Tamron Co., Ltd. (President & CEO: Shiro Ajisaka), a renowned manufacturer of optics for diverse applications, announces the launch of two fixed focal lenses, M117FM06 and M117M08, for large 1/1.7” imagers employed in machine vision, supporting full 6-mega-pixel resolution in a Ø29mm compact body. (In machine vision camera lenses compatible with 1/1.7 imagers and supporting 6 mega-pixel resolution - survey by Tamron, effective as of June 2020.) In recent year, mega-pixel camera...
ADI Global Distribution, a wholesale distributor of security, AV and low-voltage products, announces it has launched new websites in the U.S., Canada and Puerto Rico to deliver an enhanced online shopping experience at ADI. The redesigned sites feature a simple user interface and improved navigation to make online browsing and purchasing seamless for dealers. ADI’s websites and e-commerce platform, known as the Digital Branch, gives customers access to the full range of products and servi...
Dahua Technology, a video-centric smart IoT solution and service provider, launches its new technology partner program – Dahua ECO Partner Program (DEPP). DEPP is tailored to enhance business relationships with technology vendors in the surveillance and IoT industries. Enhancing interoperability is the main objective of this program, nevertheless, it also goes far beyond this. The ECO system is dynamic and builds stronger partnerships through joint marketing activities that extend the vis...
Senstar, a provider of perimeter intrusion detection and video management solutions, is pleased to introduce enhancements to its FiberPatrol FP1150 fibre optic intrusion detection sensor. “Initially launched in 2018, the FP1150 is a compact, rugged and highly integrated addition to Senstar’s FiberPatrol line,” said Product Manager Stewart Dewar. “Now with its extended detection range, support for a variety of deployment applications, and simplified per-metre licencing, t...
Videotec is proud to announce that it has attained ‘Lloyd’s Register Type Approval’ for its cameras and accessories for use in extreme environments. The issuance of this certificate by Lloyd's Register certifies that Videotec products are compliant with the stringent quality and reliability requirements demanded by the maritime sector's international standards. Providing visual support To be more specific, the type of certification that has been achieved is 'Test Specificati...
LenelS2 announces major enhancements to VRx, a next-generation video management platform that features advanced analytics based on deep learning technology. VRx provides a unified access control and video surveillance experience when used in conjunction with LenelS2’s NetBox access control system, Magic Monitor® unified client and Cumulus cloud-based service. LenelS2, a provider of advanced security systems and services, is a part of Carrier, a provider of innovative heating, ventilat...
Hikvision, an IoT solution provider with video as its core competency, announces the launch of Hikvision Optimus – a system-level middleware product, for integration of events, alarms and data synchronisation between HikCentral and other systems like access control, building management systems, and IoT devices. For example, integrating HikCentral with access control systems via Optimus software helps customers operate more efficiently. This integration enables users to quickly and easily receive door alarms, grant or deny access, and synchronise user credentials in both systems. Continuous integrated operations Optimus middleware features connectors that bridge third party systems with HikCentral, regardless of their coding standards. This ensures a long-term, uninterrupted, continuous integrated operations. Optimus offers a wide range of advantages: The majority of use cases can be completed using only one connector as Optimus integrates multiple products and systems. The easy-to-use graphical interface enables integrators with no programming skills to build custom ‘if-this-then-that’ scenarios to match exact customer needs. Third parties can develop their own connectors with Optimus based on their own API/SDK and thus achieve rapid integration times. A built-in health monitoring function provides the operator with a real-time insight into the integration status. Truly scalable approach The Optimus product comes with a flexible and distribution-friendly licencing structure for the connectors. This structure allows connector developers to stay in control of usage, yet determine pricing at their own discretion. “We are very excited to launch an offering that represents a completely new and truly scalable approach to integration with HikCentral. Optimus will enable Hikvision installers and technology partners to easily integrate their systems with HikCentral,” says James Iacuessa, Senior Product Manager from Hikvision. Based on its third-party software development kit (SDK), Hikvision has created a number of connectors with Optimus software: Paxton NET2 AMAG Symmetry
