leaks, or detect illicit activities like vaping and smoking. Temperature and humidity: Monitor changes in temperature and humidity that may damage expensive infrastructure, materials, or food and medical supplies. Motion and occupancy: Detect motion or occupancy in bathrooms, locker rooms, and other private areas where cameras are not appropriate. Noise levels: Detect activity or disturbances without violating privacy. Receive and manage alert notifications remotely “The ability to deploy Verkada's sensor in our network closets has provided us with complete visibility into what’s happening in those rooms,” said Rick Palandro, Security and Facilities Operations Engineer at Fox Rothschild LLP. “With Verkada, I'm now able to receive and manage alert notifications remotely the moment temperature rises above a specific threshold. I can instantly mobilise the team to respond to HVAC issues. We’ve shifted from a reactive approach that often resulted in damaged equipment to a proactive one that ensures our equipment is always operating properly.” Monitoring preventative and predictive maintenance Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing" “Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing that helps us stay ahead of the curve on environmental improvements across our plant facility,” said Frank McKinney, COO and Plant Manager of Carolina Ingredients. “By pinpointing where we can set up both preventative and predictive maintenance, we can closely monitor and optimise air quality, efficiency of our HVAC units, and behaviours in the plant, which enables us to more effectively manage the business and deliver quality ingredients and superior blending services that support our customers.” Integration with video monitoring solution "We installed the environmental sensor across campuses in areas like bathrooms that are difficult to properly monitor and are therefore likely places for inappropriate activity such as vaping," said Marty Oliver, Director of Technology at Godley Independent School District. "Paired with Verkada's video monitoring solution, the SV11 provides a new level of visibility into what's happening in those spaces without infringing on students' privacy, giving principals, superintendents, and office administrators a more holistic understanding of student activity in school." Environmental sensor The introduction of the environmental sensor follows accelerated business growth in Q2 2020, highlighted by: Sixty-five percent quarter-over-quarter revenue growth (compared to Q1 2020), including new deployments with Holiday Inn Express and Suites, Rubrik, NextGen America International expansion with new Sales operations in Sydney and Latin America and deployments with Heinemann Australia, Lifeview Residential Care, and Transportes Canales A projection to double headcount by year-end 2020 (compared to year-end 2019) Expansion of its global channel partner program to more than 1,500 resellers The launch of its Access Control solution, which oversold in the first quarter of general availability and surpassed projected sales by more than 400 percent The release of the Bullet Series of hybrid cloud cameras as well as new features as part of a COVID-19 Response Suite, including People Heatmaps, Person of Interest Notifications, and Crowd Notifications Smart buildings The launch of the SV11 is the next step towards Verkada delivering on its vision to power the modern, integrated building. With security cameras at its core, Verkada is expanding its product offering with new applications such as access control and sensors to deliver the infrastructure that runs safer, smarter buildings.
Today’s medical institutions have a large number of patients who require constant supervision, risk malpractice and patient negligence claims, need to ensure hygiene compliance, and find solutions for the high security and video storage costs. When faced with limited high administrative costs, government funding, or recession, intelligent video security solutions can help hospitals relieve the pressure. Choose Ava Unified Security (formerly Vaion) to reduce liability claims, detect threats proactively, improve operational efficiency, and provide surgery documentation for educational purposes. Why Ava? Anomaly detection and analysis in real-time Ava’s pervasive, integrated video analytics use self-learning to give an enhanced understanding of all of the user’s cameras’ feeds. The staff can use the dynamic Video view with Spotlight that brings only the relevant feeds to their attention. In unusual activity cases, the operators can immediately respond when a high-risk patient leaves his room unattended or visitors are wandering in prohibited areas. Increased situational awareness Add maps of the user’s facilities and rooms to keep track of high-risk patients, visitors, and staff and their exact location. Maps include Smart Presence, a capability that lets the users track them as they move through their facilities. Combine with access control to locate patients and staff in critical moments. Administrators can also have a clear picture across their locations to improve patient care and daily operations. Quick search within minutes for insurance claims Operators can find visual evidence to prove or disprove liability claims fast and accurately or if hygiene protocol compliance is followed correctly. Smart Search allows personnel to search by appearance, events, objects, similarity, or image. The vcore VMS integrates with access control systems through the generic access control API. It is possible to get a clear picture of historical entries and exits of patients and staff and the video associated with it. Sharp images and integrated audio analytics Equipped with directional acoustic sensors, Ava vcam Dome and Pano notify security and healthcare professionals instantly when loud noises, screaming, glass breaking, and gunshots occur. The cameras also deliver unmatched video quality required to provide recordings for scientific presentations, research, and education. vcam is suitable for different settings, from parking lots and storerooms to patient wards and operating rooms. Key benefits, delivered: Build from existing investment while retaining privacy Integrates with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video and metadata storage remain securely on-premises Full site survivability and local access Safe and reliable environment Capture every detail at all times with discreet security cameras Monitor high-risk patients at all time with remote monitoring Enable preventative action through immediate response time Improve operations and services Save storage and money Automatically decrease storage demands from all of the user’s recordings Reduce bandwidth consumption on critical links with AI-based optimisation Support both on-premises and cloud within a single deployment Up to 200 cameras per Ava vserver appliance - small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons Simple and flexible licencing With a simple licencing model, Ava always includes services and software upgrades. The users no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Round table discussion
An aging employee population and the influx of a new generation of workers and customers is driving change in the physical security industry. Millennials – those born in the 1980s and mid-1990s – are especially impacting how the industry operates, the technologies it produces, and the customers it serves. This tech-savvy generation grew up with the Internet at their fingertips. They embrace innovation in all its glory and expect it to play a seamless role in their lives – and work. We asked this week’s Expert Panel Roundtable: How are millennials changing how security systems are designed, installed and/or operated?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?