Research & Testing
LiDAR-based systems are becoming an increasingly popular choice for security and surveillance applications, due to the technology’s accuracy, reliability, and cost-effective operation. Mass-market camera and analytics As such, Oyla, Inc. has created the world’s first mass-market camera and analytics solution that fuses LiDAR with high-performance video into a single camera that seamlessly integrates with existing physical security infrastructure, while enabling more rapid and accur...
In June 2021, the ‘SPELL’ research project funded by the German Federal Ministry for Economic Affairs and Energy has been launched. With exciting project partners and future-oriented goals, an important step is being taken towards the digital transformation of the economy. ‘SPELL’ research project ‘SPELL’ is the abbreviation for ‘Semantic platform for intelligent decision-making and deployment support in control and situation centres’. The aim of...
Global MSC Security has announced that the new Commissioner for the Retention and Use of Biometric Material and Surveillance Camera, Professor Fraser Sampson, will address delegates at the Global MSC Security Conference and Exhibition 2021. He will be joined by speakers, including Philip Ingram MBE and Professor Martin Innes, to discuss the use of Artificial Intelligence (AI) in the surveillance industry. The conference takes place on Tuesday 19th October 2021, at The Bristol Hotel, in Bristol,...
The manufacturer-independent IT solutions firm, SySS GmbH has tested and certified the security of the MOBOTIX 7 intelligent video platform and MOBOTIX Mx6 security cameras. As a result, the renowned institute for penetration tests in Germany has confirmed the best possible cyber security of MOBOTIX products and solutions. SySS GmbH testing certified During the tests, hardware and software components are subjected to simulated hacker attacks in several scenarios. These correspond to the curren...
Airspace security technology solutions provider, Dedrone has been awarded certification from the U.K. Centre for the Protection of National Infrastructure (CPNI) for its counter-drone technology platform, DedroneTracker for the second time, following Dedrone’s successful certification in 2019. DedroneTracker DedroneTracker detects, identifies, and locates drones by using multi-sensor capability combining radio frequency, radar, and optical sensors. The CPNI counter-drone standard e...
Aiphone, an international manufacturer of intercom and security communication products, is announcing a touchless sensor that allows a way for visitors, vendors, and employees to initiate a contactless call with a simple gesture. Gesture activated calling Compatible with the IX Series door stations for easy installation, the sensor encourages users to “Wave Hello” to activate a call, reducing exposure to germs and the spread of bacteria in high-touch areas. This touchless solution...
DigiCert, Inc., a provider of TLS/SSL, IoT, and other PKI solutions, announced the DigiCert Smart Seal, a new dynamic site seal that gives website visitors confidence that their information is secure on the web. Real-time security indicators enabled through various micro-interactions alert visitors that the seal is actively present on the page, the site has been validated, and the site is protected by an active certificate from the world’s most trusted certificate authority. DigiCert verified site When site visitors roll over the DigiCert Smart Seal, they see the company’s logo, which has been verified by DigiCert. They also view usable information about the site's security delivered right to the seal, so users do not have to leave the page to verify a site's legitimate identity. “HTTPS has changed in recent years, and consumers can no longer rely on just looking for the lock, they need to look beyond the lock for assurance and trust that they are visiting the legitimate website,” said DigiCert Senior Director of Business Development Dean Coclin. “The DigiCert Smart Seal takes site seals into a modern era in a way that helps organisations demonstrate that they take security seriously, and that gives their end-customers peace of mind.” Active role in safeguarding DigiCert Smart Seal is the first seal to visually display the site owner’s brand via a verified brand logo The DigiCert Smart Seal is the first seal to visually display the site owner’s brand via a verified brand logo. It also is the first to bring information previously trapped inside the digital certificate and provide it in terms that users can understand. The DigiCert Smart Seal enables consumers to take an active role in safeguarding their online activity, providing: A detailed splash page that helps reassure consumers of site security practices and presents them in consumer-friendly terms. Additional website security features that are active, such as blocklist checks, Certificate Transparency (CT) log monitoring and vulnerability assessment scans, all accessible with just one click. PCI compliance status when a customer is using a DigiCert Secure Site Pro certificate. Confirmation that the site has been checked against more than 70 blocklists for malware. Instill real-time confidence Trust is fundamental for online transactions, and consumers need assurance that sites are secure and authentic. Traditional trust seals are subject to spoofing, lapses, or general misuse that can undermine trust. With browser UI trust indicators shifting, the DigiCert Smart Seal is an innovative way for enterprises to instill real-time confidence in users that their site identity is verified, their certificate is up-to-date and the site is reliable. Against web spoofing and fraud The DigiCert Smart Seal provides a powerful trust indicator that brands can control for their customers A 2020 study by DigiCert found that 71% of consumers look for security seals before proceeding with transactions. Another study from Crazyegg found that sites that display site seals or trust marks perform 48% better than sites that don’t, thus increasing conversion rates and ROI. Continued Coclin, “With the web now enforcing HTTPS by default and cybercriminals using TLS certificates, users need additional ways to protect themselves online. The DigiCert Smart Seal may not prevent all web spoofing and fraud, but it’s an important step forward in providing a powerful trust indicator that brands can control for their customers.” Smart and secure The DigiCert Smart Seal is available now as part of DigiCert Secure Site and DigiCert Secure Site Pro certificates and early adopters are already expressing positive feedback. “Brand indicators and trust are really important for Italian web users, and the DigiCert Smart Seal indicates to visitors that our site is legitimate and secure,” said Riccardo Cazzola, CEO, Trust Italia. “We are committed to using the best solutions in the market and providing trusted services for some of Italy’s largest enterprises, which is why we use DigiCert and their innovative offerings.” TLS certified "Among continued web-based attacks, website visitors are looking for signs of trust that the site they are visiting is legitimate and secure," said Jindrich Zechmeister, Director of IT Security, ZONER software. "The DigiCert Smart Seal is a great step toward restoring this trust, giving website operators a dynamic indicator of their identity, displaying a verified logo and essential information about the status of their TLS certificates and other site security measures." Brand recognition and trust “We want to build trust, and our customers recognise our trademark, so when they visit our webpage, we want them to feel safe,” said Marcus Wessberg, Head of IT, Ports Group. “Certificates offer so much more than crypto: it’s all about identity, brand recognition, and trust." "The DigiCert Site Seal provides that brand recognition and trust for our site visitors.” Interested customers can learn more about how the DigiCert Smart Seal can empower their business by contacting their account manager or visiting the company website.