Paxton Access Inc. has added to their video intercom product line by launching the next generation standard monitor, the Entry Standard monitor. Designed with simplicity in mind, this versatile monitor offers a feature-rich and cost-effective solution for a range of applications, from schools and hospitals to offices and apartments. Like other Paxton products, this new Entry Standard monitor is engineered with a focus on simplicity and ease-of-use. Excellent audio quality, full-duplex voice communication and a clear user interface on a 4.3” capacitive touch screen make it the ideal solution for users. The monitor can be quickly and easily installed either on a wall or desk mounted with or without a handset. Networked access control system The premium user interface with call and event log can be easily personalised with 14 different theme designs. A smart new call snapshot feature enables the users to see their missed calls, so they never miss a visitor again. The whole Entry video intercom system consists of three components that auto-detect on set up; external panel, interior monitor and door control unit. This monitor is a real plug and play solution that can be used with a range of panel options, standard, premium and vandal resistant, making the whole system flexible for a wide variety of sites. The Entry video intercom system is fully compatible with Paxton’s cutting-edge Net2 networked access control system, as well as working as a standalone solution. It comes with Paxton’s five-year warranty. Clean user interface The monitor features a glass covered capacitive touch screen and high-quality front facing speaker" When integrating Entry video intercom with Paxton’s Net2 access control system, the standard monitor features action buttons giving customers an additional layer of control with functionality like opening other doors on the system or unlocking external gates. Jeremy Allison, Paxton’s Senior Product Manager, says, “The second-generation Entry Standard monitor blends contemporary aesthetics with high quality materials and clean user interface. Designed to fit into any environment with a variety of different themes, it allows the user to personalise the monitor to suit their tastes." High-quality front facing speaker "The monitor features a glass covered capacitive touch screen and high-quality front facing speaker. Designed with simplicity in mind for both the installer and system user, there is no programming required.” The Entry Standard monitor is available to purchase from Paxton’s approved U.S. distributors. Paxton is introducing their latest solutions to the market via a free 45 minute installer and integrator, which can be accessed through the company’s official website.
AAEON, a provider of IoT and AI edge computing solutions, is helping to power the pandemic response with the BOXER-6638U rugged embedded box PC. Featuring Intel Core i3 processors, the BOXER-6638U brings the power of industrial computing to mobile X-ray machines, used to perform chest X-ray scans of suspected COVID-19 patients. This vital equipment helps increase the speed and accuracy of diagnosis, and prevent the spread of the pandemic. The spread of Coronavirus disease 19 (COVID-19, previously known as “2019 novel coronavirus”) has had serious worldwide impact, becoming the largest and most widespread epidemic in the past century. The impact to human lives and global economies is severe. The workload and stress endured by the medical professionals on the frontline of containment and prevention is immeasurable. Alongside these medical professionals is the mobile X-ray machine developed by AAEON’s customers to help accelerate the diagnosis of diseases, saving time and effort. BOXER-6638U rugged embedded box PC The BOXER-6638U is equipped with the Intel Core i3 5010U processor, providing low power consumption At the heart of these mobile X-ray machines is the BOXER-6638U from AAEON. To integrate into this vital medical equipment, AAEON’s customers have strict requirements for specifications and testing. The BOXER-6638U meets these requirements and offers the additional benefits of being lightweight and easy to integrate into the device. With a fanless design and rugged construction, the BOXER-6638U has proven reliability with a failure rate below 0.2%. The BOXER-6638U meets the customer’s requirements for provide redundant communication methods to provide accurate data in real time on site. Meeting customers’ needs for flexibility and customisation is what drives AAEON’s business philosophy of developing and manufacturing industrial computers, and has for nearly 30 years. Intel Core i3 5010U processor The BOXER-6638U is equipped with the Intel Core i3 5010U processor, providing low power consumption and high performance. With rugged, fanless construction, it can operate in temperatures from -20°C to 60°C, and operate without errors in places with drastic temperature changes. In this fight to prevent the spread of the pandemic, AAEON products have been working effectively on the forefront" Compact and lightweight, the BOXER-6638U can easily integrate with new systems, or upgrade existing infrastructure. The BOXER-6638U offers I/O features including DisplayPort, two Ethernet ports and antenna hookups for wired and wireless transmission, two Mini-Card expansion slots, and storage with mSATA, HDD/SSD slots. Mobile X-ray machines “Our customers in China who specialise in manufacturing medical equipment purchased nearly a thousand BOXER-6638U box PCs, which were installed in mobile X-ray machines deployed to key hospitals,” said Alex Hsueh, Director of AAEON’s System Platform Division. “In this fight to prevent the spread of the pandemic, AAEON products have been working effectively on the forefront with several platforms and solutions employed in various applications. AAEON is proud to be a part of this ongoing effort and every member of the AAEON Team looks forward to our continued contributions,” Alex added.
