ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin Inte...
At ISC West, in booth # 26061, Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence will unveil a new version of Security Center, the company’s open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. With customisable live dashboards, enhanced privacy protection features, a brand-new map-driven mobile app, and new functionalities that help...
The new IndigoVision Nedap AEOS Integration allows events from Nedap AEOS systems to be seamlessly combined with IndigoVision’s security management solution, Control Center, giving complete video and alarm management in a single user interface. All of IndigoVision’s integrations are designed with the user’s security in mind and the Nedap AEOS Integration is no different. Since 1980, Nedap has been a pioneer in the design and manufacture of electronic access control systems. Wi...
FIREX International, alongside the co-located IFSEC International, Safety & Health Expo and Facilities Show, has announced that the Protection & Management series of events will be moving to a new dateline of 19-21 May for the 2020 edition at ExCeL, London. FIREX International 2019 dates unchanged Gerry Dunphy, Exhibition Director, FIREX, explains: “Major business decisions are made at FIREX every year, and the event has been in huge growth in its home in London, as we anti...
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and othe...
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-co...
Videx, an expert in door entry and access control, has expanded its GSM range, introducing a new device compatible with its flagship VX2200 system, both 2 wire audio and 6 wire video versions, that enables audio calls to be made from any of the VX2200 entrances to a mobile phone or land line. Strengthening Videx’s presence in the GSM entry market, the 2270 is a 2G/3G device which is suitable for new and existing systems within residential apartments. It has the ability to call up to 180 apartments with the facility to release the door after verifying the caller. Additional security Neil Thomas, National Sales Manager at Videx, said: “The 2270 offers residents the facility to answer calls from their VX2200 system even when they’re not at home, offering additional security to their property. The device diverts a call directly to the resident’s mobile or alternative land line, so that they’re always aware of who is visiting, even when they’re away.” A caller can ring the 2270 and if their number is stored in the dial to open list it will activate one or more of the relays" “A key feature is the facility to connect multiple entrances (up to 15) using only a single SIM card. Also featured within the device is a dial to open facility for up to 3,000 telephone numbers with 3 relay output. A caller can ring the 2270 and if their number is stored in the dial to open list it will activate one or more of the relays.” Designing out crime Further features include three auxiliary inputs which are fully programmable for a number of functions such as sending text messages and activating relays for different functions. The three relay outputs are also programmable for a number of functions such as remote relays for Secured by Design requirements, the official UK Police flagship initiative combining the principles of 'designing out crime' with physical security. Neil added: “Alarms triggered by an apartment can also be handled by the 2270, either by sending an SMS to a number or by activating a relay. What’s more, an event log, that can store up to 8,000 events, is maintained within the GSM module and can be integrated via the USB port and the PC software which includes many features to simplify the installation and programming process. Programming can be carried out using either text messages or with a PC using the USB connection or RS485 link.”
Asset protection specialist VPS Security Services, warns that the ongoing Brexit saga is likely to lead to a rise in vacant properties, both commercial and residential, as property developers and investors are even more reluctant to move forward with their UK real estate strategies. Despite a serious housing shortage, there remain over 200,000 homes in the UK that have been empty for 6 months or longer, and as commercial rentals slow down, especially in the retail sector, there is a growing movement to ‘repurpose' commercial properties into housing, even temporarily. Wintry weather forecast "Empty properties of any type can be a significant cost to the owners, local authorities and to the environment." explains Phil Bunting, a director of VPS Security. "They attract vandalism, metal thieves, arsonists and squatters far more than occupied premises. And owners have a legal duty of care for empty properties even to the extent of maintaining their safety for unauthorised trespassers." Illegal fly tipping occurs every 40 seconds, and grounds such as a car park surrounding an empty office block, are prime targets Across the country dozens of fires are deliberately started every day in or next to vacant premises. Illegal fly tipping occurs every 40 seconds, and grounds such as a car park surrounding an empty office block, are prime targets. With more severe wintry weather forecast, storm damage from snow and ice are also likely to take their toll far more on an empty building. Several security options "The longer an empty property is left unattended, unprotected and neglected, the greater the risk of further devastating dilapidation, compounding the cost and timing of eventual remediation. The sooner it is secured against unwanted visitors and the elements, the sooner it will be re-let or sold to provide a home again." Mr Bunting says. Vacant properties can be protected in a number of ways, with several security options, all of which can be combined in a flexible mix that provides a best fit solution for each site. The most basic solution is setting up a secure perimeter fence, and installing steel screens or hoardings on all main entry points, such as windows and doors. Concrete blocks can be used to prevent access to car parking or external grounds. High-profile locations The environmental impact of steel screens can be lightened by using specialist decals that imitate the look of the original windows and doors. Alarms placed in and around buildings can trigger alerts if there is an attempted breach to the premises. CCTV Towers can provide many more ‘eyes' to protect a site 24/7 at a fraction of the cost of human guards Human guards may be needed for certain high-profile locations, but they are an expensive option, and the range of technological alternatives are fast moving into and taking over this more traditional guarding option. CCTV Towers can provide many more ‘eyes' to protect a site 24/7 at a fraction of the cost of human guards. Operators at remote video response centres, can speak direct to the trespassers, which often is an effective deterrent, if the sensors are triggered and a video feed shows intruders. Installing property guardians Away from the technological and traditional methods of protecting vacant properties, a relatively new trend is to provide security through occupation, by installing property guardians into temporarily empty buildings. This method not only provides low-cost accommodation, but can help significantly reduce the costs of neglect or vandalism, as well as cutting business rates for the property owners. VPS Security Services are part of the VPS Group that specialise in protecting people, property and assets, by securing, maintaining and managing properties across a wide range of customer and industry sectors. Core building services cover the vacant, unoccupied and void property lifecycle from an initial risk assessment, to security, including guarding, monitoring, clearing, maintenance and also ‘security through occupation', via their VPS property guardians service.