In the AIoT era, the world is getting smarter. Everything is going to have an online “ID” and then connected into a vast net of IoT devices, like a laptop computer, a mobile phone, a connected thermostat, or a network security camera. Cybersecurity in the AIoT era According to a Markets and Markets report, IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, currently, there are no unified global technical standards for IoT, especially in terms of communications. This results in inefficient data management and reduced interoperability mechanism and ultimately may cause reduced security in the IoT network. The global Internet of Things (IoT) security market size is expected to grow from USD 12.5 billion in 2020 to USD 36.6 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 23.9%. Importance of cybersecurity Various vertical industries store unprecedented amounts of data on devices like IP cameras and NVRs Dahua Technology, a video-centric smart IoT solution and service provider, believes cybersecurity is of vital strategic importance in the age of AIoT. In various vertical industries, such as traffic, banking & finance, hospital, and critical infrastructure, organisations collect, process, and store unprecedented amounts of data on devices like IP cameras and NVRs. A significant portion of that data can be sensitive or private information, which can be prone to cyber-attacks and the situation, is getting worse because there are more devices than people. As a security solution provider, Dahua Technology continuously invests in cybersecurity and actively copes with network security issues. Continuous investment & active coping Committed to becoming a leader in cybersecurity and privacy protection in the global security industry, Dahua Technology has been developing and exploiting cybersecurity for nearly 10 years. The company keeps investing about 10% of its annual sales revenue in R&D every year, including cybersecurity. In addition, the company put together a professional team of nearly 100 personnel to focus on cybersecurity issues. With rich experience and sufficient resources, Dahua Technology promises to be positive, open, cooperative, and responsible when it comes to cybersecurity. Dahua Technology cybersecurity approach 1. Organisational structure In order to achieve better efficiency and effectiveness, Dahua Technology operates a comprehensive system to cope with all cybersecurity-related issues. The system, led by the cybersecurity committee, also contains a cybersecurity & data protection compliance group, cybersecurity institute, and product security incident response team (PSIRT). The cybersecurity committee, above all departments or teams, can call resources from the whole company, from the R&D centre to the legal department, supply chain, overseas business department, etc. when necessary. Cybersecurity Institute is in charge of building the sSDLC process and implementing the process to all Dahua product series, making sure that all Dahua products are strong against cyberattacks. 2. Security development lifecycle Dahua adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security Dahua Technology adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security. During the security design phase, STRIDE + Attack Tree + PIA is adapted to improve threat modeling. During the security realisation phase, OWASP top 10 and over 150 CWEs are used to achieve static code analysis. During the security test phase, over 20 tools within 7 fields are applied to realise the multiple security testing. CompTIA PenTest+/Security+ are used to carry out professional penetration testing, while compliance ISO 30111&290147 and MITRE org CAN are followed during vulnerability management after the products are sold. 3. Emergency response system Cooperation with professionals from across the globe is a great way to improve vulnerability detection. Therefore, Dahua Cybersecurity Center (DHCC) is established to solve cybersecurity issues with security vulnerability reporting, announcement/notice, and cybersecurity knowledge sharing with our global customer base in order to provide them with more robust and secure products/solutions. Product Security Incident Response Team (PSIRT) is an integral part of DHCC. Composed of professionals ranging from marketing, supply chain, service, and legal representatives, PSIRT is responsible for receiving, processing, and disclosing Dahua product and solution-related security vulnerabilities. Team members are on duty 7 days a week and guarantee to respond to an emergency within 48 hours. End-user, partner, supplier, government agency, industry association, and independent researchers are encouraged to report potential risk or vulnerability to PSIRT by email. 4. Personal data & privacy protection Dahua Technology also attaches great importance to personal data & privacy protection. Complying with applicable laws and regulations such as EU’s General Data Protection Regulation, EDPB’s Guidelines on the concepts of controller and processor in the GDPR, ETSI EN 303645’s Cyber Security for Consumer Internet of Things: Baseline Requirements as well as US’s California Consumer Privacy Act, the company established the Personal Data & Privacy Protection Standard. The standard stipulates that privacy protection methods such as de-identification, data encryption, and systematic access control, privacy-friendly setting are fully adapted to the complete data life cycle all the way from the collection, transmitting, storage to sharing, copying, and deleting. In addition, working with world-renowned third-party institutions, Dahua Technology has received Protected Privacy IoT Product Certification and ETSI Certification from TÜV Rheinland, as well as ISO 27018 Certification and ISO 27701 Certification from BSI, which help demonstrating its capability in managing personal information and compliance with privacy regulations around the world. 5. Continuously iterating security baseline The security baseline built a security element layout of "AAA+CIA+P", a systematic protection framework Centered on the core principles of Security by Design and Security by Default, the Dahua security baseline initiative taps into product safety technology to provide users with adequate safety guarantees. Based on and practicing the security and privacy design principles, the security baseline builds a security element layout of "AAA+CIA+P", forming a systematic protection framework covering physical security, system security, application security, data security, network security, and privacy protection. 7 versions of baseline and 100+ principles have been developed to adapt Authentication, Authorisation, Audit, Confidentiality, Integrity, Availability, and Privacy protection deeply into the product quality assurance system, making sure that all Dahua products enjoy the factory default security. 6. Product security centre In order to help users clearly understand the security status and capabilities of the device, the product security centre will assist users to conveniently and quickly set up the right security configuration to suit the scenarios. General security capabilities include privacy protection (face occlusion, information hiding, etc.), video encryption, security alarm, trusted protection, CA certification management, key management service, attack defense, and so on. 7. Cybersecurity ecosystem Adhering to openness and cooperation, Dahua Technology keeps cooperating with international authoritative security institutions to jointly build a secure ecosystem. By rich & in-depth communicating and cooperation with institutions like TÜV Rheinland, BSI, DNV·GL, Intertek EWA-Canada, and bright sight security lab, the company stays advanced its security capabilities and systems. In a widely networked world of IoT, cybersecurity challenges are pretty much a universal sore spot for companies globally. Dahua Technology, in the business of keeping people safe, takes cybersecurity seriously from head to toe. With a mindset that emphasises cybersecurity and all the resources that it can allocate to establish, carry out and strengthen the cybersecurity approach, Dahua Technology plans to stay positive, open, responsible and improving for the matter of cybersecurity.
The team was building and designing a new website with improved content and features. The main addition being a new product listings functionality which includes: Full product hardware specifications 360° product images 3D product models A downloadable set of manuals, data sheets, and documents Product videos Improved product search database Plus new and improved sections and information throughout. The company will be evolving its website, adding new product lines, and further developing the AMG brand along the way.
