Videx Security appoints James Rose, an experienced professional in the access control and door entry market, to National Projects Manager. In the newly created role, James is responsible for Videx’s large-scale access control and entry projects, predominately in the social and private residential sector. A key element of his role involves onsite leadership for the project team, taking ownership of the full project life cycle from initiation to completion. Developing strong relationships...
Strategic Security Solutions (S3), the provider of information security consulting services for identity and access management (IAM), governance, risk and compliance, and SAP Security, announces it has formed an advisory board to provide support and guidance for S3’s strategic growth initiatives. The initial members include two widely renowned cybersecurity industry experts, Peter Tran and Michael Brown, Rear Admiral, USN (Retired), who will apply their experience to help S3 identify new...
The Dutch Army has recently completed a two-day live-fire counter-drone trial using Smart Shooter's SMASH Fire Control System. The test took place in the Austrian High Mountains, as part of the Dutch Defence Department examination of different ways to combat small unmanned systems. Tested at a range of up to 200 metres, in harsh weather conditions, fog, and blowing snow, the SMASH Fire Control Systems proved to be highly effective as all 67 drone targets were successfully hit with up to 3 shots...
HID Global, a worldwide provider of trusted identity solutions, announced that it has acquired Technology Solutions (TSL) UK Ltd, a global provider of radio frequency identification (RFID) handheld readers. TSL designs develop and manufacture ruggedised mobile RFID readers and other multi-technology, mobile device peripherals used to identify and track products and assets. “The acquisition of TSL is a strategic fit for HID, which builds upon our leadership in identification technologies b...
ASSA ABLOY has acquired Technology Solutions (TSL) in the UK, a global provider of radio frequency identification (RFID) handheld readers. TSL designs, develops and manufactures ruggedised mobile RFID readers and other multi-technology, mobile device peripherals used to identify and track products and assets. "I am very pleased to welcome TSL into the ASSA ABLOY Group. TSL is a strategic technological addition to the ASSA ABLOY Group and reinforces our current RFID offering and provides complem...
Master Lock is celebrating 100 years in 2021, marking a century of empowering people, businesses, and communities across the globe with the confidence they need to secure everything worth protecting. To mark the occasion, Master Lock is launching a 360°-marketing campaign and previewing new user-led innovation that will continue to guide the company forward. Helping future generations “We are honoured that people have trusted Master Lock to secure what’s important since 1921,...
Dahua Technology, a video-centric smart IoT solution and service provider, released its core product launch at the 2021 kick off meeting. Interpreting its mission of Enabling a Safer Society and Smarter Living, the company launched: WizSense/WizMind series which focus on the AI value transmission; HDCVI 6.0 Plus that offers continued advancement in over-coax technology, and Full-colour 2.0 which provides excellent performance under extreme low light conditions, driving innovation to an AIoT future. Video surveillance market The recent technological development is driving the industry into an AIoT era. However, the real and feasible applications and the values that the applications can bring to end users are the key driving forces. As a product and solution provider, Dahua Technology not only launches the technologies, but also focuses on addressing and solving users’ pain points. AI and deep learning are being adopted in various end-use applications The global attention to AI is soaring. According to Marketsandmarkets, the global video surveillance market size is expected to grow from USD 45.5 billion in 2020 to USD 74.6 billion by 2025, at a CAGR of 10.4%. Developments related to technological advancements like AI and deep learning have increased the need for launching new and innovative products to tackle the security crisis at every level. AI and deep learning are being adopted in various end-use applications, providing opportunities for the video surveillance market. Intelligent target search To better classify and present its AI products and solutions, and accurately deliver the value of AI to its customers, Dahua Technology released the channel series WizSense and project series WizMind last year. In 2021, these two series will continue to evolve, demonstrating the innovation and strength that Dahua Technology has in the field of AI. Focusing on human and vehicle, the WizSense series is an ideal choice for small and medium-sized application scenarios such as villas, shops, warehouses, exclusion areas, and personal outdoor properties like fish ponds and orchards. With limited budgets, owners/managers of these properties often face the lack of important features such as human/vehicles recognition, intelligent target search, etc. in their security systems. Now with WizSense, these dilemmas are gone. Powerful intelligent functions WizSense provides accurate alarm for human and vehicle with an improved animals filtering rate Featuring SMD 3.0, AI coding and Active deterrence, the WizSense series products and solutions provide powerful intelligent functions, simple configuration and a wide range of products, making AI inclusive for everyone. Powered by upgraded Smart Motion Detection technology (SMD 3.0), WizSense provides accurate alarm for human and vehicle with an improved animals filtering rate, allowing users to focus on what really matters. It also offers cameras with warning light and siren, as well as real-time push notification on mobile phones to help users deter intruders and eliminate potential risks. Moreover, it also comes with Intelligent Target Search function that allows users to search targets by alarm trigger type, significantly improving target search efficiency and saving users’ time and labour costs. AI-Powered smart solutions Aiming at empowering verticals with AI technology, the WizMind series is, on the other hand, competitive in providing accurate, reliable and comprehensive AI-powered smart solutions to a variety of vertical industries, including safe city, rail transit, traffic management, judiciary, building, retail, energy, etc. With adequate budgets, projects from these industries can enjoy the convenience brought by advanced AI functionalities and high-level customisation. Powered by AI chipsets and deep learning algorithms, WizMind features many technical highlights, including video metadata, face recognition, privacy protection, wide area security, illegal parking, ANPR, thermal