Vorpal Ltd., developer of advanced, highly accurate geolocation solutions, releases a whitepaper in response to the growing global crisis facing airport operations and aviation security from commercial drones flying within controlled airspace. In order to guide effective and timely response efforts to such incursions, this document presents thoughtful analysis of the best technological solutions available for delivering complete drone situational awareness. Operational deployment Vorpal’s proven expertise in this area has resulted in operational deployment of its drone situational awareness solution, VigilAir, by discerning customers globally, and is aimed at the aviation, military, homeland security, critical infrastructures, corrections and UAS traffic management (UTM) markets. This free whitepaper examines the challenges related to drone detection, geolocation and tracking This free whitepaper examines the challenges related to drone detection, geolocation and tracking, for which radar and optical systems have proven insufficient. Instead, it identifies the requisite for a technology capable of identifying and analysing drone-related RF transmissions and waveforms in order to generate a holistic drone aerial situational awareness picture. Provide valuable assistance This includes real-time knowledge of both drone and drone operator location over extremely wide areas of coverage. It also discusses why widespread accessibility of this information to airport security – via mobile devices and web-enabled computers and workstations – is critical to ensuring immediate threat analysis and response initiation. All this must be delivered with near-zero false alarms and with high clarity and precision, without interfering with airport and aviation systems and while complying with relevant regulations. Dr. Nir Raz, Vorpal’s CEO, explains, “Drones are increasingly putting aircraft and passengers at risk, and airport security teams, worldwide, are scrambling to catch up with this security paradigm shift. We hope our whitepaper helps security professionals to clarify the many issues they should be considering when evaluating technology solutions, and demonstrates how Vorpal is uniquely positioned to provide valuable assistance.”
nuPSYS—a pioneer in Internet of Things (IoT) solutions for physical security, infrastructure, and networks—is pleased to announce its 3D-Advanced Mapping integrated with the Milestone-Canon Video Management System as a plug-&-play 3D-plugin, which was shown live at Intersec 2019. nuSIM is a visual 3D-mapping solution that allows assets, cameras, sensors, alarms, partitions, and critical points to be accurately plotted onto a 3D mapping surface. This integration will enable operators to graphically view multilayer live video overlays within the Milestone-Canon VMS user interface. Key features include: 3D advanced mapping Integrated 3D view 3D representation of assets, cameras, sensors, & access control Generates a real-perspective view for operators – enhances efficiency manifold Interactive and dynamic operations Pragmatic 3D virtual presence Customisation dashboard per use case Dashboard provides simultaneous 3D view, streaming view and sensor view CONTEXT AWARE: immersed in the 3D physical environment SCALE: Single light pole (or single smart infrastructure) to a full smart city-scape SPEED: Real-time KPI IMPROVEMENTS: Enhanced efficiencies compared to maps and icons overlay nuPSYS' 3D-Advanced Mapping functionality provides system operators with a unique experience for viewing video and managing devices within the Milestone-Canon Video Management System. Operators can navigate to see cameras and sensors using a 3D model of the facility and grounds, providing a unique simple-to-deploy 3D-plugin for Milestone-Canon VMS.