Quantum Corporation announces it has completed its acquisition of the ActiveScale™ object storage business from Western Digital Technologies, Inc., a subsidiary of Western Digital Corp. The acquisition expands Quantum’s leadership role in storing and managing video and other unstructured data using a software-defined approach. Jamie Lerner, President and CEO, Quantum commented, “The strategic acquisition of ActiveScale bolsters our existing product portfolio and expands our addressable market providing critical software capabilities that enhance our go to market strategy with minimal risk to Quantum. With engineers who developed ActiveScale’s erasure-coded object store software now on our team, we are in a position to pursue new object solutions truly optimised for managing video and other unstructured data.” Erasure coding technology The ActiveScale product line adds object storage software and erasure coding technology to Quantum’s portfolio, enabling the company to expand its product offerings in the object storage market. Object storage has emerged as a potent response to the exponential growth of video and other forms of unstructured data. This content requires high-speed capture and processing (typically done with a file system like Quantum’s StorNext® solution), then is often retained for years or decades. Examples of this unstructured data include video and images for entertainment, surveillance and security, marketing and training, and more. Prior to this acquisition Quantum has successfully delivered and supported the ActiveScale object storage product line for over five years.
RFID technology is nowadays considered to be almost pervasive. Thanks to this technology, objects or even living things can be identified and localised without contact. In order to meet the increasing demand for RFID hardware components, GERA-IDENT has now significantly renewed and expanded its production. Ramin Hassan, Managing Director of GERA-IDENT GmbH stated that "Demand for the construction of customer-specific ID points and their basic components such as RFID readers and antennas has increased significantly", clarifying the reason behind the expansion of the production area. Development of identification products and systems Electronics research and development have been pushed forward throughout the market; GERA-IDENT is currently reinforcing the development of identification products and systems for customers, as well as cooperating with universities and R&D institutions. In order to be able to meet the increasing requirements, design competence has been enhanced with new software, whereas the electronics area has been expanded to include new manufacturing and testing possibilities. Additionally, internal prototype production has also been expanded. The assembly area is now upgraded and equipped with more space and technology. Furthermore, new employees have joined the GERA-IDENT team and new regional partners have been acquired for mold construction / sheet metal processing, painting as well as for electronic components. "Apart from the fact that we can operate our production completely and permanently in Germany, we are laying the foundation for our future in the IoT."
The shareholders of TE Connectivity (TE), a provider of connectivity and sensors, elected Lynn A. Dugle, former chief executive officer of Engility Holdings Inc., and Dawn C. Willoughby, former executive vice president and chief operating officer of The Clorox Company, to its board of directors during the 2020 Annual General Meeting on March 11. "We are very pleased to have Lynn and Dawn join as new directors to TE's board," said TE Connectivity Chairman Tom Lynch. "They are seasoned leaders that understand the increasing global challenges our customers face in highly competitive markets. Their excellent experience in a variety of marketing, operations, technology and strategy leadership roles make them valuable new members to our board." Technology consulting company Dugle was a director of The Analytic Sciences Corporation from October 2014 to February 2015 From 2016 to 2019, Dugle was chief executive officer and a director of Engility Holdings Inc., an engineering and technology consulting company listed on the New York Stock Exchange. She was appointed board president in June 2017, and then board chairman in February 2018. Dugle was a director of The Analytic Sciences Corporation from October 2014 to February 2015, prior to its acquisition by Engility Holdings Inc. Dugle joined Raytheon Company, a publicly traded company specialising in defence and other government markets throughout the world, in April 2004 and served as the vice president of Raytheon Company and president of Raytheon IIS until March 2015. She became president of the former Intelligence and Information Systems business in January 2009 and was previously its vice president and deputy general manager. Manufacturer and marketer of consumer products From 2002 to 2004, Dugle served as the vice president of the product, systems software division at ADC Telecommunications Inc. and as general manager of the