imaging, object monitoring, etc. Providing comprehensive human-oriented solutions, WizMind enables rapid and precise reaction on what matters. In addition, it also features a more precise and effective AI search function to locate targets, generating various human data for further business analysis. Deep learning algorithms HDCVI 6.0 Plus takes a step further by developing coaxial HD video surveillance system Boasting multiple vehicle-based AI solutions, it provides more attributes of vehicles for easy control, quick search and business analysis. What’s more, WizMind combines deep learning algorithms with thermal imaging technology to help users achieve ultra-long distance monitoring in harsh environments, non-contact temperature monitoring and early fire prevention. As a Dahua Technology’s well-known patented technology, HDCVI continues to evolve to protect customers’ investments. In 2021, with the continuous boost in the inclusiveness of AI XVR, as well as the optimisation and innovation of the front-end cameras, HDCVI 6.0 Plus takes a step further by developing coaxial HD video surveillance system that maintains its easy-to-use features, leading the Over-Coax AI Evolution. High definition image Featuring Real 5MP, Super Adapt and Enhanced AI, HDCVI 6.0 Plus series is recommended for small & medium sized scenarios like shops, warehouses, streets, etc. These scenarios have high requirements on high definition image and effective identification of targets, but often face budget constraints. Commercialised first by Dahua Technology, the Real 5MP camera provides 5MP high definition with 16:9 video output that features superior clarity and undistorted image quality. Super Adapt, another innovative technology that Dahua Technology proposed and realised first, enables camera to automatically recognise and adjust to various monitoring environments such as indoor, outdoor or intense lighting, providing preferable image performance. Enhanced AI functions offer accurate alarm for both human and vehicle as well as quick target search, changing post-query into pre-prevention to enhance security efficiency. Comprehensive product system Full-colour 2.0 features a comprehensive product system and AI applications that can serve a broader customer base As one of the company’s key focus, Full-colour this year will enter into a 2.0 era. Full-colour 2.0 features a comprehensive product system and AI applications that can serve a broader customer base. Based upon the technological strength of Dahua Technology, 4K and zoom technologies are newly introduced to Full-colour 2.0 to bring high performance. For customers who have adequate budget and requires high image quality, they will surely enjoy the quality experience brought by Full-colour 2.0. For customers who have limited budgets, Full-colour 2.0 also provides products with balance price and performance. Meanwhile, AI-powered functionalities like Active Deterrence, Perimeter Protection and AI Search are of vital importance in pre-event deterrence, during-event interference and after-event backtracking, reflecting the essence of the Full-colour slogan Colourful View Ever, Dark World Never. Smart integrated security solutions Dahua Full-colour 2.0 series can be deployed in scenarios with low-Iight condition such as streets, parks, villas, etc. as it guarantees coloured monitoring 24/7. By helping users obtain the coloured details of people and cars in dark environment, it improves retrieval efficiency and provides convenience for event evidence collection. The 2021 core product launch of Dahua Technology is the combined result of customer needs and technological development. Committed to its mission of ‘Enabling a Safer Society and Smarter Living,’ Dahua Technology will continue to adhere the core value of ‘customer-cantered’ and provide the market with smart integrated security solutions, systems, and services to create value for city operations, corporate management, and consumers.
Installers across the UK can further enhance their security installation capability, after Legrand unveiled its first ever smart video doorbell to join a suite of connected products from its User Interface business unit. Allowing end users to see visitors at their door from anywhere in the world, Legrand’s smart doorbell is compatible with Apple HomeKit, Amazon Alexa and Google Home. Part of Legrand’s popular Netatmo smart home devices range, the new doorbell offers long-term savings with no subscription or update costs, providing installers the option to integrate into their ever security-conscious customers’ homes. Delivering optimum quality Equipped with a full HD 1080p camera, the diagonal 140° wide-angle lens is able to show a head-to-toe image of visitors at the door and delivers optimum quality regardless of lighting levels. The camera’s HDR feature adapts to varying degrees of brightness, while built-in infrared ensures images are captured and movement detected in complete darkness. Notification settings are fully configurable to the requirements of the end user, and can be set to only notify users when movement is detected in certain areas with the alert-zones feature. Elegantly designed and fully weatherproof, the unit is easy to install, thanks to its compatibility with a wide range of electrical installations from 8-24 volts all the way up to 230 volts. Artificial intelligence algorithms The new doorbell also uses artificial intelligence algorithms to differentiate between a person and a harmless movement Once in situ, the installer can quickly connect the doorbell to the Netatmo Security app via a Wi-Fi network, allowing for control from anywhere in the world. For added security, data is encrypted and remains on the device, meaning no information is shared or kept by Netatmo on cloud storage. The new doorbell also uses artificial intelligence algorithms to differentiate between a person and a harmless movement. If an intruder is present, the user will receive a ‘Person detected’ notification on their smartphone and a video of the event is recorded. From there, the homeowner can use the loudspeaker from their device to call out to the intruder and deter them. Smart video doorbell Richard Hopkins, Lead Marketing Manager at Legrand UK & Ireland, said: “The nation is becoming ever more security conscious. Our new smart video doorbell will provide electrical installers with a fully compatible and easy to use option for their customers.” “Giving a possibility to be integrated into home scenes, the smart video doorbell is compatible with Apple HomeKit, allowing for functionality through the suite of connected apple products as well as full connectivity with the Netatmo range. The intelligent and customised notifications can be adapted to fit any user requirements and, with no hidden costs for subscription or updates to the product or dedicated app, it is solution for homeowners that delivers long-term savings.”
