Everbridge, Inc., global supplier in critical event management and enterprise safety software applications to help keep people safe and businesses running, has announced that it has achieved a FedRAMP Agency Authorisation for its Everbridge Suite solution. FedRAMP (Federal Risk and Authorisation Management Program) is a government-wide program that provides a standardised approach to security assessment, authorisation and continuous monitoring for cloud products and services. Federal Risk and A...
There’s no denying that cyber-crime is one of the biggest threats facing any organisation with the devastating results they can cause painfully explicit. Highly publicised cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organisations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organisation a fine of up to four...
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-driven decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technolog...
Tavcom Training, operator of the Register for Certified Technical Security Professionals (CTSP), is pleased to announce that Frank Smith and Nick Grewcock from the Security Systems and Alarms Inspection Board (SSAIB) are among the first auditors to be admitted. The CTSP Register was extended to include auditors and consultants fulfilling technical roles in the electronic security and fire systems sectors in June 2018. Frank Smith commented: “I’m delighted to have been recognised as...
Hytera Communications Corp. Ltd., Hytera America, Inc., and Hytera Communications America (West), Inc. (collectively, "Hytera") has filed a petition at the US International Trade Commission (ITC) requesting review of a Final Initial Determination issued on July 3, 2018 by ITC Administrative Law (ALJ) Judge MaryJoan McNamara that features in Hytera's Digital Mobile Radio (DMR) products sold in the US infringe patents of Motorola Solutions, Inc. (MSI). Hytera files petition at US ITC Hytera's po...
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete...
Global Gaming Expo (G2E) Asia, the marketplace for the Asian gaming and entertainment industry, officially came to a conclusion at The Venetian Macao. The Expo’s 12th edition was its largest to date, boasting a 33,000 square meters of show floor and a globally renowned showcase of more than 220 exhibitors with cutting-edge products, services and technologies. It additionally hosted 16,358 local and international trade visitors, at an annual increase of 17.2 percent. Josephine Lee, Chief Operating Officer of Reed Exhibitions Greater China, notes, “We’re proud to have concluded our largest, most exciting and successful expo to date! G2E Asia truly gets bigger and better each year. We never rest on our laurels and always recognize the need for growth and improvement. Our dedicated teams, both on and off the show floor, work hard throughout the year to ensure the event’s continued growth. Of course, G2E Asia also depends on the collaboration of our partners and participants. Our loyal exhibitors and thousands of visitors complete the show’s formula for success. We’d like to thank them for their contributions and their dedication to the industry, and to G2E Asia! Here’s to even more success in 2019!” G2E Asia 2018 event highlights included: New Product Hot Hits presented real-time rankings of the most popular products and services showcased by G2E Asia exhibitors New Product Hot Hits Returning as the most popular digital item at G2E Asia 2018, New Product Hot Hits presented real-time rankings of the most popular products and services showcased by G2E Asia exhibitors. This year’s grand champion and winning product was WeChat mini games, presented by Rolling Bet Technology Company Limited. Macau SAR Legislators Tour As Macao’s meetings, incentives, conferences and exhibitions (MICE) industry increasingly elevates its status in the international arena, G2E Asia’s enriched and diversified non-gaming content continues to provide a vital platform for the region’s ongoing development. The aim of the inaugural Macau SAR Legislators Tour was to further enhance understanding of the long-term goal to develop and expand Macao SAR into a global tourism and leisure hub. This year, several members of the Legislative Council of Macao took part at the invitation of the Macau Convention & Exhibition Association and Reed Exhibitions. Cotai Trek, exclusively reserved for G2E Asia Privileges members, included a customised tour to three integrated resorts located along Macau’s Cotai Strip G2E Asia Cotai Trek The half-day G2E Asia 2018 Cotai Trek, exclusively reserved for G2E Asia Privileges members, included a customised tour to three integrated resorts located along Macau’s famed Cotai Strip, including MGM COTAI, Galaxy Macau and Wynn Palace. The “Trek” comprised a guided VIP tour of gaming and non-gaming amenities, together with each property’s unique highlights including a peek at MGM Cotai’s permanent art collection of Macau and Eight Views of Macau Series; the Galaxy Macau’s Fortune Diamond and Wave Pool; and Wynn Palace’s Penthouse Gaming Salon and eclectic Fontana Buffet. “I was thoroughly impressed by the tour. Our guides, all members of top management, took the time out of their busy schedules to show us their amazing properties. With such a diverse selection of gaming and non-gaming options, all three were a truly defined the modern integrated resort." Mr. Anton Ivanov, general manager of Grand Hotel Varna JSC. “The trek gave us a unique and first-hand glimpse of both the front and back of the house. It was fascinating to see how these massive properties worked ‘behind the scenes’. Their design and features were so innovative and remarkable. Just when you thought they had thought of everything, these resorts are proof that creativity and innovation are alive and well in the industry!” Ms Michelle Elliott, senior cash operations and collections executive of Les Ambassadeurs Club UK Ltd. G2E Asia 2019 returns to The Venetian Macao from May 21-23, 2019. Its expanded exhibition space aims to deliver a larger and more comprehensive event.