cable systems division from 1999 to 2002. Dugle is currently on the board of directors at State Street Corporation, as well as KBR Inc. Willoughby was the executive vice president and chief operating officer of The Clorox Company She holds a Bachelor of Science in technical management and a Bachelor of Arts in Spanish from Purdue University, as well as an MBA from the University of Texas at Dallas. Willoughby was the executive vice president and chief operating officer of The Clorox Company, a manufacturer and marketer of consumer and professional products, from September 2014 through January 2019. Home care products She also served as the company's senior vice president and general manager, Clorox cleaning division; vice president and general manager, home care products; and vice president and general manager, Glad products, along with several other positions since she began there in 2001. Prior to her career at The Clorox Company, Willoughby spent nine years with The Procter & Gamble Company, where she held several positions in sales management. She is currently a director of J. M. Smucker Company. Willoughby obtained a Bachelor of Arts in sports management from the University of Minnesota and an MBA from the University of California, Los Angeles, Anderson School of Business.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Revader Security has supplied its Transit mobile CCTV cameras to Argoed Community Council in Flintshire, North Wales. The cameras are operated on a daily basis by the local police, primarily for the purposes of tackling antisocial behaviour and street crime. The Transit range of mobile cameras are ruggedised outdoor surveillance solutions which have been proven over many years to deter crime and secure the vital video evidence necessary for prosecution. Local police forces are actively using the fleet of mobile cameras in the Argoed and surrounding area to combat long-running issues of antisocial behaviour and criminality in the community. Mobile CCTV cameras combat crime Police are able to regularly reposition each camera around the locality to respond to the movement of crime hotspots, and only minimal planning is required prior to deployment, since the units can be installed in virtually any location within minutes. Rhodri Hampson-Jones, Clerk to the Council, said, “The mobile CCTV cameras supplied by Revader Security have proven to be highly effective. I would have no hesitation in recommending them to CCTV operators seeking to combat antisocial behaviour and criminality in the community.” Following successful results in the local area, Argoed Council placed repeat orders to increase their stock of mobile cameras. The council is fully supported by Revader Security’s technical team throughout the life cycle of the products.
Highways England is the government company charged with operating, maintaining and improving England’s motorways and major A roads. In total they manage over 4,300 miles of road, carrying a third of all traffic by mileage and two thirds of all heavy goods traffic. Traffic Officers have a responsibility to help the company keep major roads free-flowing, safe and serviceable. Their ability to communicate with other patrols and back to one of the seven control rooms, using the UK’s nationwide Airwave network, is therefore crucial to their operations across the country. IP68 environmental protection The organisation’s traffic officers have been long time Sepura users, and took the opportunity to upgrade to the new SC20 devices to take advantage of the loud, clear audio, essential in the noisy roadside environments that officers often work in. The rugged radio is well-equipped to deal with the challenges of daily operations; the SC20’s IP68 environmental protection ensures that the radio remains operational in wet, dirty or dusty conditions. Meanwhile the tough, large screen remains visible in all weather conditions, enabling the user to always be aware of critical messages or information being displayed. In total over 700 SC20 radios have been purchased to support operations. Product quality and customer service “It is a pleasure to further our working relationship with Highways England. As long time Sepura users, they are aware that the company prides itself on product quality and customer service. The SC20, with its rugged design and clear audio, coupled with its ability to run intelligent applications, will ensure that Highways England’s officers will be well protected and always in touch with their control centre.” Says Andy Gregory, Business Development Director for Sepura. “The SC20 had a number of features that will undoubtedly enhance the safety of our officers when on patrol or attending incidents. The loud, clear audio is a key factor, ensuring that even when large goods vehicles are passing close by, critical messages can still be heard. In addition to this the rugged design of the radio ensures that even in wet, dirty conditions, our staff will be able to rely on their radio to continue working for them.” Says Al Edwards, technology operations manager for Highways England.