Security specialist Mul-T-Lock has launched the new MTLTM500 multi-patented mechanical platform, boasting next-level protection for both residential and commercial environments. The MTL™500 is ideal for medium to large sized business customers - due to its compatibility with various locking products, its advanced master key capabilities and its ability to provide a variety of keying options. The new platform is designed to replace its predecessor the MT5, but with Mul-T-Lock’s backward compatibility function, customers are able to secure their facilities with an up-to-date, high security solution, while the new master keys remain compatible with previous products. Unauthorised key duplication This means locksmiths can assure customers that they can gradually upgrade their existing systems, rather than needing to replace the whole system at once – saving them precious financial resources. Upon grant of patent, the MTL™500 is protected against unauthorised key duplication until 2039, and Mul-T-Lock customers will be supported with replacement or expansion products throughout and following the transition. With locksmiths in mind, the MTL™500 is quick and easy to pin and assemble, and allows locksmiths to utilise past investments such as the KC5 machine for key cutting and the original MT5 pinning kit. The MTL™500 patented system, paired with its unique magnetic card, grants the end user enhanced key copy control, since duplicate keys can only be cut on presentation of the key card and its direct use with the Mul-T-Lock KC5 key machine. Advanced security technology The cylinder provides a combination of protective elements to create a double locking mechanism Integrating advanced security technology with heightened key control, the cylinder provides a combination of protective elements to create a double locking mechanism. Platforms are keyed-alike and master keyable to ensure access permissions can be quickly changed and to allow access to multiple doors with a single key – all for added security and convenience. Anti-pick, anti-bump, anti-drill and fire resistant, the MTL™500 also offers a Break Secure cylinder variant, designed to snap off when attacked and leave the main portion of the cylinder fully intact and functioning. Ever-changing environments Claire Blakemore, Managing Director at Mul-T-Lock, comments: “As we venture into the next generation of Mul-T-Lock products, it’s important for us to carry on creating the platforms that both locksmiths and their customers can rely on.” “We know that homes and businesses can be ever-changing environments from time to time, with staff turnover, contractors needing short-term access, and different staff or tenants requiring access to only specific areas. The MTL™500 ensures complete convenience for these requirements, without compromising on security.”
Two new Wisenet cameras equipped with Hanwha Techwin’s ground-breaking Wisenet7 chipset have reinforced the company’s claim to be the manufacturer of multi-directional cameras. The 4-channel PNM-9022V utilises alpha blending technology to stitch the overlapping images captured by its four Full HD sensors into a seamless 8.3-megapixel 209° image, thus ensuring an operator never loses sight of a person or vehicle moving across a wide area. Digital PTZ functionality Superseding the highly successful Wisenet PNM-9020V, the PNM-9022V can also be used to capture 180° images, with operators able to take advantage of digital PTZ functionality across two of the camera’s channels. With Wisenet7 SoC, Hanwha Techwin’s most powerful chipset to date, at its heart, the PNM-9022V’s 4 sensors, which come with 2.8mm fixed focal lenses, are able to capture high definition colour images when the lighting level is as low as 0.03 Lux. Wisenet7 also features Hanwha Techwin proprietary ‘extreme’ Wide Dynamic Range (WDR) technology which, performing at up to 120dB, utilises new Local Contrast Enhancement and Scene Analysis technologies to enable the camera to capture ultra-clear images from scenes containing a challenging mix of bright and dark areas. Certificate issuing system Lens Distortion Correction (LDC) technology utilised by the PNM-9022V corrects the distortion created Lens Distortion Correction (LDC) technology utilised by the PNM-9022V corrects the distortion created through the use of wide-angle lenses. This delivers images which more closely resemble what is seen through the human eye. As part of the fast-growing number of new cameras which incorporate the UL CAP certificated Wisenet7 chipset, the National Defence Authorization Act (NDAA) compliant PNM-9022V is packed with an impressive list of technologies to protect it from cyber-attacks. It also benefits from a Hanwha Techwin proprietary device certificate issuing system, which embeds unique certificates into Wisenet7 products during both the development phase and manufacturing process. This further enhances the camera’s ability to prevent hackers from tampering with its firmware. Cable connection purposes 2 Micro SD/SDHC/SDXC slots enable up to 1TB of video or data to be stored at the edge should there be disruption to the network. Video of any incidents, which potentially might have been lost on the recorder side, can therefore be retrieved from the camera when the network connection has been restored. Minimising the time needed to be spent on site, the PNM-9022V has a hinged backplate to provide easy access for cable connection purposes. Installers have to simply install the back plate, clip the camera in place and tighten two screws. Intelligent video analytics Other key features include the following: A suite of built-in Intelligent Video Analytics (IVA), which includes audio detection, defocus detection, directional detection, enter/exit, appear/disappear, motion detection, virtual line and camera tampering detection. Heatmap video analytics which provides business intelligence on customer density and buying behaviour. Support for WiseStream II complementary compression technology, as well as H.265, H.264 and MJPEG compression formats. Bandwidth efficiency is improved by up to 75% compared to current H.264 technology, when WiseStream II is combined with H.265 compression. PoE+ which negates the need to install a power supply and separate cabling for the camera. IP66, IK10 and NEMA4X rated for protection against water, dust and mechanical impact. Cost-effective solution Coinciding with the launch of the PNM-9022V, the PNM-9322VQP with 4 sensors and an integral PTZ camera, is designed to provide a highly cost-effective solution for detecting and tracking objects over wide open areas. The option of exchangeable 2 and 5-megapixel lens modules enables the camera’s sensors to work together to seamlessly capture 360° images of up to 20-megapixel resolution. In addition, the device’s PTZ camera element can be configured to zoom in and track a moving object or move to a user defined preset position when the line crossing detection function of the multi-directional camera detects activity. It is also able to ‘hand-over’ to cameras covering adjacent areas to ensure operators can continue to observe people or vehicles as they move out of its field of view. Providing audio support The NDAA compliant PNM-9322VQP supersedes the highly successful PNM-9320VQP Equipped with the Wisenet7 chipset, the NDAA compliant PNM-9322VQP supersedes the highly successful PNM-9320VQP, with the additional benefit of providing audio support. “These two new models perfectly complement our other existing 2, 3, 4 and 5-channel multi-sensor cameras which collectively enable us to offer customers an affordable multi-directional camera solution for virtually any video surveillance project,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. Providing significant savings “All of these cameras will help users achieve a high return on investment (ROI) as they can perform the role of a greater number of standard HD cameras. In doing so, they provide significant savings on camera purchasing costs and with less cable, conduit, mounting hardware and network switches required, installation costs are reduced as well. With only a single IP connection, they also only require one VMS licence.” “The value of these two new cameras being NDAA compliant and UL CAP certificated should also not be underestimated. System integrators will quite often find that both can be a key requirement when they are submitting tenders for projects involving end-users which operate multi-nationally.”