Maxxess Systems continues to drive the virtualisation of the physical security industry with the development and implementation of the industry’s most advanced enterprise level situational awareness and response coordination solutions. Enhancing Maxxess Systems’ momentum is the recent introduction of Maxxess InSite Awareness and Response Coordination System which meshes ‘system intelligence’ and ‘human intelligence’ to deliver an entirely new category of physical security and communications solution on a unified, easy to operate platform. Maxxess InSite joins the company’s highly touted eFusion Security Management Software and Ambit Communications Software, which are presently installed in thousands of facilities around the globe by many of the world’s leading brands. Developing sophisticated software solutions The solutions aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination"“Over the last decade, our focus has been on developing highly intuitive, integrated solutions for high-profile clients,” said Nancy Islas, President of Maxxess Systems, Inc. “This has allowed us to develop highly sophisticated software solutions based on the needs of high-profile users around the world. The resulting solutions we’ve developed aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination.” High-profile users of Maxxess Systems’ solutions include: the Alshaya Group, an international franchise operator with over 90 globally recognised brands; CAE, the pioneer in training for the aviation, defence, security and healthcare industries; Meraas, a developer of residential and commercial space in Dubai; Banco Central de Reserva del Peru, which mints and issues metal and paper money in Peru. Coppel, one of the largest retailers of clothing and household goods across Mexico; Regus, one of the world’s largest providers of flexible workspace; UDR, a real estate investment trust company in the US; the highly prestigious London School of Economics, and more than 50 companies in the renowned Emirates Group, among many others. Core software platforms Maxxess InSite combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-timeThe Maxxess Systems portfolio is built on the following core software platforms: Maxxess InSite Awareness and Response Coordination System combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-time – all of which is queued, organised and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organisations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality. Over 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly-customised solution and unparalleled efficiency. eFusion provides video and access system management and control capabilities along with alarm monitoringeFusion Security Management Software is a ‘system intelligence’ solution that integrates and correlates data from surveillance, access control and various other physical security related inputs onto a comprehensive monitoring and reporting dashboard. eFusion provides video and access system management and control capabilities along with alarm monitoring, access credentials tracking/authorisation/de-authorisation remotely, door status and more. eFusion can be deployed as a stand-alone control platform, or as a core component of Maxxess InSite. Ambit Communications Software is a ‘human intelligence’ solution that provides security managers communication and location knowledge for remote personnel through their personal devices for alerts, notifications, status assessment and access management. Ambit can be deployed as a stand-alone communications platform, or as a core component of Maxxess InSite. “The recent release of Maxxess InSite is the result of many years of software development and is based on the proven performance of our security and communications solutions,” continued Ms. Islas. “With the introduction of InSite, Maxxess Systems is bringing a completely new and unparalleled security and communications enterprise solution to the security marketplace.”
Security expert Abloy UK is excited to announce the launch of the intelligent motor locks - the EL495 and EL595. These innovative and compliant high quality motor locks have been developed to make facilities and sites more safe and secure. The locks automatically diagnose the condition of its capacitors, so when the lock reaches the end of its lifecycle it gives an audible warning allowing the lock to be replaced before it fails. This feature will allow the smoother running of facilities management and provide peace of mind knowing that the lock is operating to specification. Exceptional environments Both solutions are compliant to British Standards - EL495 is BS EN179 and BS EN1125 approved, and the EL595 is BS EN179 approved. There are three variants of the EL495 and EL595 available, including a Fail Unlocked (FU) model, Fail Locked model (FL) and high security lock case with mechanical exit feature. In normal operation the inside handle does not operate the lock, access control is required on both sides of the door to allow entrance or exit The Fail Unlocked (FU) model is designed for high security two-way Access Control doors. In normal operation the inside handle does not operate the lock, access control is required on both sides of the door to allow entrance or exit. The inside handle is electrically controlled, on activation of a fire alarm or other input the handle becomes operational. The deadlocking latch remains locked and the door secure. The Fail Locked model (FL) is for exceptional environments and in normal operation the inside handle does not operate the lock, access control is required on both sides of the door to allow entrance or exit. Improve operational efficiencies The inside handle is electrically controlled allowing the handle to be operational when required, on activation of a fire alarm or other input the handle will not allow egress. The latch remains locked and the door secure. The high security lock case features a mechanical exit feature, and in normal operation the lock is used with access control from outside and the handle on the inside always operational. There is no electronic handle control or diagnostics feature; the EL495 is for profile doors and EL595 is for solid doors. Pat Jefferies, Commercial Director of Abloy UK said: “Abloy’s commitment to quality includes proactive and efficient product development to ensure a streamlined portfolio that meets the needs of our customers. The launch of the EL495 and EL595 demonstrates our commitment to improve operational efficiencies for our customers, and these intelligent motor locks not only ensure high security but also make facilities management easier.”
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