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many states require a clearly posted sign indicating audio recording is taking place in an area before a person enters. Analytic information derived from audio can be a useful tool and when implemented correctly, removes any concerns over privacy or legal compliance. Audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Focused responses to events Audio analytics processed in the camera, has been a niche and specialised area for many installers and end users. This could be due to state laws governing audio recording, however, audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Processing audio analytics in-camera provides excellent privacy since audio data is analysed internally with a set of algorithms that only compare and assess the audio content. Processing audio analytics on the edge also reduces latency compared with any system that needs to send the raw audio to an on-premises or cloud server for analysis. Audio analytics can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Having a SoC allows a manufacturer to reserve space for specialised features, and for audio analytics, a database of reference sounds is needed for comparison Microphones and algorithms Many IP-based cameras have small microphones embedded in the housing while some have a jack for connecting external microphones to the camera. Microphones on indoor cameras work well since the housing allows for a small hole to permit sound waves to reach the microphone. Outdoor cameras that are IP66 certified against water and dust ingress will typically have less sensitivity since the microphone is not exposed. In cases like these, an outdoor microphone, strategically placed, can significantly improve outdoor analytic accuracy. There are several companies that make excellent directional microphones for outdoor use, some of which can also combat wind noise. Any high-quality external microphone should easily outperform a camera’s internal microphone in terms of analytic accuracy, so it is worth considering in areas where audio information gathering is deemed most important. In-built audio-video analytics Surveillance cameras with a dedicated SoC (System on Chip) have become available in recent years with in-built video and audio analytics that can detect and classify audio events and send alerts to staff and emergency for sounds such as gunshots, screams, glass breaks and explosions. Having a SoC allows a manufacturer to reserve space for specialised features. For audio analytics, a database of reference sounds is needed for comparison. The camera extracts the characteristics of the audio source collected using the camera's internal or externally connected microphone and calculates its likelihood based on the pre-defined database. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS Configuring a camera for audio analytics Audio detectionThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup Noise reductionA simple threshold level may not be adequate enough to reduce false alarms depending on the environment where a camera or microphone is installed. Noise reduction is a feature on cameras that can reduce background noise greater than 55dB-65dB for increased detection accuracy. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup. With noise reduction enabled, the system analyses the attenuated audio source. As such, the audio source classification performance may be hindered or generate errors, so it is important to use noise reduction technology sparingly. Audio source classificationIt’s important to supply the analytic algorithm with a good audio level and a high signal-to-noise ratio to reduce the chance of generating false alarms under normal circumstances. Installers should experiment with ideal placement for both video as well as audio. While a ceiling corner might seem an ideal location for a camera, it might also cause background audio noise to be artificially amplified. Many cameras provide a graph which visualises audio source levels to allow for the intuitive checking of noise cancellation and detection levels. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly Messages and eventsIt’s important to choose a VMS that has correctly integrated the camera’s API (application programming interface) in order to receive comprehensive audio analytic events that include the classification ID (explosion, glass break, gunshot, scream). A standard VMS that only supports generic alarms, may not be able to resolve all of the information. More advanced VMS solutions can identify different messages from the camera. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Twitter has around 350 million active users a month, all eagerly posting 280-character “tweets” about the world around them. It’s a vast amount of data from all over the globe. Security professionals have begun to appreciate the value of mining all that data for insights to help them protect people, assets and operations. One company leveraging the Twitterverse to provide real-time situational awareness to corporate security end users is Dataminr.Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events Algorithms for actionable security signals The New York-based technology company has developed algorithms that comb through the full Twitter dataset to provide actionable signals to security professionals around the world about security-related events as they unfold. For corporate security, early information about an unfolding event enables them to take action faster in order to secure their people, locations and business operations. “OMG! Just heard a loud bang on the quad,” a tweet might declare. Combined with location information gleaned from a mobile phone, such a tweet could be the first indicator of an unfolding security incident. As an event unfolds, hundreds of such tweets are likely to be posted from the surrounding areas, collectively offering a running narrative of developing events. Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events. Many times, tweets are the first information available from an incident even before the arrival of first responders.Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email “Early notification allows security professionals to be more proactive,” says Dillon Twombly, SVP, Corporate Sales at Dataminr. “We have a broad range of users across Fortune 1000 companies, and also including country security managers, security operations centers, and executive protection. "In retail, we provide information for security operations or loss prevention. Events sometimes have a potential to spin out of control, and we allow security professionals to react faster and get ahead of an event proactively.” Various security platforms Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email. The system can be integrated with a company’s workflow, and the software interfaces with various security platforms, such as physical security information management (PSIM) systems. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event Dataminr addresses all regulatory and legal concerns, and it is GDPR-compliant. However, privacy is generally not a big concern because Twitter data is posted publicly, and Dataminr gleans information related to a specific event, not a specific Twitter user’s individual data. “Over the past couple of years, we have grown the security vertical,” says Twombly. “The market is receptive to the value of social media as a tool for users tasked with responding in a comprehensive way to a range of issues.”The company’s services are useful across the full range of vertical markets in the security industry Public safety and security In addition to security and public safety applications, Dataminr also provides services to financial companies and even media outlets. In fact, the 9-year-old company started in finance, where stock or currency traders were able to leverage breaking news notifications to make decisions faster. In the media vertical, Dataminr provides information to 500 newsrooms globally. Public safety and security uses have evolved, and Twombly currently spearheads the company’s work in corporate security, calling on his experience in the security world. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event.Customers can customise the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter Tracking Twitter posts enables a company to get ahead of an evolving story and help to shape the narrative. Twombly says Dataminr has “deep and broad relationships” with corporate customers and delivers information that can possibly be used by multiple departments in an organisation. The company’s services are useful across the full range of vertical markets in the security industry, from transportation to major industrials to financial services to energy. In the education vertical, major universities are customers, as are local school districts. Customers can customise the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter. Twombly says the company’s software is constantly evolving and being fine-tuned in response to changing needs. Dataminr is a “strategic partner” of the social media giant and works closely with them on product development, he adds.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognise potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security best practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organisations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology in school security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-hour monitoring solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorised to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting and landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing physical environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
As most of us are well aware by now, from 25th May 2018, every EU country will be subject to the new General Data Protection Regulations (GDPR), changing the way personal data is handled by strengthening compliance requirements and introducing strict penalties for failing to adequately protect personal data. All UK businesses must be conscious of the new rules and make the necessary changes, since non-compliance can result in data breaches and massive fines of up to 20 million Euros, or 4% of turnover - whichever is highest. The British Security Industry Association (BSIA) holds that there are a staggering six million active CCTV cameras currently being used in the UK. Most businesses of all types and size will be using some type of CCTV, whether it be for security purposes, health and safety or monitoring. People’s rights and freedoms cannot be overridden, as employees at work still have a right to privacyRight to privacy What businesses need to be aware of though, is that the images and footage of people captured by their surveillance system is classified as personal data under GDPR, which means that those who operate this type of surveillance must ensure that they are complying with the new regulations. Under GDPR, those who operate CCTV cameras must be able to demonstrate that there is a strong, transparent, ‘fair’ reason for doing so. People’s rights and freedoms cannot be overridden, even at work – employees still have a right to privacy. If you haven’t done so already, you should immediately conduct a full data privacy impact assessment, as recommended by the Information Commissioner’s Office (ICO) code of practice. This will help you determine if there is a legitimate reason for processing data through CCTV footage, while ensuring that you are not excessively impacting the privacy rights of the people captured. Justifying privacy impact assessments If you are unsure of how to carry out a privacy impact assessment, there are experts out there who can help you An example of legitimate justification would be a construction site owner introducing wireless CCTV cameras to monitor and secure their site from would-be criminals. In this case, to meet legitimate purpose, the footage must be of sufficient quality and the images captured must be readily available for police examination if such a request is made. An illegitimate reason, on the other hand, would be the installation of CCTV purely to track the behaviour of employees, which could be viewed as an invasion of privacy. However, if you can say it is there for health and safety purposes, with evidence to back this up, you might then have a justifiable explanation. If you are unsure of how to carry out a privacy impact assessment, there are experts out there who