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announces enhanced integrations and business offerings in its OneView management dashboard to streamline security business operations for Managed Service Provider (MSP) partners. The latest expansion brings management of server products into the cloud console and also integrates directly with ConnectWise Manage business management solution, making it easier for MSPs to streamline billing, service ticketing, and account management during a critical time of increased cybersecurity threats. Tailoring security solutions According to research from ConnectWise-owned Continuum, 83 percent of MSPs report a customer cyber-attack, while 74 percent report suffering at least one attack themselves. The same research found that “67 percent of MSPs do not feel fully confident in their ability to defend their clients against a cyber attack.” 67 percent of MSPs do not feel fully confident in their ability to defend their clients against a cyber attack" “Security is an increasing concern for MSPs, particularly as their clients have become more targeted by cybercriminals in the wake of the COVID-19 pandemic,” said Mike LaPeters, vice president of worldwide MSP at Malwarebytes. “By expanding OneView integrations and product capabilities, we are helping MSPs by both providing tailored security solutions for their clientele and also easing the burden of management and billing.” Eliminating manual tasks Malwarebytes’ OneView integration with ConnectWise Manage boosts MSP team productivity by eliminating manual tasks and providing up-to-date customer data capabilities to increase efficiency of billing and licencing management. Automated ticket creation from Malwarebytes security scans give MSP teams full awareness of threats to their customer with direct visibility into endpoints while informing on critical status and information to keep customers more secure. Malwarebytes’ software agent provides MSP staff with a deep understanding of endpoint status and configuration by exchanging important details like OS version, IP address, installation date, and more with the ConnectWise Manage tool, enabling teams to make more informed decisions on securing their customer endpoints. Endpoint security products MSP partners can now also integrate Malwarebytes endpoint security products for servers into the OneView console for streamlined management: Advanced capabilities include Suspicious Activity Monitoring, Granular Server Isolation, and Ransomware Rollback Simplify server protection, detection and response: Malwarebytes Endpoint Detection and Response for Servers provides a complete solution that includes support packages to custom fit a business’ security needs. Advanced capabilities include Suspicious Activity Monitoring, Granular Server Isolation, and Ransomware Rollback, which return impacted servers to health – without costly reimaging or lost productivity. It is fast, lightweight, and purpose-built to protect an organisation’s most valuable data. Available for Windows machines, Malwarebytes Endpoint Detection and Response for Servers is laser focused on keeping critical server infrastructure online and operational. Proactive malware protection Proactively protect and remediate Windows and Linux servers: Malwarebytes Endpoint Protection for Servers provides endpoint security that combines fast speeds with exceptional protection to offer simple and efficient solutions to organisations of all sizes. The product provides proactive malware protection and remediation for server infrastructure, driven from a single cloud console, providing visibility into all activity across an organisation – from servers to workstations. Available for Windows and Linux servers, Malwarebytes Endpoint Protection for Servers combines ease-of-use with predefined security configurations and default server policies.
Interface Security Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, announced the completion of a $60 million equity financing transaction led by its current sponsors SunTx Capital Partners and Prudential Capital Partners. The additional equity capital will help facilitate the company’s growth strategy and strengthen its capabilities, featuring highly differentiated managed services. Overall customer experience This new capital comes in the wake of a highly productive 2020 where Interface has: Made significant investments in innovation, product development, and new technology infrastructure Scaled operations and expanded service offering to a broader range of verticals Launched new services and strategic partnerships Achieved a 250% YoY growth in new customer acquisitions Further enhanced the overall customer experience Increasing security threats This new capital will catalyse the growth phase that Interface is already in" Michael Shaw, CEO of Interface Security Systems, said, “We see a major digital transformation taking place within numerous distributed enterprise business models seeking to adapt to changing consumer behaviour and increasing security threats. Interface is a leading provider of innovative business security solutions, remote managed video monitoring, and networking infrastructure that provides distributed enterprises with next-generation store technology and 24/7 system management to keep pace with these trends. This capital infusion will enable us to continue to stay ahead of the technology curve and further solidify our position as a key technology partner for consumer-facing businesses.” Ned Fleming, Founding Partner of SunTx Capital Partners, said, “This new capital will catalyse the growth phase that Interface is already in. We believe the company is strongly positioned to help businesses integrate the management of their security, managed networks, and business intelligence, particularly as we emerge from the global health crisis.” Supply chain management Robert Derrick, Managing Director and Partner with Prudential Capital Partners, said, “Interface is well-positioned to support consumer-facing distributed enterprises as they transform their business models. We are happy to be a part of this new round of investment to help fuel their evolution and growth.” “As the economy emerges from the pandemic, we will see many new business models develop to support remote working, curbside delivery and smarter supply chain management that will require innovative networking, enhanced security, and business analytics solutions,” comments John Mack of Imperial Capital, an advisor to Interface. “This growth capital positions Interface to take advantage of opportunities in areas where they have a demonstrated track record of success.”