VMware, Inc. unveiled expanded cloud workload protection capabilities to deliver security for containers and Kubernetes. The new solution will help increase visibility, enable compliance and enhance security for containerized applications from build to production in the public cloud and on-premises environments. Comprehensive cloud platform “Containers and Kubernetes are enabling organisations to develop and modernize applications faster than ever, but the innovation is also expanding the attack surface,” said Patrick Morley, senior vice president, and general manager, Security Business Unit, VMware. “Our solution extends security to containers and Kubernetes to deliver one of the industry’s most comprehensive cloud workload protection platforms. With security built into the development and deployment of applications, we are bridging the gap between the SOC and DevOps teams to help our customers reduce the risks that come with running containers across clouds.” Addressing threats For many organizations, migrating to the cloud has had to happen quickly and at a large scale to ensure business continuity amid the global pandemic. Development teams are looking to containers and Kubernetes for speed and the ability to scale application delivery. According to Gartner, “by 2025 more than 85 percent of global organizations will be running containerized applications in production, which is a significant increase from fewer than 35 percent in 2019.” Organisations need security for modern workloads to address a new set of threats and build resilient digital infrastructure. Better Security VMware Carbon Black Cloud Container builds security to analyse and control application risks Security is especially complex in multi-cloud infrastructures. VMware Carbon Black Cloud Container builds security into the continuous integration and delivery (CI/CD) pipeline to analyse and control application risks before they are deployed into production. Expanding the VMware Carbon Black Cloud Workload offering, the new capabilities will enable organizations to better secure containerized applications in Kubernetes environments. The solution shifts security left to protect the entire lifecycle of Kubernetes applications. InfoSec teams can now scan containers and Kubernetes configuration files early in the development cycle to address vulnerabilities with unparalleled visibility. The solution provides continuous cloud-native security and compliance to better secure applications and data wherever they live. Enable Collaboration for InfoSec and DevOps Teams Containers and Kubernetes offer development teams flexibility with an infrastructure-as-code approach. However, security is often a roadblock to faster production deployments and later bolted on as an afterthought. The VMware container security module will empower InfoSec and DevOps teams to better collaborate and identify risks earlier in the development cycle with built-in security. The expanded offering will provide a new vantage point to allow cross-functional teams to detect and fix vulnerabilities to achieve simple, more secure multi-cloud Kubernetes environments. Comprehensive solution for InfoSec VMware’s expanded cloud workload protection capabilities will deliver a comprehensive solution for InfoSec teams including: Security Posture Dashboard: Provides a combined view of vulnerabilities and misconfigurations to enable complete visibility into security posture across Kubernetes workload inventory. InfoSec and DevOps teams can gain deep visibility into workload security posture and governance to enable compliance, with the ability to freely explore Kubernetes workload configuration via customized queries. Container Image Scanning and Hardening: InfoSec and DevOps teams can scan all container images to identify vulnerabilities and restrict the registries and repositories that are allowed in production. Teams can set minimum standards for security and compliance, generate compliance reports and follow CIS benchmarks and Kubernetes best practices. Prioritized Risk Assessment: Vulnerability assessments allow InfoSec and DevOps teams to review images running in production and only approved images are deployed. Security teams can use the prioritized risk assessment to detect and prevent vulnerabilities by scanning Kubernetes manifests and clusters. Compliance Policy Automation: Infosec teams can shift left into the development cycle, streamline compliance reporting, and automate policy creation against industry standards such as NIST, as well as the customer’s organizational requirements. This enables the integrity of Kubernetes configurations through control and visibility of workloads that are deployed to an organization’s clusters. Customizable policies help enforce configuration by blocking or alerting on exceptions. The Future of Intrinsic Security with VMware Carbon Black and Tanzu The container security module complements the VMware Tanzu portfolio. Select Tanzu editions include a global control plane for centralized management of all aspects of cluster lifecycle, including policies for access, data protection, and more. Customers can now add powerful security for containers and Kubernetes applications while simplifying operations for InfoSec and DevOps teams. Customer Quote DoubleVerify ensures viewable, fraud-free, brand-safe ads. DoubleVerify powers the new standard of digital marketing performance, ensuring viewable, fraud-free, brand-safe ads. “It’s important that we have full visibility into the risk of our entire Kubernetes workload environment, as well as the ability to detect and prevent vulnerabilities before containers are deployed,” said Roy Berko, Senior Director of DevOps, DoubleVerify. “With VMware’s container security offering, we now have instant visibility to help reduce risk of our containerized applications all from a single dashboard.” Analyst Quote IDC is the premier global market intelligence firm, examining consumer markets by devices, applications, networks, and services “Kubernetes has become the de-facto best-practice standard for developing cloud-native applications, yet developers are still leveraging siloed and inefficient tools with limited cross-organisation visibility,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “VMware’s container security offering provides an opportunity for security and DevOps teams to work more closely together to leverage the power of Kubernetes and better secure the unique lifecycle development processes of container-based applications.” Product Availability VMware container image scanning and CI/CD integration capabilities are expected to be available in April 2021. Runtime security for detection and response will be available later this year.
Globally renowned sensor solutions specialist, HENSOLDT has successfully passed the Factory Acceptance Test of its new airborne multi-mission surveillance radar, PrecISR. In an online demonstration conducted, the PrecISR 1000 airborne multi-mission surveillance radar proved its capabilities to the customer, QinetiQ GmbH, an international provider of airborne special missions operations, based out of Möchengladbach, in Germany. PrecISR 1000 airborne multi-mission surveillance radar The radar data is controlled and displayed by a HENSOLDT EuroNav7 mission system Approximately a year ago, HENSOLDT was awarded a contract to deliver the PrecISR 1000 multi-mission surveillance radar to QinetiQ GmbH for installation in a radome underneath a Pilatus PC-12 modified to a special mission aircraft, without significant modifications at the air frame. The radar data is controlled and displayed by a HENSOLDT EuroNav7 mission system, which is already in operation. PrecISR translates latest achievements in active array and digital receiver technology into a scalable high-performance sensor which can be installed aboard helicopters, UAVs and fixed-wing mission aircraft. Efficient object detection, tracking and classification Due to its software-defined radar modes and electronic beam steering, the PrecISR airborne multi-mission surveillance radar can fulfill a range of different tasks virtually, at the same time. It is able to detect, track and classify thousands of objects and thus, literally find the ‘needle in a haystack’. Because of its compact design and the fact that all its parts are located outside of the airframe, the airborne platform integration of PrecISR is simplified significantly, when compared to other radars in the market. The radar's superior precision and target accuracy make it the sensor of choice for surveillance of large sea and coastal areas, against the threat of piracy, trafficking or illicit intrusion activities.
Energy is the pulse of day-to-day life, but the drive for net zero will require a massive change in the way one creates and use it. With new technologies and complex integration needed, it is increasingly clear that there is one important factor in making the future integrated energyQ systems work: data. That is the thinking behind the 14 January All-Energy/Dcarbonise webinar sponsored by UK Research and Innovation (UKRI) and chaired by Laura Sandys CBE, Chair of the Government’s Energy Data Taskforce and Non-Executive Director, SGN & Energy System Catapult and with an impressive panel of speakers from BEIS, Ofgem, UKRI, Grid Edge and Kaluza. Distributed energy Already, smart technology is entering our homes, and companies are using big data to respond better to consumer preferences. In the new energy future, distributed energy will clearly play a role. People are learning that digital technologies can make distributed energy the cheapest and cleanest form of energy. Local energy systems UKRI’s Prospering from the Energy Revolution programme is pioneering the data-enabled systems approach to unlock the benefits of smart local energy systems. These systems improve the efficiency of existing infrastructure, capture value and provide local jobs, helping to distribute prosperity; while society gains clean, cheap energy delivered in ways that suit modern net zero lives, lived locally. Speakers Dinker Bhardwaj, Head of Data Policy, Smart Energy, Department for Business, Energy and Industrial Strategy (BEIS) Steven Steer, Head of Data, Ofgem Rob Saunders, Challenge Director, Prospering from the Energy Revolution, UKRI Dr. Jim Scott, Co-founder and Chief Product Officer, Grid Edge Valts Grintals, Senior Flexibility Analyst, Kaluza Discussion panel and topics “Having held 26 webinars in a six-month period in 2020, viewed live or on-demand 17,100 times, we are breaking our followers in gently with just one webinar in January,” explained Portfolio and Event Director, Jonathan Heastie of Reed Exhibitions. The session brings together the government, the energy disruptors, and the regulators to discuss: How could better energy data satisfy both households and industry? What policies and regulations are needed to support innovative data-based solutions to provide new services? How can one ensure these innovations benefit diverse consumers, and protect everyone against emerging risks? What data frameworks are needed to enable local infrastructure investment and innovation at scale and pace in different places? Acknowledgment Jonathan Heastie continued, “We are grateful to UKRI for their on-going sponsorship. Their earlier webinar, ‘UKRI’s Road to Net Zero: Investing for Innovation’ held as part of our November All-Energy/Dcarbonise Virtual Summit is available for on-demand viewing.” “We look forward to welcoming their speakers and our audience on 14 January and, in the meantime, wish you all a happy holiday period and hope for some degree of normality to return in the New Year.” “We will be staging All-Energy and the co-located Dcarbonise at Glasgow’s SEC on 18 and 19 August. The Call for Papers is open on the All-Energy website at www.all-energy.co.uk with a closing date of 31 March 2021.”
IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment. Impact of technological developments While market growth rates have been consistent, technological developments have dramatically impacted the market in 2018. The most prominent trend involves mobile credentials, which are poised to revolutionise the longstanding business model for access control system sales. The mobile credentials market was still in its infancy in 2018, but many end-users are already anticipating a transition to these credentials by installing compatible readers in their systems. By 2020, over 10 percent of all new readers sold in the market will be compatible with mobile credentials. Access Control as a Service Other trends to watch in 2019 and beyond include Access Control as a Service (ACaaS), which allow end-users to avoid the need to invest in costly on-site IT infrastructures to support their access control equipment. ACaaS solutions will be particularly popular to support small and mid-sized projects that service less than fifty doors. In addition, Bluetooth Low Energy (BLE) beacons will support geopositioning in an increasing number of the world’s most advanced access control systems. Through geopositioning, the exact location of specific personnel can be identified at any site in real-time. The top fifteen access control vendors represent more than half of the total size of the global access control market, but there are pockets of opportunity for new vendors, particularly to accommodate small and mid-sized projects. The mobile credential and ACaaS markets will also be highly competitive in 2019 and should attract an influx of new market entrants.
Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge technology and knowledge, the UK security industry has particular reason to be anxious of movement restrictions on internationally sourced expertise and resources, as well as a potential ‘brain-drain’ of domestic talent. There is a lack of quantity and quality of home-grown talent in the pipeline, and there is a greater availability of talent from overseas Need for security education There are two distinct aspects that need to be addressed when you look at the requirements of the UK economy with regards to technical expertise. First of all, there is the quantity and quality of home-grown talent in the pipeline, and secondly, there is the availability and desire of talent from overseas wanting to work in the UK. In my own experience, it can be quite a challenge finding the best technical expertise (in the numbers needed) from the UK alone. Currently, alongside our British employees, our business employs a sizable amount of international security talent, ensuring we can fill key roles with exactly the right people. As well as sourcing expertise from abroad, I passionately believe we need to properly support and educate the next generation of UK security professionals too, ensuring we can also find the right talent closer to home in the future. T-Levels provide valuable business experience which can be lacking in traditional academic courses Technology-level training for modern needs It is frustrating to see the current skills gap—particularly as I felt the UK Government began moving in the right direction when it reintroduced the excellent national apprenticeships scheme a few years ago. There is no doubt we will always need excellent academic qualifications and people trained in research and development, but equally a stint in further education is certainly not for everyone! Undoubtedly apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training. Importantly, this isn’t just academic training either—it also provides valuable business experience too, which can be lacking in more traditional academic courses. There has also been a lot of interest in ‘T-Levels’ in the UK. These are technology level courses that are designed to offer specific training for modern technology needs. It is very encouraging to see the promotion of technology education in this way, designed to appeal to students that are looking for a solid career in the UK technology sector. Apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training Focus on engineering and vocational education Unfortunately, it seems the UK is still somewhat behind our European cousins when it comes to technology education and training. Germany, for example, is a country that has traditionally excelled in these areas. The education system in Germany has heavily focussed on engineering and vocational-based training programmes, which has seen noticeable benefits for its technology sector. The Germans have continued to focus on this for decades, meaning the country’s economy has an excellent pipeline of well-trained talent available. Taking this approach would greatly enhance training in the UK too, supporting up-and-coming talent and helping the next generation reach its potential. A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades Meeting business and technology needs A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades. Undoubtedly, like many British businesses we have significantly benefited from this open and vibrant skills market. With the fine details of Brexit being negotiated at the moment, I hope this valuable source of skilled professionals won’t be denied to UK businesses. Even if there are more stringent controls moving forward, the UK must continue to open its doors to this expertise—certainly until we can reap future generations of home-grown talent. It’s interesting (and somewhat ironic) that when you look at some UK universities’ engineering faculties, they often have half or over half of their students from other countries. The UK has world-renowned education facilities that we should be proud of, and yet paradoxically, we are still not educating enough UK engineers. There is a keen interest in technology from younger generations that needs to be nurtured Skill-based training for economic growth International trading and people movement will change after Brexit, but I hope there will also be a significant evolution in the education system to close the UK skills gap. The UK has some of the best educational establishments in the world and a long history of innovation and entrepreneurial skills to make our technology highly commercial. Frustratingly, there is a keen interest in technology from younger generations—just look how addicted young people are to their screens. This keen interest needs to be nurtured and career choices in technology encouraged. With the right training opportunities in place (university education, apprenticeships and T-Levels), the UK can easily implement the tools to create the right opportunities. However, what is really needed now is an impetus from political leaders to address training needs and ensure the economy continues to develop and grow to meet the challenges ahead.