As the world continues to become more connected, it’s becoming increasingly important to adjust security and safety procedures in the workplace. But today’s ever-evolving office environment can present unique safety and preparedness challenges. No two businesses are exactly alike, with some located in numerous buildings or spread out across campuses, while others have employees that frequently journey from different locations, work remotely or travel internationally. With this shifting environment, Rave Mobile Safety’s recent Workplace Safety and Preparedness survey asked over 500 full-time employees in various industries across the United States about their views on safety at work and emergency preparedness. Preferred safety measures Only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situationsThe survey looked at how employees and companies respond to various workplace emergencies: workplace violence, active shooter, medical emergency, fire, hazmat incidents, weather events and cyberattacks/system outages. Respondents provided insight on the current state of safety in their workplace, as well as how they want to be contacted when an emergency occurs. Though opinions on the preferred safety measures differed between generations and also between on-site and offsite workers, one fact remains consistent: there is much to be done to instil a better sense of safety in the workplace. While the findings show that employees feel safe in their workplace, only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situations. Quick thinking Of the plans currently in place, excluding fire, 57 percent of the other major emergency plans were rarely or never tested. With so few drills in place, employees are left not knowing the best ways to respond to emergencies like weather events or hazmat incidents or if their employer recommends a certain response to situations like medical emergencies. Testing these plans is essential so that all employees, whether they are new to the company or not Even if plans are in place to begin with, not ensuring your employees understand and are comfortable with how to react to certain situations, can put the organisation in harm’s way. Testing these plans is essential so that all employees, whether they are new to the company or not, have the appropriate response top of mind and their actions become second nature during a situation that will likely require quick thinking. Workplace violence Instilling regular practices will only further ensure that responses will happen seamlessly, regardless of the emergency. Beyond the general awareness of drills and practices, most surprising in the responses was the fact that 34 percent of female respondents were unaware of workplace violence emergency plans. This is particularly shocking because workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour Statistics. This shows an obvious lack of preparedness from organisations. It’s immensely important that employees to understand the relevant dangers of the workplace, especially when alternative could have a fatal result. The differences between baby boomers and millennials in the workplace is a common barometer showing how the workplace is continuing to change. Emergency plans Workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour StatisticsWhat may have worked for previous generations must be reworked and adjusted so every generation is made aware of and understands the plans and procedures in place. These changes can help make workplace safety plans fresh and continuously relevant. With that in mind, millennials currently represent the largest segment of employees unaware of emergency plans for major workplace emergencies. 38 percent of this age group are unaware of existing emergency plans, compared to just a 28 percent average of employees over the age of 35. This could be associated with the fact that some organisations are not communicating plans with newer employees or even that organisations that employ a significant number of millennials might not have plans in place at all. Affecting everyday work If the newest generation is unaware of these plans, then it is only a matter of time before Generation Z enters the workforce and is in even worse position when it comes to emergency awareness. The survey results showed that on average, workplaces use two methods of communication for emergencies Feeling safe and secure at work should not be something that workers need to focus on, however more than a quarter of respondents that work remotely said that worrying about safety is exactly what is affecting their everyday work. With that in mind, it’s even more concerning to see that there seems to be a clear divide between current methods and preferred methods of communication during an emergency. The survey results showed that on average, workplaces use two methods of communication for emergencies, with the top two being intercom system announcement/building alarm (27 percent) and email (22 percent). Mass text messages At first, these methods seem to cover both remote and in-office employees, but survey results actually showed that both groups preferred and would be better reached during other methods. While email is the second most common emergency method currently in place by organisations, it actually ranks as the fourth most preferred method at a mere 11 percent. Even with a clear preference towards communication via mass text messages by respondents (39 percent of remote workers prefer this method), less than 20 percent of companies actually take advantage of this technology. This clear disconnect shows that organisations must find what works best for their employees instead of using methods that were previously established or that are just currently being used. Preparedness plans What remains important for organisations, regardless of size or industry, is to keep emergency preparedness plans ever evolving Communication can not only be essential to alert employees to everyday situations, like office closures, but it is also imperative in preventing emergencies to escalate when they do occur. Although this survey discusses the current state of safety in the workplace, it’s that the disconnect between employee perceptions and employer polices that’s the most concerning. Companies need to take steps to understand how their employees would like to be reached during an emergency, as well as how employees would also like to reach out to management to report their own concerns. What remains important for organisations, regardless of size or industry, is to keep emergency preparedness plans ever evolving and well communicated, so your employees are confident in the emergency plans in place. By proactively planning and practicing for emergency events through table top exercises and drills, employers can demonstrate their commitment to employee safety and preparedness and build employee confidence.
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
A few friends from the security industry will gather this April to see, hear and touch the latest technologies to make the world a safer place. Actually, more than a few: there will be more than 30,000 security professionals gathering at the Sands Expo in Las Vegas April 11-13 for the International Security Conference and Exposition, usually known as ISC West. Many of the attendees will be returning to what has become a yearly ritual. The site, the players, the pace and even atmosphere of ISC West are as familiar to many as a family reunion. But the industry is changing, and those changes will be reflected in big ways at ISC West. Let’s consider a few themes we will be hearing about at the show. The cybersecurity of physical security systems Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry: How can an industry promote security unless its own products and systems can operate securely? For a long time, no one talked about cybersecurity. Some attending ISC West may wonder if now we are talking about it too much, at the risk of too much talk and not enough action. Almost every contribution to our “review and forecast” articles for 2018 mentioned cybersecurity. Every industry event I have attended so far this year has put cybersecurity front and centre. It will certainly be a major topic at ISC West.Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry Here’s the challenge for attendees to ISC West: If every manufacturer talks earnestly about cybersecurity, how can potential customers tell who is really serious about the topic, and who is merely paying lip service to the latest industry buzzword? If we all agree that cybersecurity is “everyone’s problem” – not just manufacturers, but also integrators and users – does no one really take responsibility? As the industry becomes more educated about cybersecurity, we can expect more detailed and challenging questions on the subject to permeate the ISC West show floor. Some manufacturers have likened cybersecurity more broadly to the issue of trust. Do you trust a manufacturer to address cybersecurity issues? Or do you trust them in general? The cybersecurity discussions will begin even before the show floor opens, on Tuesday, April 10, in a session titled “Cybersecurity Tier Zero: A Guide to the First Steps of Cyber Hardening.” – just one of the many other education sessions on Tuesday. The emergence of video analytics 2.0 Deep learning and artificial intelligence (AI) have become more familiar to the physical security market, and some AI applications are driving new industry trends such as robotics and analysing Big Data. But the biggest potential impact of deep learning is in the field of video analytics, a decades-old technology that has perpetually overpromised and underdelivered. The video analytics systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest The new wave of video analytics products claims to provide a higher level of accuracy because they operate more like the human brain. These new systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest. But consider the bottom line: Do the new video analytics products really perform and eliminate excessive false alarms? Can they effectively search large amounts of stored video and find the few frames that can make the difference in an investigation? Months have lapsed since the first deep learning products were announced - or, at least, “teased”. It’s been sufficient time for manufacturers to develop products that are ready for market, but are they? ISC West attendees will be scouring the booths for the latest developments and asking tough questions about how well these newfangled systems will actually perform.It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business The changing smart home market We all want Siri to set our thermostat or Cortana to arm the alarm system. We want to view video from our nanny-cams on our smart phones, and to turn on the lights from anywhere around the world. It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business that is the bread-and-butter of many security companies? Bluetooth and Wi-Fi can make a lot of things happen in the smart home environment, but what about other networking standards such as ZigBee and Z-Wave? The stakes are huge, which is why the big tech companies – from Apple to Amazon to Google – are staking their claims in the home automation market. Just this year, Amazon has purchased Ring, a video doorbell and security camera company – which will also be exhibiting at ISC West. But it’s unclear what such moves in Silicon Valley will mean for traditional security companies. The growth of do-it-yourself (DIY) systems introduces even more variables, as do alarm companies with new business models and even cloud-based approaches. Many exhibitors at ISC West – from ADT to Z-Wave – are addressing the new smart home environment and can help those attending the show do the same. About 40 companies are exhibiting in the “Connected Home” arena. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theatre for attendees Drones, robotics and education From robots to drones to counter-drone solutions, there other new technologies being displayed at ISC West. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theatre for attendees offering sessions on topics such as “Drones – Friends or Foes to the Security Industry?” There is a level of novelty to these technologies, and attendees might be lured by the entertainment value of a subject that may fall outside their job description. But one education session addresses the nuts and bolts in the real world: “Selling the Value of Security Robots by Setting Realistic Expectations.” Could these new gadgets play a bigger role than we think in the future of the security market? For all its familiarity, there is always something new for attendees at ISC West. It may be a startup company with an intriguing value proposition tucked into a tiny booth at the back of the hall. Or it could be a big surprise news announcement from a major player. For attendees, the best surprise of all is that valuable piece of information they can take home to make their business better. Here’s hoping you find it!
Open architecture in physical access control is built around Mercury Security’s access control panels, the de facto standard embraced by more than two dozen access control original equipment manufacturers (OEMs). Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments related to the Mercury platform. MercTech4 highlighted a new generation of access control products, which are increasing the capabilities for Mercury OEMs in areas such as two-way communication and encryption. Enhancements include use of the OSDP (Open Supervised Device Protocol) v2 communication standard instead of the older (and less flexible, less secure) Wiegand standard. Other advantages are relay count activations, a crypto memory chip and default encryption, a critical feature ensuring greater cybersecurity. Integration of hardware with physical security Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system. Mercury also provides hardware integration at the controller level with elevator manufacturers such as Otis, Kone and Thyssenkrupp, including “destination dispatch,” which groups passengers going to the same floors into the same elevators, thus reducing waiting and travel times. Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system Integration of Mercury controllers with LifeSafety Power’s IP-based intelligent power supplies enables system health and diagnostic data to be shared for preventive maintenance. Mercury also offers several “bridge” products to enable its OEMs to transition installed proprietary systems from outdated Casi-Rusco (GE), Software House I (Tyco) and Infographics (GE) technologies to an open platform using Mercury hardware. Business as usual Other recent news for Mercury is the company’s acquisition by HID Global last fall. Mercury Security President Matt Barnette says the acquisition will not impact how Mercury goes to market. “It’s business as usual,” he says. “It’s 130 days into the acquisition, so it’s still early on, but we are continuing to do what we do.” Steve Carney, HID Global’s vice president of product marketing for physical access control, provided an update from the HID Global perspective to MercTech4 attendees. He reiterated that there would be no change in Mercury’s OEM go-to-market strategy. HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud He emphasised that Mercury’s team and talent remain core to the brand, and HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud. Open architecture companies throughout the access control industry – Mercury’s OEM partners – are incorporating the new boards into their products, each putting their “spin” on those capabilities and expanding the functionality of their systems. At MercTech4, seven of those OEMs hosted small groups of consultants in focused meetings to highlight what’s new with their products. Lenel honoured as 'Platinum Premier' partner Lenel, Rochester, N.Y., has been a Mercury's OEM partner since 