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, and promoting universal open standards that enable all objects to connect and interact. Shifting the smart home market Their IoT effort took off when Amazon, Apple, Google and the Zigbee Alliance announced an industry working group in December 2019 to take the ‘best of market’ technologies from smart home standards, portfolios and ecosystems and to develop a ‘super spec’ that will be open, inclusive and a significant industry shift in the smart home market. Zigbee Alliance has been for a while now working on openness and interoperability" “Zigbee Alliance has been for a while now working on openness and interoperability, which has led us to the Project Connected Home over IP (CHIP), which is looking to unify the environment, under one technology, one certification program and one logo,” says Chris LaPré, Zigbee Alliance’s IoT Solutions Architect. “It really does fuel IoT possibilities, whether in security or any other sectors.” Project CHIP is a royalty-free connectivity standard that unifies brands and ecosystems into a single smart home automation system that operates any other technology based on Internet Protocol (IP). Simplifying product development The intent is to simplify product development for device manufacturers, broaden consumer choice, and to ensure easy discoverability, deployment and engagement to fuel connected living. “We have noticed that, as the IoT has evolved, there is a stronger need for unity, which is why we are developing Project Connected Home over IP,” says Jon Harros, Zigbee Alliance’s Director of Certification and Testing Programs. “It fits with the Zigbee Alliance’s goal to unify systems, and to focus on everyone using the same application at the top. It unifies that environment, whether you are integrating your system with Amazon Echo devices or connecting to Google Home.” Participating in development of Project CHIP are 125 companies of various types from around the world working together with more than 1,100 of their experts serving across sub-committees to formulate specifications and fine-tune the project. Home system technologies The original Zigbee protocol is used for many applications around the world, including smart homes Although the technology is being developed for the home market, the specifications have been formulated with an eye toward expanding into the commercial market in the future. Development of open, interoperable systems provides greater freedom for consumers to choose among the many technology choices on the market, without being tied to a single brand or ecosystem. Zigbee Alliance certifications and memberships span the globe, with roughly a third in Europe, a third in North America and a third in Asia. Involvement in Europe is slightly higher than the other regions. Alliance members represent manufacturing sites all over the world. Project CHIP is a newer initiative of the Zigbee Alliance, which previously developed Zigbee Pro to enable home system technologies to operate using IEEE 802.15.4 wireless signals on the 2.4GHz radio band over a self-healing true mesh network. The original Zigbee protocol is used for many applications around the world, including smart homes. Certification transfer programme Among the strengths of the Zigbee Alliance are years of experience certifying products, which includes testing them and confirming that they comply with the promoted specifications and functionality. The specifications are open standards that are developed in cooperation with all the companies that are Zigbee Alliance members. Another route is the certification transfer programme, in which a company chooses a certified white-label product, becomes a member of the Alliance, and then rebrands the product while retaining the certification. “It helps them get products on the market quickly while they build their own knowledge base,” says Harros. “All our work is focused on standardising the behaviour and functionality of products and making sure everyone is following the same standard to get interoperability,” says Harros. “Members all contribute to the standards.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
For the jewellery business owner, ensuring the highest level of security has always been a top priority. VIVOTEK, the IP surveillance provider, has built up a rigorous surveillance system for Peyrelongue Chronos, a well-known luxury boutique offering high-end jewellery in Mexico, to monitor their precious products without any blind spots and to prevent robbery or theft. Peyrelongue Chronos has recently remodelled its facilities, including an overall of the video surveillance system. In search of the best solution to meet demands for both outside and inside the store, Peyrelongue Chronos found all of its requirements met by the wide range of VIVOTEK cameras. Harsh outdoor environment The 180-degree multi-sensor MS8391-EV was mounted on the facade of the boutique to maximize the field of view with 12-megapixel high-quality images and reduce the number of cameras required, thus cutting down installation costs. The camera is also ideal for the outdoors because of the robust housing that resists rain, dust and protects it from vandalism or tampering. The 180-degree multi-sensor MS8391-EV was mounted on the facade of the boutique To enhance the outdoor security of the building, two FD9360-H cameras were added to monitor the avenue in both directions and provide clear night views despite the harsh outdoor environment. Inside the Peyrelongue Chronos store, two of MS9390-HV, the most efficient panoramic network camera, were installed in the jewellery area to surveil all displays as well as all movements within them. Receiving alarm notification With its unique and stylish dual-sensor design, the MS9390-HV offers a 180-degree field of view and range of up to 20 metres, and is capable of maintaining a higher field of view (FOV) than traditional multi-sensor panoramic cameras using four sensors. Within the spacious and comfortable luxury watch area, two 12-megapixel fisheye cameras, the FE8191 and FE9191 were chosen to monitor the product showcases, delivering blind-spot-free 360-degree surround imaging of wide areas. Further enhancing performance, the FE9191 features AI-powered Video Content Analyses - Smart 360 VCA, including intrusion detection, crowd detection, and loitering detection, which enables the security staff to receive alarm notification for any notable event. Finally, for the shared area, such as aisles, entrances, and exits, the ability to capture high-quality images both in low light and high-contrast environments is a critical issue when selecting surveillance cameras. Providing quality service The most remarkable thing when working with VIVOTEK is technical support" The 5-megapixel and 2-megapixel dome cameras, FD9189-HM and FD8166A-N, were chosen precisely for this reason. The FD9189-HM is equipped with 30 metres range IR illuminators for enhanced night vision, and the FD8166A-N is armed with invisible 940nm IR illuminators and capable to see up to 6 metres in total darkness, making it a sure bet to meet all the surveillance requirements in transit zones within this renowned boutique. “Thanks to VIVOTEK’s high-level security system, we are confident that we can guarantee our clients the best experience from the moment they walk in. Peyrelongue Chronos feels secure with VIVOTEK’s surveillance solution while servicing clients,” pointed out Ana Lucía García, Marketing and PR Manager of Peyrelongue Chronos. “The most remarkable thing when working with VIVOTEK is technical support. They assisted me both pre-sale and post-sale to provide quality service to our customers. No matter what types of security issue my clients may have, I know I can solve it with VIVOTEK’s technology,” remarked Serafin Sanchez, Automatisation Server Manager and Integrator Certified by VIVOTEK.