Part 3 of our Intercoms in Security Series: Zenitel’s Call Access Panel manages intelligible critical communications through a security operations centre or control room Greater connectivity, security software enhancements, more customisation, and better sound quality are some of the enhancements driving the intercom market.An advantage now offered on Code Blue’s emergency speakerphones include self-diagnosing software that monitors the status of the phones and their components — microphones, buttons and speakers — and delivers instant notifications if there is ever an issue. Code Blue phones also come with full duplex capabilities with echo cancelling, sometimes known as open duplex, which allows the caller and first responder to communicate simultaneously and eliminates buzzing and static. IP-based networking systems Code Blue also builds its phones to open standards like Session Initiation Protocol (SIP), which allows calls to be easily processed with a wide variety of systems and software solutions, says David Fleming, Chief Design Officer for Code Blue Corp.Networking has impacted the intercom market, with the advent of IP-based systems. The corporate network now makes it possible to share information and to control units from a few yards to thousands of miles away, according to Bruce Czerwinski, U.S. General Sales Manager, Aiphone Corp. For example, central command centre guards can monitor and allow entrance to any networked satellite or unmanned facility 24/7. Multi-site communications Networks have also spawned mobile apps that allow roaming guards to use smartphones and devices to maintain total control of an intercom system while away from the master station and on the Wi-Fi. And network paging is another recently added communications tool, valuable for routine announcements or emergency instructions. "Voice is becoming the killer app for serving the safety and security needs of employees and customers" “We’re now able to offer large-scale multi-site communications using intercom systems,” says Czerwinski. “That’s not just connecting a few buildings on opposite sides of a campus quad, but all those separated by state lines, even across the country.”As markets and customers served by intercom products continue to evolve with new needs requiring new solutions, intercom companies continually poll the market and develop new and interesting solutions for these needs.All-in-one physical access control solutionBecause intercom manufacturer 2N’s products are often used as part of a physical access control system, convenience and security are key attributes. Bluetooth technology will be employed heavily. 2N has just introduced its Bluetooth access control reader for both standalone access control and integrated into 2N’s VERSO door station.The technology is based on Bluetooth Low Energy (BLE) technology, which offers long-range detection (up to 10 metres), low energy consumption and ‘banking’ level security. It can be combined with other technologies — near field communication (NFC) and radio-frequency identification (RFID) — for an all-in-one solution.Mobile video app for door intercoms 2N has also launched a mobile video app/service. It enables a consumer’s smart device to be used as an interface to the door intercom, allowing video calls from anywhere in the world, door access control, and as an ‘always on’ video and audio surveillance system. Notifications can be launched automatically; for example, if someone approaches the homeowner’s door, porch, or surrounding area. A low-cost all-in-one door station — Base — has been released for the residential and small business space, including HD video, audio, and door control but in a simpler-to-install and lower-cost format. Zenitel’s Customer Intercom Station Kit enables customers to build their own stations In the spring, 2N is releasing a Z-wave networked door control solution that’s easy to install and extends the reach of an access control system.Off-the-shelf communication devicesJim Hoffpauir, President of Zenitel North America, says the intercom company offers a choice of either off-the-shelf communication devices or components to enable customised stations to be built based on a customer’s aesthetics or form and/or function needs. Users also must be heard and be understood, says Hoffpauir. “We spend millions of dollars in research and development on the intellectual property that defines and sets the standard for intelligible voice audio in the communications industry,” he says. “And we focus on embedding that capability with strategic alliances in access control, video and unified communications.”“Voice is becoming the killer app for serving the safety and security needs of employees and customers,” says Hoffpauir. “We want to create new interoperable solutions such as our networked HD Video Door station that acts as a communication device as well as an access control station.” It has two-way communication for 24/7 video identification and support for IP phone or unified communications through SIP. Intelligible critical communications solutions Zenitel’s Call Access Panel manages intelligible critical communications through a security operations centre or control room. The panel has a small footprint with pre-programmable buttons for instantaneous emergency or mass notifications to all intercom stations or IP public address, alarms, or horns. And it is SIP-compatible for unified communications. Changes in hardware and software are transforming the intercom market, as are changes in how systems are combined and configured. There is also a trend toward more discernment in terms of audio quality and system performance. Including an evaluation ‘scorecard’ in a request for proposal (RFP), for example, can ensure there is a clear way to evaluate systems being considered. “We are teaching the market there can be a legitimate scorecard on intelligibility,” says Dan Rothrock, SVP of Global Strategic Alliances, Zenitel North America. “You may not know you have bad audio until something bad happens, and it’s too late.” Read part 4 in our Security Intercoms series here
Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also known as red teaming). The session, titled “We Sneak into High Security Buildings and Get Paid for It”, will be presented by Michael Glasser, President, Glasser Security Group. He has two decades of experience providing security design strategic planning, implementation oversight, auditing and penetration testing. “Penetration testing determines whether people and systems are providing the protection you think they are,” says Glasser. Various system components should come together into a solution that works for the client. People, technology and architecture are all components of successful security systems. His motto: “Stop guessing and starting testing". Test-driving security systems “You can compare it to driving a car,” says Glasser. “You want to be sure the brakes work and the engine works, but then somebody has to test-drive the car.” Stop guessing and starting testing" The concept of penetration testing goes back to the Cold War, when the military had “Red Teams” and "Blue Teams”, competing squads that used their skills to imitate attack techniques enemies might use. More recently, the term “pen testing” has become common in the cybersecurity industry, often referring to “white hat” hackers that test the effectiveness of cybersecurity measures. Applying the concept to physical security in corporate America brings the concept full circle. “People think their controls work, but they realize they really need to see if it all works together,” says Glasser. Pen testing in corporate America “You can go to any military base or nuclear power site and you see pen testing,” says Glasser. “But often it doesn’t happen in corporate America.” Sometimes physical pen testing is approached as an extension of cybersecurity testing because addressing physical threats is an element in cybersecurity, too. “It’s the same service, except to make sure the physical house is in order,” says Glasser. Glasser’s session will be among the SIA Education@ISC East presentations scheduled at the education theaters on the show floor at ISC East, Nov. 20-21 at the Javits Center in New York. The process If you believe the movies, Glasser’s job is all fun and excitement, like a “bunch of kids having fun”. The reality is more mundane, he says. “People think it’s fun, but it’s work, not fun.” The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities before attempting a break-in. Research is based on threat modelling: What is a company worried about? Who is the bad guy? What do they want to do? What are the threats? The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities Among other tools, Glasser uses Open Source Intelligence (OINT), which is collection and analysis of information gathered from public, open sources, such as media, the Internet, public government data, etc. Glasser comes from a physical security industry family – both his mother and father were employed in the security industry – and he attended his first ISC East show in the 1990s when he was 11 years old. As a security consultant and security expert witness for more than 20 years, he has previously spoken at GSX and various ASIS International events.