1995. Lenel is Mercury’s first-ever "Platinum Premier" partner. In recent years, Lenel’s OnGuard system has evolved into a fully browser-based system providing both alarm and cardholder management through web browsers, and access to the platform on a computer, laptop or tablet. OnGuard WATCH (Web Access Trending and Comprehensive Health) provides system monitoring tools and health checks, such as tracking CPU usage and logging error files. Lenel has introduced its own BlueDiamond mobile credentialing system based on Bluetooth Low Energy and deploying mature technology previously used by sister UTC companies for real estate locks and in the hospitality market. Feenics, an Ottawa, Ontario, cloud-based access control company, was also among the Mercury OEMs participating in MercTech4. The Keep by Feenics platform is scalable from a single door to a global enterprise environment. A RESTful API provides easy connection of third-party applications. Feenics emphasises cybersecurity in the cloud, using Amazon Web Services, Transport Layer Security (TLS) encryption, and Veracode penetration testing. They use MongoDB open source database replica sets instead of Microsoft SQL. Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments Integration and encryption RS2 Technologies, Munster, Indiana, is another Mercury OEM highlighted at MercTech4. Their top vertical markets are K-12 schools, utilities, healthcare and government. RS2’s features include a PSIA-compliant interface, compatibility with BACnet and the Pinwheel DME (Data Management Engine) for bi-directional database integration.RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer. Product enhancement is a focus of RS2’s engineering. Open Options, Addison, Texas, is a Mercury Platinum Elite partner whose customer base spans every vertical, and whose feature set reflects customer feedback. Open Options offers Mercury hardware mounted inside a sleek plastic enclosure, among other form factors. The company emphasises an open business culture and dedication to customer service. Customer support is a direct phone line to speak with a live person every time to get any issue resolved. Open Options’ DNA Fusion Version 7 platform includes new features such as an updated user experience. DNA Fusion interfaces seamlessly with security technologies — including video, biometrics, wireless locks, and more. Last year, Open Options marked 20 years of partnership with Mercury Security. Engineering for the masses Avigilon, Vancouver, B.C., is embracing new Mercury products in its completely browser-based Linux platform that can scale from entry-level to enterprise systems. The ACM (Access Control Manager) software is engineered for IT professionals and is updated every 60 days. For Avigilon, access control is a component of a broader approach that uses analytics and self-learning to manage massive amounts of data and provide the information an operator needs. The Linux-based system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance The system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance. Genetec, Montreal, Canada, emphasises the value of its “unified” approach that combines video, access control and automatic license plate recognitions into a single platform – designed from the ground up – that incorporates communications, intrusion detection and analytics. Cybersecurity failures prominent in the news often occur because of negligence – the customer had not implemented a software patch, for example. Genetec helps to manage such concerns. When cameras are deployed in the Genetec platform, the system provides an alert if a new camera firmware version is needed. The Genetec Update Service (GUS) notifies customers of any needed software updates. Prominence of cybersecurity Honeywell’s Win-Pak access control software is integrated with the Pro-Watch security management suite. Cybersecurity is a corporate priority for Honeywell, whose products follow the SDLC (systems development life cycle) process with security requirements based on the ANSI/ISA 62443-3-3 standard. Microsoft's Threat Modelling tool identifies entry and exit points of systems that an attacker could exploit, providing the development team an attacker's viewpoint. The secure product development process includes static code analysis, secure code review, code signing, binary scanning and component inventory. Products are thoroughly tested by the Product Security Assurance Team and at times by an Advance Independent Testing Team. If vulnerabilities are identified after release, they are handled by the Product Security Incident Response Team. Cybersecurity issues dominated a consultant roundtable event on the second day of MercTech4. There was plenty of spirited discussion and some valuable insights among the 40 or so participating consultants. More to come on that in another article in the next couple of weeks.
Cybersecurity is a growing concern for manufacturers of life safety and security products, and Underwriters Laboratories (UL) wants to help solve the problem. Specifically, UL seeks to work with manufacturers to up their game on cybersecurity and to certify compliance to a minimum level of cybersecurity “hygiene.” UL cybersecurity certification UL is a familiar brand in consumer goods and in the security and life safety markets. UL certification is sought by manufacturers in a range of product lines, from electrical goods and smoke alarms to access control and central monitoring stations. Approximately 22 billion UL marks appeared on products in 2016. In the physical security industry alone, products are certified to around 20 different standards covering access control, intrusion detection, locks, safes and vaults, software and other categories. Now UL is working to increase the prominence of their brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers General Requirements for Software Cybersecurity for Network-Connectable Products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/Life Safety & Security industry, was published in September 2017. Testing for cybersecurity weaknesses The UL 2900 standard encompasses three main areas related to cybersecurity – software weaknesses, known vulnerabilities and risk control such as encryption, access control, passwords, remote communications, and software patches and updates. UL conducts structured penetration, fuzz testing and other tests to establish a reasonable level of confidence that a product or system has addressed cybersecurity concerns. “Certification to the standard means that a product or system has been evaluated to a minimum level of cyber hygiene,” says Neil Lakomiak, Director of Business Development and Innovation, Building and Life Safety Technologies, for UL LLC. “It covers the ‘blocking and tackling’ that you would expect manufacturers to do. It doesn’t provide absolute assurance, but rather a level of confidence that a product has been vetted.” The certification is good for one year, and changes in products require recertification. UL has written more than 1,600 standards defining safety, security, quality and sustainability Lakomiak says applying the standard will: “create an environment where companies are starting to incorporate cybersecurity into their development processes; creating security by design. It will elevate the industry to consider cybersecurity earlier in the development process.” An overall goal of UL is to “give people peace of mind around the products and systems they use.” Underwriters Laboratories at ASIS 2017 Companies that achieve certification can promote it as a point of