Mines are unique operating environments with highly specific health and safety challenges. In particular, underground mining operations typically experience low-visibility conditions and light pollution from flashlights, vehicle lights and reflective strips on equipment and clothing, making traditional surveillance and safety monitoring difficult. These were some of the challenges facing Jiangzhuang Coal Mine in the Shangdong Province of China, which covers an underground area of 43 square kilometres, and produces more than 1.8 million tons of coal each year. The top priority for the mine’s management team is worker safety, and working practices and production are monitored 24 hours a day to minimise accident risks. Aging surveillance system Kong Qingwei, Director of the Jiangzhuang Coal Mine Dispatch Office, says, “We need to respond immediately to unsafe situations in the mine, whether they are caused by environmental factors, poorly performing machines, or employees not following authorised work procedures.” Its aging surveillance system made health and safety monitoring difficult in key areas of the mine Although the mine invests heavily in safety training and equipment for workers, its aging surveillance system made health and safety monitoring difficult in key areas of the mine. “Our previous surveillance system required us to monitor around 30 screens, 24 hours a day, often with sub-optimal image quality caused by low-light conditions or light pollution,” says Kong Qingwei. “This made our jobs extremely difficult and tiring, as well as impacting our ability to respond to safety issues quickly enough.” Maximising worker safety To address its health and safety challenges, Jiangzhuang Coal Mine has implemented an intelligent video surveillance and control system from Hikvision. The Hikvision solution supports crystal-clear video imaging, even in low-light conditions, or where light pollution is created by lights or reflective strips. This quality and clarity of imaging ensures that hidden risks can be identified more quickly and easily, allowing the safety team to respond more quickly and to protect workers in all areas of the mine. Improving worker health and safety In addition to the improved imaging capabilities, the Hikvision cameras incorporate deep learning technologies to identify and respond to health and safety risks in the mine automatically, and in real time. Specifically, the cameras can identify when employees deviate from approved work procedures and send alerts to the safety team to ensure staff can be deployed before accidents occur. The new Hikvision system increases worker safety by monitoring the areas around winches and other equipment" For example, it is prohibited for workers to come too close to winches when they are working due to safety risks, but this is hard to monitor with traditional video cameras. “The new Hikvision system increases worker safety by monitoring the areas around winches and other equipment, and by sending alerts if employees get too close,” says Kong Qingwei. Delivering continual improvement In the first three months of operation, the new Hikvision system identified more than 30 deviations from safe operating procedures. Zhang Liu, Deputy Chief Engineer at Jiangzhuang Coal Mine, says, “In the past, many of these safety risks could have gone unnoticed. However, the Hikvision system has allowed us to identify every incident in real time and to take immediate action to protect our workers, which is a hugely satisfying outcome for us.” As well as alerting the team to potential security risks in real time, the Hikvision system also records the details of any safety incident for later analysis. “As well as accurately capturing deviations from safe working procedures, the Hikvision system supports playback and download functions,” says Zhang Liu. “We can use the insights we record to deliver continual improvement for safety procedures, and, ultimately, to support our vision for a ‘zero-accident’ mine,” he adds. Addressing mining-specific safety requirements The Hikvision solution is configured to support specific mining-safety applications, such as constant monitoring of surface water levels in different areas of the mine. With the Hikvision system, we can manage surface-water levels constantly" “Constant seepage from rock formations means that surface water can accumulate in different areas of the mine, which is a problem in terms of potential flooding, damage to infrastructure, and worker safety risks,” says Zhang Liu. “With the Hikvision system, we can manage surface-water levels constantly and take action to deal with any problems that arise before water levels exceed safe limits,” he adds. Increasing effectiveness for the safety team In addition to surface water management, the Hikvision solution supports improved safety in other potentially dangerous areas of the mine, including inclined tunnels that are used for transporting coal and other materials underground. “The Hikvision system is like an intelligent 'eye' for us in all areas of the mine, helping us to identify potential safety issues in a timely and accurate way and to protect our workers at all times,” says Kong Qingwei. With automated alerts for all manner of potential safety threats, the safety team can be far more effective, with no need to monitor video images constantly. “Instead of looking at grainy images on 30 screens, we can now spend more of our time responding to incidents, supporting workers, and keeping them safe,” says Zhang Liu. “This is a classic example of how automation can help to improve mine safety, while also reducing the tiring workloads associated with manual monitoring of screens.”
Traka’s innovative key and equipment management solutions have been installed at a new national distribution centre for a top four UK supermarket. The new distribution centre, fulfils orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centres are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorised personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centres are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorised colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organisations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorised ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbour for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbour in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbour complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analysing people's behaviour. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilising outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilise BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project. Integrators should utilise BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic - often referred to as white-box solutions - are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and are built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support because they opt for short-term savings. White-box solutions are not the only option. Security Integrators should utilise BCDVideo’s IP video surveillance appliances, all of which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances come standard with a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties typically require that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. The KYHD warranty gives customers greater security, compliance enablement, and complete control over their data, which is particularly important given GDPR requirements. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-critical configurations Choose from a portfolio of products from entry-level to mission-critical, enterprise configurations, as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issues. With pre- and post-sales support, save time and resources by not having to call multiple manufacturers or call centers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime technical and global on-site support warranty, in addition to a guaranteed response.
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
Ruggedized products: Manufacturers & Suppliers
Automatic vehicle identification: State of the industry 2020Download
How analytics engines mitigate risk, ensure compliance and reduce costDownload
11 considerations for embedded system RFID readersDownload