Coming off a successful ISC West show, Honeywell is sharply focussed on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine learning-based analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralise decision making, and allow customers to manage it all from anywhere. Solutions for vertical markets Honeywell Commercial Security is focussed on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalised systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing technology for sports security The software is able to visualise, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualise, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
Despite any negativity you may hear, Hikvision is optimistic about their role in the U.S. market. “We demonstrate that we can be trusted, and that we should be trusted,” says Jeffrey He, Vice President, Hikvision, and President, Hikvision USA and Hikvision Canada. “We have sound products and technology. Our mission in the security industry is to protect, not to harm. Otherwise why would we be in this industry?” Hikvision is committed to investing in the North American market, where there was ‘positive year-over-year growth’ in 2018 and ‘strong’ sales in Q1 this year, according to Eric Chen, General Manager of Hikvision USA and Hikvision Canada. HikCentral central management software The company’s U.S. focus is shifting from products to solution sales, with emphasis on ‘mid-market’ small- and medium-sized businesses (SMBs). The largest verticals are retail and education, and there are emerging opportunities in the cannabis market. Launch of the HikCentral central management software (CMS) is a component of the company’s solution-sales approach. Launch of the HikCentral central management software is a component of the company’s solution-sales approachMr. He acknowledges the growth of ‘anti-China sentiment’ in the United States and other parts of the world, which he says will impact Hikvision’s operations globally. Specifically, in the U.S., ‘political’ elements impacting Hikvision’s business include ongoing tariffs and a trade war, Congressional calls for export controls and sanctions, and a provision of the National Defense Authorization Act (NDAA) that bans use of Chinese video surveillance products in government applications. Specifying cybersecurity initiatives at ISC West In spite of it all, Hikvision’s message at the recent ISC West show was overwhelmingly positive, and the company also detailed cybersecurity initiatives they say put the Chinese company ahead of many competitors in the industry. Eric Chen came in as General Manager last year; he previously spent a decade working for Hikvision in China. Chen reports solid 18.8% year-over-year growth for Hikvision globally, totalling $7.4 billion last year. He notes the company saw 40% compounded growth between 2010 and 2018. Globally, there are 34,000 employees, 16,000 of whom are research and development (R&D) engineers. Hikvision’s expanding global footprint includes 46 international branches. There are three manufacturing facilities in China, in addition to one in India. HikRewards program for HDP customers At ISC West, Hikvision’s theme was ‘Focus on Your Success’, including introduction of the HikRewards program that provides rebates to HDP (Hikvision Dealer Partner) customers, their core dealer base. A new online Hikvision Knowledge Library for HDPs provides training and reference materials dealers can share with employees. A new tech centre, introduced in December, provides data sheets, product information, and support resources. There is also a North American R&D team headquartered in Montreal. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls A customer satisfaction survey launched in March provided good feedback from customers. “They know who to call if they have a problem,” says Chen. “We want to focus on making customers successful.” The success theme also extends to Hikvision employees, who are featured in videos describing their jobs and enthusiasm for Hikvision. There are some 400 employees in the North American operation. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls. Half of the booth was focussed on solutions, especially retail and education, and also gaming and commercial real estate. Security products displayed at ISC West A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS systemProduct highlights at the ISC West booth included the 32-megapixel PanoVu multi-sensor dome camera, whose 180-degree panoramic image was displayed on a 65-inch monitor. A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS system. Some products new to the North American market, including intercoms, turnstiles, emergency call stations, and under-vehicle inspection, were displayed. Hikvision’s deep learning products are moving into their second generation, including the ability to obscure private information on videos to comply with GDPR/privacy requirements (previewed at ISC West and released later in the year). Algorithm components of Hikvision’s DeepInMind artificial intelligence are being adapted into a platform called AcuSense for value-priced products, which can recognise a human or vehicle and help filter out false alarms. Also being adapted to products with lower price points are the ColorVu system that incorporates visible light LEDs to provide colour images at night, and DarkFighter low-light capabilities. Penetration testing of cameras and NVRs As a global manufacturer, Hikvision faces a high level of scrutiny about cybersecurity, which Mr. Chen says is “a good thing for us,” enabling them to highlight the steps they are taking to improve cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity In September 2017, Hikvision began working with third parties (including Rapid7) for penetration testing (ethical hacking) of its cameras and recorders. That same month, Hikvision set up a Cybersecurity Hotline open to anyone with questions about cybersecurity, including white-hat hackers and researchers. Even before that, Hikvision had an open-door policy on cybersecurity and a program for patching and disclosing responsibility. In February of 2018, Hikvision released a 40-page Cybersecurity White Paper describing cybersecurity testing and processes built into the software development lifecycle. That same month, Hikvision launched an Opened Source Code Transparency Center and offered an open invitation to anyone wanting to inspect Hikvision’s source code and let them know of any vulnerabilities. FIPS 140-2 certification by NIST Hikvision has also become a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA), which ensures their patching and incident reporting programs have been reviewed by a CNA partnering company. Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVRsIn August, Hikvision received Federal Information Processing Standard (FIPS) 140-2 certification, a U.S. government encryption standard created by the National Institute of Standards and Technology (NIST). Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVR products. Davis said the FIPS 140-2 certification process began before the NDAA ban on use of Hikvision products in the U.S. government, and in any case is a standard that ensures a high level of encryption. “We wanted to make sure we had the same level of technology,” he says. “It was not to win over the government.” Making industry more cybersecure “We are really trying to have third parties test and certify our equipment,” adds Davis. “We are trying to be open and transparent. Education and awareness are key.” “We need the trust of customers in the security community,” says Mr. He. “No matter what, we have to follow the highest standards to offset the concerns and accusations.” In April 2018, Davis became a member of the Security Industry Association (SIA) Cybersecurity Advisory Board to help make the entire industry more cybersecure through education, awareness and standards. Hikvision has also joined the Forum of Incident Response and Security Teams (FIRST at first.org), a global cybersecurity incident response consortium that cooperatively handles computer security incidents and promotes incident prevention programs. Davis has presented Cybersecurity Road Shows in 22 cities in the United States and Canada, and also in Australia and New Zealand. The 90-minute presentations focus on education awareness around cybersecurity and seek to get attendees engaged and aware about cybersecurity in business and also in their homes.
Students of all ages in state schools are entitled to a safe learning environment. If students don't feel safe, they are not able to stay focused during classroom lessons and activities. That’s why Narre Warren South. P-12 College has upgraded its security with the installation of a sophisticated SALTO access control and ID pass system. Located south east of Melbourne, Australia, Narre Warren South P-12 College is a unique school on one campus with two sub schools, Primary, (Prep to Year 6) and Secondary, (Years 7 to 12). It follows the P-12 Curriculum which is designed to provide diversity and pathway opportunities, ensuring students maximise opportunities that exist after school and ensure people achieve their learning goals in a fun and supportive learning environment. Mechanical key system The College previously used a mechanical key system for its security needs Home to over 2000 students and 200 staff, cultural diversity is a feature of the College with at least 50 ethnic groups being represented speaking 68 languages. A third of the College’s student population come from families where the language background is other than English. The College previously used a mechanical key system for its security needs; however this was increasingly complicated to manage as keys multiplied, and it was difficult to guard against key duplication and copying. Another negative was the cost of re-keying and replacing locks to maintain security if keys were lost or not handed back. Security arrangements The College also had a number of challenges when it came to managing and limiting traffic flow through the staff car parks, both inside and outside school hours. To alleviate such problems, the College decided to look into upgrading its security arrangements and called in local security specialists Eclipse Security Systems. Director Greg Flood takes up the story. “We met with Brett Dyer, (the College’s Property and Maintenance Manager), and explained how SALTO solutions are in use around the world in educational environments including universities, university housing, schools, research institutes, academies, kindergartens and more where they provide security, access control and campus management.” Cost-effective package Brett liked the fact that SALTO could offer a solution that was education proven" “Replacing keys with smart access control would give the school much more control over its security. For instance installing smart online wireless locks on main entrance doors would enable the school to incorporate these doors into its lock down procedure. At busy student drop off and pick up times in the morning and afternoon, the school gates could be automated to improve traffic flow and ease congestion.” “And since Narre Warren South P-12 like almost all state schools hire out their sports, meeting facilities etc to third party groups outside of school hours, the new access control solution would make it much easier to manage access for such short term visitors. Brett liked the fact that SALTO could offer a solution that was education proven and offered a secure, flexible way to have all the above benefits and more in a versatile, cost-effective package that was future proof and gave a great return on the schools investment dollars.” Scheduled automatic locking Most external doors have a mix of offline and online SALTO XS4 escutcheons" “The removal of the old system and the upgrade to smart locks was smooth and straightforward, and we’ve now retro-fitted in excess of 100 doors and automated a number of perimeter gates. Most external doors, plus the addition of a number of internal office doors across all the blocks, have a mix of offline and online SALTO XS4 escutcheons, as well as control units and wall readers.” “The most important thing for us is to ensure that we are doing everything we can to safeguard our children. Our new access control system furthers this goal” says Brett Dyer. “We went with Greg’s recommendation of SALTO for its functionality and value for money. We particularly like how easy it is to use and program, especially the issue and management of contactless smartcards for external user groups." "The scheduled automatic locking and unlocking of external doors and gates is a huge time saver, and so far we’re pleased with the product and the capabilities it now gives us.”