differentiation in the market, although not a guarantee that a product is cybersecure. UL’s independent evaluations carry weight in the market, as reflected by the ubiquity of the UL brand, and Lakomiak contends the industry can benefit from applying the same level of testing and certification to the area of cybersecurity. He sees UL’s cybersecurity initiative as complementary to other cybersecurity measures, such as “white hat” hacking. From a standards perspective, UL’s efforts seek to complement industry efforts such as SIA, ASIS International, PSA and ONVIF. Lakomiak was at the ASIS 2017 show in Dallas, where he met with existing manufacturer customers and potential future clients – including large and small companies in the industry – to discuss cybersecurity and the road to certification. He says many manufacturers are not yet ready for certification, in which case UL provides consultancy and advisory services to help them get there. “A lot of companies just need help understanding what their current processes and cybersecurity posture are,” says Lakomiak. “They want help to create a roadmap to get certification. A variety of manufacturers are on the path to certification.” Underwriters Laboratories security mission The cybersecurity element is an extension of UL’s mission to help companies demonstrate safety, confirm compliance, deliver quality and performance, and build excellence. Lakomiak says many people mistakenly perceive UL as a quasi-governmental organisation, perhaps because UL standards are sometimes incorporated into regulations. However, the organisation is a business and wants to operate like one by serving the needs of its manufacturer customers. “We want to have the service we provide be market-driven. We understand the pain points of manufacturers, integrators and others as they interface with technology. We want to devise programmes to help them be successful in the market. Our focus is to make our customers succeed by providing objective certification.” To the extent that cybersecurity is a growing pain point for the physical security industry, there is a large potential role to be played by UL and many others.
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilising thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-storey blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 thermal cameras The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms. The cameras detect minute increases in temperature, triggering an alarm in YHN’s central enquiry centre before any fire has had a chance to take hold, meaning within seconds of a possible fire starting the alarm is raised with the fire service. The camera continually monitors the temperature in the room, with information relayed back to the fire service, enabling them to better prepare for responding to the fire. David Langhorne, YHN’s Assets and Development Director, said: “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-storey blocks under a microscope, but we have been trialling new measures in our multi-storey properties for some time. Faster fire detection “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere. The early detection system provided by the camera has many benefits, but, most importantly, the faster response time from the fire service means the potential impact on residents and their properties is minimised and they and their homes are far safer as a result.” “This trial system is one of many fire safety measures currently in place in the blocks we manage across the city, where we also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers, and bin room sprinklers.” Reducing false fire alarms Alan Robson, Assistant Chief Officer at Tyne and Wear Fire and Rescue Service said “It’s great that YHN is innovating in this way. Using technology to support the monitoring of storage areas such as this helps improve the information we receive about incidents. This technology can reduce false alarm calls and improve our response to confirmed fires.” The standard CCTV lens provides a live feed for further verification of events OpenView Security Solutions is the UK’S largest privately-owned independent security company and a leading national supplier of fire, electrical and mechanical services to the public and private housing sectors. Thermal imaging The Mobotix M16 Thermal camera’s lens is triggered when an unexpected heat pattern occurs and automatically sends an alert to the central control room. Images from the thermal lens are automatically presented to operators enabling the exact location of hotspots, such as smouldering fires, to be pinpointed. The standard CCTV lens provides a live feed for further verification of events. YHN’s existing infrastructure, which uses Openview installed equipment in the blocks to link alarms through to its enquiry centre via Jontek, meant the new approach could be easily implemented without any disruption to residents. Innovative fire protection solutions Andy Ward, Sales Director of OpenView Security Solutions, added “This innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimise the incidence of false alarms. It now forms part of our expanding portfolio of fire and life safety solutions, one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sector.” Commenting on the partnership with YHN and OpenView, Frank Graham, Mobotix Regional Sales Manager, said: “We are very happy to be working so closely with both YHN and Openview in the development and provision of an innovative solution for such a serious issue. Mobotix cameras have inbuilt intelligence to meet all the requirements of integrator and end users alike and we look forward to a longstanding and fruitful partnership with both organisations moving forward.”
Jumbo Ten Brink Food introduced the face server into their store environment in March 2017 after discovering that almost 80% of shoplifting took place via large shopping bags. Since then, Jumbo has installed 80 Panasonic cameras in-store, helping them to win the award. Previously recognised by the National Institute of Standards Technology (NIST) as the most accurate on the market, Panasonic’s face server uses deep learning technology which maximises the performance of the core engine to achieve accurate and reliable recognition. The technology identifies faces that are ordinarily difficult to recognise with conventional techniques, such as those taken from an angle of up to 45 degrees to the left or right or 30 degrees up or down. It also maintains a 90% accuracy rate when detecting faces that are partially hidden by sunglasses or face masks. With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old Enhanced security protection If people are caught stealing, their image remains on the database. The face server provides a real-time processing capacity of up to 20 cameras per server and can execute high-speed searches of up to 30,000 registered reference faces. With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old. “The moment that a known shoplifter attempts to re-enter the store, an internal alarm is triggered, and we can take the best suitable action,” explains Edwin ten Brink, founder of Jumbo Ten Brink Food stores. “Thanks to the Panasonic face matching server, Jumbo has been proclaimed the safest store in the Netherlands." Karen Sangha, Panasonic’s Security Solutions Regional Marketing Manager says, “We are pleased to see that our customers are winning awards as a result of implementing our technology. We firmly believe that our face server is industry-leading and Jumbo Ten Brink Food’s success is testament to that.”
MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches. NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches. Tracking objects in real time NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements. NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyse and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats. Enhanced awareness picture The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control. Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorised access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling access areas within hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single access card system Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the centre of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-down system Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional licence feature. Streamlined parking processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilising another Gallagher licence feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Control and instrumentation specialist, CMR Philippines, has won undisclosed contract to supply and install advanced building management, CCTV and fire detection and alarm systems at one of the South East Asia’s pharmaceutical manufacturers. The work, undertaken at Unilab Pharmaceuticals’ new oral medicines and capsules Delta Amherst plant production plant in Laguna, Binan, sees the design and installation by CMR of facility-wide Siemens Apogee BMS, Siemens Cerberus FDAS and Hikvision CCTV systems. Comprehensive package The advanced computer-based BMS system will be used to control and monitor the 22,000 sq. ft plant’s mechanical and electrical installations and equipment such as ventilation, lighting and power systems. CMR is also providing engineering and testing services as part of a comprehensive package of technical support CMR is also providing engineering and testing services as part of a comprehensive package of technical support, which covers the installation, programming and commissioning of advanced CCTV and FDAS capabilities. The systems will provide improved safety and security for Unilab employees working at Laguna as the manufacturer looks to expand its capabilities through new investment in state-of-the-art manufacturing and production facilities. Critical operational requirements Unilab produces a wide range of prescription and consumer health products covering all major therapeutic segments. Many of these products are sector brands across the Philippines, Indonesia, Thailand, Malaysia, Singapore, Hong Kong, Vietnam, and Myanmar. Rojel Rivera, general manager at CMR PH, said: “We are a valued and trusted supplier to Unilab and other regional manufacturers, providing cost effective and precision engineered system-based solutions.” “We are building a strong reputation as a first-class supplier to customers such as Unilab, who are looking for technologies to meet critical operational requirements, alongside high levels of reliability and performance in demanding production environments.”
An integrated security system that includes new IP cameras and two-way audio technology has seen the rate of injuries as a result of attacks on Post Office staff decline by 36% in just three years. This follows the deployment of a sophisticated monitoring and intelligent threat detection platform from Morphean, a Video Surveillance-as-a-Service (VSaaS) innovator, which has not only helped to keep staff safe but has also protected ATMs from attack, helping to keep Post Office doors open. Post Office is responsible for the safety and well-being of 14,500 workers in 11,600 branches. The very nature of their combined service offering and the fact they are often located in rural areas, means branches are prime targets for thieves. Threat intelligence Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon. In rural communities, attacks on equipment can leave branches out of operation for long periods. In the last year alone, there were 13,437 violent attacks on convenience store workers, 27% of which involved a weapon and 39% led to injury, according to The Association of Convenience Stores (ACS) annual Crime Report. The Post Office security team wanted to build on its existing threat intelligence and response system, Grapevine, with a network of IP cameras and two-way audio into branches. Axis Communications cameras, microphones and speakers, connected to the Morphean Platform and hosted in the cloud, were installed in pilot branches by Kings Secure Technologies. Security automation Now that trial implementations have been completed successfully, the security team plans to expand coverage rapidly. In addition to the cameras, the networked speakers enable control centre staff to speak directly to customers and suspected criminals, alerting them to the fact they are under surveillance. The solution is also optimised to use low bandwidth dataFurther integrations are under way to bring security automation to other branches, such as providing the ability for remote agents to lock on-site safes in the event of an attack. Because of the challenges around connectivity in the areas where the most vulnerable branches are situated, the solution is also optimised to use low bandwidth data and is capable of streaming video over a 3G mobile network. Built-in intelligence The built-in intelligence of the Morphean Platform means staff are able to monitor footage for suspicious behaviour, such as individuals loitering near an ATM, and issue an alert to security teams who can then decide on the appropriate course of action. If it’s someone trying to find their wallet, no action is taken; if a crime is in progress, police will be notified along with video footage. In addition, staff are able to trigger an alert manually using an under-the-counter activation button, which can be investigated immediately by control centre staff at the alarm receiving centre (ARC). “The safety of our staff is our number one priority,” says Physical Security Manager for Post Office, Mark Dinsdale. Make significant differences Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end" “We’ll never completely eliminate crime in our branches, but we are also not powerless against it and we are able to make significant differences to the safety of our people, as demonstrated by the new technology we are deploying.” “Post Officers, particularly those in remote areas without access to a nearby police station, value the easy access to help and now report feeling much safer at work,” he concludes. Paul Ottley, Account Director at Kings Secure Technologies, says there are more subtle benefits to the Morphean Platform. “Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end. This means that even if criminals attempt to destroy cameras or on-site storage appliances, recordings of any incidents are secured in a manner that is admissible as evidence. This eliminates the challenge of sending out an engineer to collect footage. It’s a simple solution that is flexible and fully compliant with regulations such as the GDPR.”