can help you. Maintaining transparency Under GDPR, ‘transparency’ is important when processing data, which means data subjects, i.e. those whose images are captured by CCTV, are entitled to know that they are being filmed, which means you must inform them of the CCTV presence. To best ensure you are upholding this rule, it is a good idea to display prominent, unambiguous signs within the CCTV area to communicate that you are capturing footage and give people a number to contact for more information. Not only does this inform people that they could be under surveillance, but by placing prominent signage you are also helping to deter trespassers, who are less likely to enter a premises if they know might be filmed. Those whose images are captured by CCTV are entitled to know that they are being filmed Data retention One of the main aspects of GDPR is that personal data cannot be stored forever; it must only be kept for as long as its purpose requires (usually 30 days is recommended). As such, every camera your business operates will have to be assessed in order to ascertain how long footage is to be retained and why. Each case will be subjective and there are no hard and fast rules as to the ideal retention period. It is up to you to determine an acceptable period, taking into account people’s rights when deciding what is best. The upside is most modern CCTV cameras will allow the operator to set specific data retention limits. Individuals can request access for free under the new GDPR, making the likelihood of requests higherResponding to data requests As it falls under personal data, people can request access to CCTV footage which relates to them and the CCTV operator is required to disclose it. However, you must ensure that the person requesting to see the footage is the person who is present in it. By providing access to the footage, you must be wary not to disclose any personal data of other people, which may mean blurring out sections of the footage (e.g. containing number plates or images of other people) is necessary to avoid data breaches. Moreover, once a request for data access has been made, this must be provided without delay and within one month at the latest. This can be extended by two months where the request is complex or numerous. As such, you should ensure that there are appropriate policies in place within your working environment to ensure that employees know how to respond to individual data requests. Under the old rules, there used to be an admin fee for such requests, but this has been scrapped and now individuals can request access for free under GDPR, making the likelihood of requests higher. GDPR awareness among security service providers It’s always important to use a highly reputable security service provider who should be well aware of the GDPR rules Under GDPR, security suppliers are ‘data processors’, which means that the clients of them should have contracts in place outlining what the security supplier can do with the data. As such, you must ensure that sub-contractors working for your business, such as security suppliers, installers or engineers, are following the rules too. You will be opening up your business to potential data breaches if you are allowing such third parties to access, remove or distribute personal data captured by the CCTV. This is why it’s always important to use a highly reputable security service provider who should be well aware of the GDPR rules. If you don’t know, just ask! Ensuring fair usage The introduction of GDPR is certainly going to pose some interesting challenges for all businesses and how it unfolds is yet to be seen. The tighter regulations show that it is no longer acceptable to not be aware of or not understand the rules surrounding personal data and that such breaches will be taken seriously. However, they should certainly not discourage CCTV use, but instead operators should seek to guarantee fair usage is upheld and take steps to ensure that people know how and why they are being recorded.
The Security Industry Association (SIA) has expressed strong support for MI HB 5828 and HB5830, two bills designed to improve school security across the state of Michigan. Michigan Legislation In a letter to Michigan House of Representatives Committee on Appropriations Chairwoman Laura Cox and Vice-Chair Rob VerHeulen, SIA CEO Don Erickson praised the bills’ creation of a comprehensive school plan and fund to enable local districts to procure security solutions to protect students from malicious perpetrators and update building code requirements to include security measures. “Sadly, our nation’s schools have increasingly become a soft target for mass violence – at Sandy Hook Elementary, recently at Stoneman Douglas High School and in many other attacks,” said Erickson. “We support holistic approaches to improving school safety and security in response to these tragedies – recognising there is no single action that can be taken that will, by itself, make our schools safe.” SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts Improving school security SIA represents about 900 security and life safety solutions providers – companies that develop, manufacture and integrate technologies that help keep people and property safe from hazards. These industry leaders strive to introduce robust security solutions integrated into our nation’s K–12 public schools, private academic institutions, colleges and universities. In addition to serving member organisations working to improve security in schools and other environments, SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts that developed threat- and income-based guidelines for schools housing grades K–12 to implement appropriate, layered security measures. These guidelines are available to help guide school investments. Additionally, PASS provides integrators with risk assessments and white papers that can be used when working with schools to evaluate and establish the best security protections for their buildings. SIA believes state assistance like that in the Michigan legislation is a start to addressing key security gaps in schools and is especially critical to high-risk school districts or those with limited budgets.