To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, a new smart IoT industrial park in Hangzhou has been put to use by Dahua Technology, a video surveillance solution provider. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Efficient information integration The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialised requests and ever-changing reality.The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production(preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning high-end devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools, etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. Fast processing According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35 multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. Dahua Smart Industrial Park provides the great benefit of internal synergy The faster speed also applies to the development of new molding, since Dahua Smart Industrial Park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organising system is supported by topnotch equipment, such as MAKINO high-speed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005MM, while also supporting CAD / CAM / CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days.Higher quality results in less likelihood for products to malfunction especially when they are used in critical situations Time- and cost-saving solution By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors, etc., all of which proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, not-allowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons: first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, Dahua has put together an effectively closed loop for quality control in the manufacturing process. Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example: it can process components, in metric size, as small as 03015(0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry.Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process Enhanced vision and intelligent analytics Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high-definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognise flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.In the future phase, this industrial park is expected to be more intelligent to enable a safer society and smarter living Safe society and smart living Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialised needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialised use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one. And in the future phase, it is expected to be more intelligent, to realise client-centred flexible production and to enable a safer society and smarter living.
ip.access has announced a collaboration with Imaginet, a provider of IT network and security solutions, to implement a rapidly deployable disaster response network in Makati City, the Philippines. Makati City, part of the Metro Manila region, is the main financial hub and has a population of 6 million people. Built on a drained mangrove swamp, the city’s infrastructure is at a high risk for significant damage in the event of an earthquake, typhoon or other natural disasters. In the event of a disaster it is likely that communications infrastructure would be affected – hindering efforts to direct the population to safety and locate people trapped in collapsed buildings. To improve the city’s preparedness for natural disasters, the local Disaster Risk Reduction & Management Office (DRRMO) worked with Imaginet to implement a rapidly deployable mobile network. Deployed via four command vehicles, the network will allow first responders to communicate with the population and report back to the central command office.The ip.access team has an inherent understanding of disaster situations, with extensive experience working in harsh environments Ensuring disaster preparedness Basing the network on 2G technology, to ensure that signals would be capable of penetrating collapsed buildings and enabling communication through SMS messaging, ip.access was tasked with designing, installing and testing the network in a tight six-week window. Following a successful commissioning period, the four command vehicles were first deployed in December 2017. Commenting on the partnership, Blair Duncan, CEO at Imaginet, said, “This was a challenging technical undertaking. As such, we needed confidence that we were working with a partner that could deliver a high quality solution. In that respect ip.access were an ideal partner – the team has an inherent understanding of disaster situations, with extensive experience working in harsh environments. We knew that we could rely on them to equip our vehicles with the robust and reliable radio network the DRRMO requires should a disaster strike.” Small cell solutions Nick Johnson, CTO at ip.access added, “We have a wide range of award winning commercial off-the-shelf (COTS) small cell solutions that can be easily integrated and operated within a wide range of specialist deployment scenarios – including in disaster response settings.” “Communication is critical in a disaster situation, so the fact our proven solutions deliver five nines availability with exceptional reliability makes them ideal for applications like the vehicle-borne network in Makati City.” Due to the success of the vehicles, the Makati City DRRMO is now looking to increase its fleet to nine vehicles to enable more flexibility and more robustness in its disaster readiness.
Concern for safety of the lab staff prompted IHEP to seek a more securely automated system The Institute of High Energy Physics (IHEP), the Chinese Academy of Sciences (CAS) is a comprehensive research base with its main efforts focused on high energy physics, R&D of advanced accelerator technologies, advanced synchrotron radiation technologies and applications. Advanced scientific research facility technologies and high-tech products with sophisticated science and technologies like radio frequency, UHV, microwave, precision magnet fabrication, etc. The developmental fields cover accelerator technology, nuclear medical instrument, nuclear instrument and meter technology, industrial automation technology, information technology, precision machining, etc. IHEP contains 11 laboratories. The research efforts are centred on high energy physics, cosmic ray and high energy astrophysics, theoretical physics, accelerator physics and technology, synchrotron radiation and free electron laser and nuclear analysis technology and application, etc. Large scientific tools include Beijing Electron Positron Collider (BEPC), Beijing Spectrometer (BES), Beijing Synchrotron Radiation Facility (BSRF) and Beijing Free Electron Laser (BFEL.). Solution Beijing Access Control Technology “We were seeking an advanced method of managing access control and for higher security,” said Li Tie Hui of The Accelerating Control Center in China. Access to restricted lab areas was being manually managed by staff – individuals requiring access to the lab had to physically use a key located in a central control unit. The key then had to be returned to its location and all staff had to evacuate the lab in order for the lab operations to initiate. The lack of a sophisticated security procedure generated a high risk of people remaining in the lab and potential exposure to radiation. Concern for safety of the lab staff prompted IHEP to seek a more securely automated system. "Convenience, safety and process automation were key considerations when we selected HID products" Solution Beijing Access Control Technology Co.(www.bj-access.com.cn), a local access control solutions provider, won the project out of nine bidders to exclusively develop an advanced safety and security system featuring HID RFID access control technology integrated with networked security, custom software, video surveillance, and a fire prevention/detection system. HID ProxPro® card readers “Convenience, safety and process automation were key considerations when we selected HID products. We had HID cards and readers at other IHEP facilities and knew those existing products were providing the kind of security needed at the lab,” said Hui. Manual access to each door of the lab is now accompanied by an HID reader with sound and a separate LCD. The HID® reader outputs an identification number that furnishes the customised system with a higher level of security and shows the identification of the entrant, time of day and how many people remain and/ or exit in and out of the restricted lab area, displaying their names on the LCD screen. Once a departure confirmation is complete by flashing on a “departure confirmation” reader, the remaining name on the LCD screen disappears. HID access control technology controls entry into the lab, prohibiting anyone from entering while the lab is operating. In addition, HID ProxPro® card readers were modified to overcome power disturbances created by the radioactive lab environment, delivering a reliable solution for the environmental challenges at the Institute of High Energy Physics