A frequent target for terrorism, airports faces considerable challenges in securing the flow of traffic. Concerns over security can ground flights, grinding operations to a halt. Whether one needs to inspect all vehicles entering the airport grounds or just those entering higher-security areas like the apron and the container space, there is no room for long waits during inspections. Passengers are counting on their flights leaving on time, and security delays could lead to flight delays. However, one can’t afford to compromise the security standards either. Propane gas cylinders While security is usually heavy in the terminal buildings themselves, in some international and local airports, there are not enough measures in place in the external road and parking areas leading to the departure and arrival zones. The attack resulted in ‘only’ five people injured and heavy damage to the terminal building For example, on June 30, 2007, a Jeep Cherokee laden with propane gas cylinders and gasoline cans was driven at a high speed into the doors of the Glasgow Airport departure area on one of the busiest days of the year. The attack resulted in ‘only’ five people injured and heavy damage to the terminal building. Incidents like this one really emphasised the need for an automatic and efficient method for inspecting vehicles entering the different areas in and around the airport. Heavy traffic control The airport apron, flight line or ramp is the area of an airport where aircraft are parked, unloaded or loaded, refilled, or boarded. In most airports, the security regulations in this area are heavy, and only authorised, trained personnel are allowed to drive in and out while withholding heavy traffic control rules. One can only imagine the danger of terrorists or other hostile people entering in an authorised vehicle. There needs to be a method to make sure these types of people cannot use fake licence plates if the recurring vehicle list does get into the wrong hands. While clearly the number of civilian passengers who use airports has risen dramatically as time has gone by, the risks associated with airports and airline travel have also increased. Identifying vehicle passengers The device is available in both a mobile and a stationary, fixed version and works in extreme conditions The threat of bombs or cargo-related explosives is significant, but security measures have not necessarily risen at the same rate as threats and number of flights and passengers. The financial and physical risks of illicit and dangerous materials entering sensitive areas in and around an airport are clear, and a new generation of screening is required to tackle these challenges. UVeye scans, analyses, and records all passing vehicles, ensuring security while also keeping flights on schedule. Helios by UVeye is the perfect option to protect both the access roads and parking facilities around the airport and important areas like the apron. Helios improves security while keeping security personnel safe. The device is available in both a mobile and a stationary, fixed version and works in extreme conditions. Their technology can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19. High-resolution cameras Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras. It alerts security personnel about any irregularities or foreign objects hidden in the undercarriage, whether its weapons intended to be used in a terrorist attack, improvised explosive devices, or illegal cargo to be loaded onto a plane in the apron of the airport. Inspecting the undercarriages of vehicles is very difficult for security personnel and is sometimes neglected due to the number of vehicles entering an airport. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspected the undercarriage, they probably didn’t know what to look for. Reducing inspection times UVeye is here to solve this problem by providing drive-through solutions in selected access points UVeye has built its products as drive-through solutions that reduce inspection times to as little as a few seconds, supporting a quick flow of vehicles entering or leaving the premises. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images on a tablet or computer screen, checking for anything suspicious or unusual in the undercarriage, automatically marked by the system. Many airports do not have enough staff or the capacity to inspect every vehicle entering or leaving secure areas. UVeye is here to solve this problem by providing drive-through solutions in selected access points, alerting security personnel of any irregularities or potential threats attached to a vehicle. Helios is the only product on the market able to detect issues in the undercarriage of a vehicle passing through the system for the first time. Fingerprint ID feature The apron of the airport is the most sensitive area of the facility, and with UVeye’s technology and unique fingerprint ID feature, every vehicle entering or exiting the apron will be marked using artificial intelligence and receive a unique ID that will be saved in the database. This way, security personnel will not need to rely on licence plates alone when inspecting vehicles on the authorised vehicle list. If someone attempts to enter using a fraudulent licence plate, the system will recognise that it is not the same vehicle, and the attempted trespassers will be stopped in their tracks. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles like trucks and buses. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain. Airport access roads UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers entering the external airport access roads, which can help identify visitors with potential fevers, improving the safety of everyone in and around the airport. Airports around the world can enhance their security efforts with automatic vehicle inspection systems Integrating to the centralised server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralised management system enables the client to access the different systems deployed and manage the different users and historical data. Airports around the world can enhance their security efforts with automatic vehicle inspection systems, providing an extended layer of safety in and around the airport. Access control systems Uveye took into consideration heavy traffic entering the access and parking areas of an airport when it built its drive-through scanner, Helios, which can quickly find any threat attached to or hidden in the undercarriage without slowing down vehicle traffic. Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal or dangerous items from entering the apron of the airport and potentially accessing the airplanes about to take flight. Integrating Helios with other security and access control systems can provide a multi-layer approach that will tighten the entry and exit points to any sensitive site while keeping personnel and data safe. UVeye is ideal for airports and also can be implemented at border crossings, seaports, military bases, embassies, data centres, and other secure perimeters.
FLIR PT Series cameras were used in a surveillance project to detect and monitor illegal fishing and poaching activities along the Spanish Galician coast. The FLIR thermal imaging cameras combined with maritime video analytics from Gradiant were ideal for spotting illegal vessels on a 24/7 basis and at a long range. The vastness of the Galician coastline and the multitude of fishing and farming activities call for a more automated surveillance approach. Fishing, shellfish harvesting, and marine aquaculture - mainly mussel farming in inshore waters are important economic activities in Galicia (northwest of Spain). Local public authorities strictly control these activities to prevent exploitation, fish stock depletion and resulting economical losses. They are fighting a constant battle against this unfair and illegal competition that affects thousands of professionals who make a living from the fishing and seafood industry. Challenges of coastal monitoring Illegal fishing and poaching has an enormous impact on the environment and food safety Illegal fishing and poaching of seafood resources also has an enormous impact on the environment and food safety; especially during periods of toxic algal bloom (red tides), when fishing conditions are hazardous for public health. The detection of unauthorised fishing and shellfish harvesting is of paramount importance for the Galician authorities. However, monitoring and protecting all of Galicia’s inshore and offshore fisheries, shellfish harvesting areas, and marine aquaculture farms is a challenging task. Galicia has 1,200 km of coastline. Its protection involves the surveillance of activity in 122 ports, including around 5,000 fishing boats, 400 beaches dedicated to shellfish harvesting, and 47 mussel aquaculture farms, with a total of more than 3,000 bateas (floating mussel farms). Long-range thermal imaging Moreover, most illegal activity takes place at night, making it extra difficult for law enforcers to detect any type of vessel. The Galician climate does not help either. With an average of 128 days per year of rain, visibility conditions are usually not ideal for surveillance operations. Manned surveillance patrols can only do so much; they are hindered by the climate and visibility conditions, making it impossible (from a practical and financial standpoint) for coast guards to cover the entire Galician coastline. In 2017, the Galician Coast Guard started a project to test video surveillance of the coastline based on thermal imaging cameras. The pilot included the use of FLIR’s PT Series multi-sensor camera, combined with maritime video analytics software from Gradiant (Pontevedra, Spain). Multi-sensor installation FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications The multi-sensor installation was extensively tested on two different locations along the Galician coast. One set-up was used to monitor illegal vessels on coastal waters at short/medium range, while another set-up was used for long-range monitoring. The PT Series thermal cameras allowed the Galician Coast Guard to monitor the required area over a long range on a 24/7 basis, even at night and in adverse weather conditions. In addition, the FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications. This software is specifically adapted for monitoring coastal environments and allowed the coast guard to detect, track and geo-localise people and vessels, including small wooden and plastic boats. Visible-light camera The software enabled the thermal cameras to detect objects and people despite adverse maritime conditions, such as high waves, low contrast due to low light, fog and rain, reflections on the sea surface, camera vibrations, and the presence of distractors, such as birds and vessel wakes. The FLIR PT Series is a high-performance multi-sensor pan/tilt security camera, incorporating an uncooled thermal camera with sensitivity of <35mK and a visible-light camera with 36x optical zoom. While the thermal camera is used to detect threats over a long range based on their heat signatures, the visible-light camera can be used for verification and identification. Long-range surveillance The requirements for this long-range application were extremely challenging for any thermal camera" “FLIR is the reference for long-range surveillance applications with thermal imaging,” says José Antonio Rodríguez, Head of Video Analytics at Gradiant. “The thermal performance of the camera and the fact that this technology is easy to set up makes it ideal for this type of application. In addition, FLIR supported us from the start for lens selection, calibration of the system and much more.” “The requirements for this long-range application were extremely challenging for any thermal camera,” says Nikitas Koutsourais, Product Marketing Manager at FLIR Systems. “Thanks to the FLIR PT Series’ unique thermal sensitivity of less than 35mK, we could provide the best image performance in the market.” IP video streaming Two different configurations were used in this application. The long-range surveillance station used a FLIR PT-606 camera, and was able to detect a rubber inflatable boat at 4,000m. Despite its narrow field of view, this camera allowed for wide coverage thanks to the high-precision pan/tilt unit. The camera was able to sweep a wide field of view span in a pre-programmed sequence of pan/tilt presets. The port surveillance station used a PT-625, offering a good compromise between detection range and field of view with a single pan/tilt preset. The integration of the video analytics software with the camera was easy thanks to IP video streaming and the camera’s ONVIF compliant interfaces for pan/tilt control. Long-range surveillance typically requires the use of lenses with a narrow field of view, which is a problem when you want to monitor wide areas. Coastal protection applications The FLIR thermal cameras provided the Galician coastguard with increased situational awareness However, the video analytics from Gradiant was able to take advantage of the Preset Sequencing mode of the FLIR PT Series. This allowed the coastguard to cover a wide field of view with a single camera and to perform video analysis on each pan/tilt preset. The FLIR thermal cameras provided the Galician coastguard with increased situational awareness and allowed them to respond much quicker to illegal fishing activities. The pilot project was performed in a realistic surveillance environment along the Galician coast and generated very positive results. The combination of a multi-sensor system with Gradiant’s maritime video analytics proved to be effective to deal with the intricate Galician coast lines and a lack of open view. In addition, this technology combination is a cost-effective alternative, making automated surveillance applications accessible for fish farm companies worldwide. Extremely rugged systems Finally, the PT-Series are extremely rugged systems, which makes them ideal for coastal surveillance, especially in an extremely humid environment such as the Atlantic coast of Spain. The system’s vital core is well protected against dust and water ingress, and complies with IP66 requirements.
Revader Security has supplied its Transit mobile CCTV cameras to Argoed Community Council in Flintshire, North Wales. The cameras are operated on a daily basis by the local police, primarily for the purposes of tackling antisocial behaviour and street crime. The Transit range of mobile cameras are ruggedised outdoor surveillance solutions which have been proven over many years to deter crime and secure the vital video evidence necessary for prosecution. Local police forces are actively using the fleet of mobile cameras in the Argoed and surrounding area to combat long-running issues of antisocial behaviour and criminality in the community. Mobile CCTV cameras combat crime Police are able to regularly reposition each camera around the locality to respond to the movement of crime hotspots, and only minimal planning is required prior to deployment, since the units can be installed in virtually any location within minutes. Rhodri Hampson-Jones, Clerk to the Council, said, “The mobile CCTV cameras supplied by Revader Security have proven to be highly effective. I would have no hesitation in recommending them to CCTV operators seeking to combat antisocial behaviour and criminality in the community.” Following successful results in the local area, Argoed Council placed repeat orders to increase their stock of mobile cameras. The council is fully supported by Revader Security’s technical team throughout the life cycle of the products.