Two models of MOBOTIX IP camera were selected for the wind tunnel, as advised by R. Pierre Digital NEWTON S.r.l. is an independent testing laboratory established in 2000, recognised and certified by international bodies such as Accredia, FIA - Fédération Internationale de l’Automobile, SFI-USA, SNELL-USA, Italcert, Istituto Masini, TÜV Rheinland International, TNO and SNCH - Société Nazionale d’Homologation et de Certification for tests of motorcycle helmets and auto racing helmets (Formula 1 and WRC), children’s helmets for kart racing, HANS devices for Formula 1 drivers, devices to protect the head, eyes (goggles, masks, and visors) and body (riding, bike, and touring helmets) and for certification tests on high-performance seats. Wind tunnel project In addition, the Ministry of Infrastructure and Transport considers the laboratory’s equipment to be suitable for all tests required by Regulation 22 concerning helmets and visors for motorcycle drivers and for some of those concerning the approval of two- or three-wheeled motor vehicles. The Newton laboratory has recently completed the installation of a 280kW subsonic wind tunnel: this is a closed return, Göttingen-type wind tunnel, designed to be used with either an open or a closed test chamber, depending on the specific testing programme. The electric power needed is produced by a generator integrated into the structure. Thanks to the testing activity carried out within the laboratory, products obtain the certifications required by various Italian authorities (which vary according to the sector to which the tested product belongs) in order to be considered adequate, and consequently put on the market. “The idea of building an actual wind tunnel came about mainly to deal with the problem of ventilation inside the helmets,” explains Luca Cenedese, director of Newton. In fact, it seems that having solved the problem of head protection parameters, today there are large international groups focusing mainly on the study of comfort, concentrating mostly on thermal stresses and the analysis of how these phenomena affect the reaction and concentration abilities of automobile, motorcycle, and bicycle racers. “In existing wind tunnels, everything was focused on the machine, not on the helmet. So we decided to prepare by building ourselves a medium-sized wind tunnel that could also satisfy these new requirements. Today, with a wind speed of about 250 km per hour, we test helmets, bicycles, magnetic sirens for police cars and also traditionally large objects - for example subway cars or high-velocity train cars - that by utilising the principle of aerodynamic similarity, are proportionately reduced in scale,” continues Cenedese. Comparing data and images Built a few years ago, the Newton wind tunnel has now found approval from old and new clients from different sectors. The wind tunnel allows continuous and very effective activity. To obtain the greatest performance and offer something extra to our clients, Newton needed to identify a system that would permit keeping track of all inspection and test activities. “We work with the engineers who come to our laboratories during the testing phase to design and modify the prototypes currently being made while the product is being tested. Some tests last for many hours: we soon realised that we would have had surprising results if we had had a system available that allowed continuous recording.” "Network-integrated cameraswere needed that could not only communicate with each other but also be accessible remotely" The software used for tests inside the wind tunnels produce an enormous amount of numerical data: that is, numbers relating to performance that characterise an object, especially force, pressure, and temperature. The experts at Newton have augmented this type of numerical information, produced and processed by a PC, with a second, new perspective: the display of images produced by MOBOTIX cameras during the products’ testing phase. And thanks to the combination and comparison of numerical data and images, Newton can now provide its clients with much more accurate measurements, achieving levels of qualitative detail never before seen. Need for network-integrated cameras The years dedicated to this type of activity and the studies carried out in the Newton laboratories led to the awareness that the measurement of data, in and of itself, is very simple. Rather, the real problem is managing the amount of data produced by the system, which is quite often very difficult to read and make intelligible, so as to understand the various phenomena that occur in the products tested in the wind tunnel. To deal with this need, the idea was therefore to integrate the images by using video surveillance cameras. An idea that can now be described as a real pilot project, in other words a one of a kind application. “We could not rely on images taken with traditional movie cameras, because the test sessions often last for many hours and we needed images that would allow us to observe the phenomena from many angles at the same time. In addition, network-integrated cameras were needed that could not only communicate with each other but also be accessible remotely.” Two models of MOBOTIX IP cameras were chosen: one with a 360-degree view, and one AllroundMono model Quality, timeliness and immediacy with MOBOTIX Thanks to the support and advice of distributor R. Pierre Digital, two models of MOBOTIX IP cameras were chosen: one with a 360-degree view placed on the ceiling, perpendicular to the product test position, to offer a panoramic view; and one AllroundMono model, positioned at the side but movable as needed, which offers different details and angle shots within the same shot. Thanks to the high quality of the images from the two MOBOTIX cameras, the Newton engineers can guarantee the end user that they can take very timely action in the test phase of their products, managing any anomalies and malfunctions in real time and making the necessary changes. The advantage of MOBOTIX IP cameras is that they are also accessible remotely: a very significant plus since many of Newton’s clients come from abroad, and often some of their staff follow the product test operations remotely, thanks to a system access login offered to the client. “By combining data and images, we achieved surprising results in the test phase. When we analyze the data, if we see that the data changes, we go to retrieve pictures of the moment when the data changes and we can immediately understand the phenomenon. For example, during a test on a bicycle and a cyclist, the team’s engineers were simultaneously checking the numerical data regarding the bicycle’s efficiency and, from the images produced by the camera, the position of the cyclist at the moment when the efficiency was greatest. We are not information systems engineers, and in this sense, we were helped a lot by not having to use image management software: the images are processed on board the cameras and the result compared to other systems is surprising”, concludes Cenedese.
Airbus Defence and Space aims to validate the use of smartphones in different operational situations Airbus Defence and Space and its partner RIKS (the State Infocommunication Foundation), the technical operator of Estonia’s national Tetra network, is performing a field trial of the Tactilon Agnet smartphone application - formerly known as TSA - for two months. Voluntary civil defence and governmental organisations want to confirm Tactilon Agnet’s ability to fulfil the operational requirements for typical mission-critical communication. The field trial combines the use of public broadband networks and Tetra services. Airbus Defence and Space solutions For the field trial, Airbus Defence and Space has provided a service cloud environment and delivered an RCS9500 integrated radio dispatching system, an automatic vehicle location solution, a Tetra base station, several Tetra radios, and different types of smartphones equipped with the Tactilon Agnet application. The application enables smartphone users to make instant group calls (push-to-talk feature) and send messages to Tetra users as if they were equipped with Tetra devices. Challenging test environment During the field trial, Airbus Defence and Space and RIKS aim to validate the use of various types of smartphones in different operational situations. In addition, both Airbus Defence and Space and RIKS want to collect information about how mission-critical Tetra communication features have to be operated in an LTE environment. To push the LTE-based Tactilon Agnet application to its limits, RIKS has set up, in cooperation with commercial operators, a challenging and complete test environment that includes not only a regular LTE network on the 800 and 2600 MHz frequencies, but that also includes a mobile LTE base station that is connected to the core network via broadband satellite link. Demand for broadband group communication “As we observe an increasing demand for broadband group communication with multimedia features among mission critical users, Airbus Defence and Space offers a unique solution called Tactilon Agnet. It provides fully-fledged, seamless and secure integration of Tetra radio users with those who use Tactilon Agnet on their smartphones,” explains Olivier Koczan, Head of Secure Land Communications at Airbus Defence and Space. He points out that RIKS and Airbus Defence and Space are “clearly on the verge of introducing mission-critical communication features of the next generation”. Estonia’s public safety organisations have communicated within a nationwide Tetra network from Airbus Defence and Space since 2007. In 2015, the company delivered critical communication solutions enabling the use of LTE networks, which will also be used to test the Tactilon Agnet application. This solution provides high availability and secure access through commercial LTE network services.
Round table discussion
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?