Highways England is the government company charged with operating, maintaining and improving England’s motorways and major A roads. In total they manage over 4,300 miles of road, carrying a third of all traffic by mileage and two thirds of all heavy goods traffic. Traffic Officers have a responsibility to help the company keep major roads free-flowing, safe and serviceable. Their ability to communicate with other patrols and back to one of the seven control rooms, using the UK’s nationwide Airwave network, is therefore crucial to their operations across the country. IP68 environmental protection The organisation’s traffic officers have been long time Sepura users, and took the opportunity to upgrade to the new SC20 devices to take advantage of the loud, clear audio, essential in the noisy roadside environments that officers often work in. The rugged radio is well-equipped to deal with the challenges of daily operations; the SC20’s IP68 environmental protection ensures that the radio remains operational in wet, dirty or dusty conditions. Meanwhile the tough, large screen remains visible in all weather conditions, enabling the user to always be aware of critical messages or information being displayed. In total over 700 SC20 radios have been purchased to support operations. Product quality and customer service “It is a pleasure to further our working relationship with Highways England. As long time Sepura users, they are aware that the company prides itself on product quality and customer service. The SC20, with its rugged design and clear audio, coupled with its ability to run intelligent applications, will ensure that Highways England’s officers will be well protected and always in touch with their control centre.” Says Andy Gregory, Business Development Director for Sepura. “The SC20 had a number of features that will undoubtedly enhance the safety of our officers when on patrol or attending incidents. The loud, clear audio is a key factor, ensuring that even when large goods vehicles are passing close by, critical messages can still be heard. In addition to this the rugged design of the radio ensures that even in wet, dirty conditions, our staff will be able to rely on their radio to continue working for them.” Says Al Edwards, technology operations manager for Highways England.
Mines are unique operating environments with highly specific health and safety challenges. In particular, underground mining operations typically experience low-visibility conditions and light pollution from flashlights, vehicle lights and reflective strips on equipment and clothing, making traditional surveillance and safety monitoring difficult. These were some of the challenges facing Jiangzhuang Coal Mine in the Shangdong Province of China, which covers an underground area of 43 square kilometres, and produces more than 1.8 million tons of coal each year. The top priority for the mine’s management team is worker safety, and working practices and production are monitored 24 hours a day to minimise accident risks. Aging surveillance system Kong Qingwei, Director of the Jiangzhuang Coal Mine Dispatch Office, says, “We need to respond immediately to unsafe situations in the mine, whether they are caused by environmental factors, poorly performing machines, or employees not following authorised work procedures.” Its aging surveillance system made health and safety monitoring difficult in key areas of the mine Although the mine invests heavily in safety training and equipment for workers, its aging surveillance system made health and safety monitoring difficult in key areas of the mine. “Our previous surveillance system required us to monitor around 30 screens, 24 hours a day, often with sub-optimal image quality caused by low-light conditions or light pollution,” says Kong Qingwei. “This made our jobs extremely difficult and tiring, as well as impacting our ability to respond to safety issues quickly enough.” Maximising worker safety To address its health and safety challenges, Jiangzhuang Coal Mine has implemented an intelligent video surveillance and control system from Hikvision. The Hikvision solution supports crystal-clear video imaging, even in low-light conditions, or where light pollution is created by lights or reflective strips. This quality and clarity of imaging ensures that hidden risks can be identified more quickly and easily, allowing the safety team to respond more quickly and to protect workers in all areas of the mine. Improving worker health and safety In addition to the improved imaging capabilities, the Hikvision cameras incorporate deep learning technologies to identify and respond to health and safety risks in the mine automatically, and in real time. Specifically, the cameras can identify when employees deviate from approved work procedures and send alerts to the safety team to ensure staff can be deployed before accidents occur. The new Hikvision system increases worker safety by monitoring the areas around winches and other equipment" For example, it is prohibited for workers to come too close to winches when they are working due to safety risks, but this is hard to monitor with traditional video cameras. “The new Hikvision system increases worker safety by monitoring the areas around winches and other equipment, and by sending alerts if employees get too close,” says Kong Qingwei. Delivering continual improvement In the first three months of operation, the new Hikvision system identified more than 30 deviations from safe operating procedures. Zhang Liu, Deputy Chief Engineer at Jiangzhuang Coal Mine, says, “In the past, many of these safety risks could have gone unnoticed. However, the Hikvision system has allowed us to identify every incident in real time and to take immediate action to protect our workers, which is a hugely satisfying outcome for us.” As well as alerting the team to potential security risks in real time, the Hikvision system also records the details of any safety incident for later analysis. “As well as accurately capturing deviations from safe working procedures, the Hikvision system supports playback and download functions,” says Zhang Liu. “We can use the insights we record to deliver continual improvement for safety procedures, and, ultimately, to support our vision for a ‘zero-accident’ mine,” he adds. Addressing mining-specific safety requirements The Hikvision solution is configured to support specific mining-safety applications, such as constant monitoring of surface water levels in different areas of the mine. With the Hikvision system, we can manage surface-water levels constantly" “Constant seepage from rock formations means that surface water can accumulate in different areas of the mine, which is a problem in terms of potential flooding, damage to infrastructure, and worker safety risks,” says Zhang Liu. “With the Hikvision system, we can manage surface-water levels constantly and take action to deal with any problems that arise before water levels exceed safe limits,” he adds. Increasing effectiveness for the safety team In addition to surface water management, the Hikvision solution supports improved safety in other potentially dangerous areas of the mine, including inclined tunnels that are used for transporting coal and other materials underground. “The Hikvision system is like an intelligent 'eye' for us in all areas of the mine, helping us to identify potential safety issues in a timely and accurate way and to protect our workers at all times,” says Kong Qingwei. With automated alerts for all manner of potential safety threats, the safety team can be far more effective, with no need to monitor video images constantly. “Instead of looking at grainy images on 30 screens, we can now spend more of our time responding to incidents, supporting workers, and keeping them safe,” says Zhang Liu. “This is a classic example of how automation can help to improve mine safety, while also reducing the tiring workloads associated with manual monitoring of screens.”
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
Ruggedized products: Manufacturers & Suppliers
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download