A new Concierge and Physical Security Information Management (PSIM) solution from Intergrated Security Manufacturing (ISM) is protecting two tower blocks in Haringey, enabling authorised council employees to control door access and manage fire and security systems from anywhere within the council’s estate. Newbury House, Finsbury House, John Keats House and Thomas Hardy House in Wood Green, London, already feature four of ISM’s state-of-the-art Ultimate door entry systems as well as another two, third-party technology systems (Elizabeth Blackwell and George Lansbury) from Entrotec, utilising its Apex Dual path speech technology. Thanks to the Genesys PSIM from ISM, multiple technologies can be controlled, regardless of the manufacturer, providing enhanced security to residents in 510 flats across the six towers. This delivers greater flexibility and control, eliminates the potential disruption caused by installing new equipment, and protects the council’s legacy investment. It also means that further buildings with existing ISM or Entrotec systems can be added as required with only minimal additional investment. Integrated security system Genesys allows the integration not just of door entry systems, but also multiple systems from multiple manufacturers – all from one holistic integrated security system. Every electronic security or fire safety device from CCTV and intruder alarms to electronic locking and public address can be monitored and controlled from a single platform. Most importantly, it features Migrating 3+ technology, a patented automatic failover technology that adds higher levels of automatic configurable redundancy and power. Control is effectively distributed across multiple workstations. "To improve our efficiency and give faster responsesto our residents we neededto provide conciergeservices to all our estates" Len Fevrier at Homes for Haringey has been impressed with the system and how it has performed so far: “We have used the ISM Ultimate door entry products and its Genesys 2 control room software platform extensively in the Borough over many years and have enjoyed excellent product reliability and technical support. To improve our efficiency and give faster responses to our residents we needed to provide concierge services to all our estates,” he says. “The development of the Entrotec integration into the Genesys platform, allowed Haringey to combine technology, including CCTV and fire, without going to the expense of replacing legacy door entry equipment unnecessarily. This delivers a much-needed saving during these challenging economic times for local councils, and we plan to roll this system out across the rest of the Broadwater Farm Estate and potentially other sites in the borough.” Intuitive software Managing Director of ISM, Stephen Smith, says this project is a perfect example of the flexibility of Genesys and its door entry system range: “Genesys is a ‘true’ PSIM system built around intuitive software that combines a range of industry leading features and benefits including an enhanced graphical user experience and 3-D modeling and a comprehensive event management database. Events and alarms from any integrated security application are presented to the operator clearly as and when they happen.” The PSIM software operates as a standalone platform over LAN or WAN networks for remote and local sites with workstations that can be transferred to any operating security control room on the network. This offers the end user flexibility when closing down sites or buildings for off-peak or out of normal working hours or in the unlikely event of any system failures. Ultimate is a fully addressable digital telephone entry system that is robust in design and easy to install. Unlike other door entry systems on the market it has multi speech paths that allow numerous conversations to be had at one time Such was the complexity of the project, that from initial design of the system to completing the installation took around two years to complete. Fire alarms, access control and CCTV can all now be controlled from one computer from any of the Council’s network.
The town of Morbegno in the Italian Alps near the Swiss border will be relying on the competence of Bosch Energy and Building Solutions Italy to boost energy efficiency in its public buildings and other facilities within the scope of a long-term project financing contract. 2017 Safe Parks Project Among other things, it includes installing LED technology in all public lighting and in the interior lighting systems of municipal buildings, upgrading the municipal heating systems while continuing to maintain the existing district heating network, bringing the fire protection systems and warning signs in all municipal buildings into line with current standards, installing new public lighting systems within the scope of the “Progetto Parchi Sicuri 2017” (2017 Safe Parks Project) and carrying out both routine and any required special maintenance of the upgraded systems. The contract also calls for modernising panelboards and replacing over 15,000 meters of power lines, installing a solar power system and an air-water heat pump, and implementing a number of “smart city” functions such as a 24/7 call center, remote control and management of systems, and new photovoltaic systems on municipal facilities with total capacity of 45 kWp. Improved energy efficiency Under the terms of the contract, Bosch Energy and Building Solutions Italy will plan and implement all of the measures and ensure that everything works properly over the next 20 years. “The contract with Bosch will give our town technologically advanced, high-quality equipment and systems,” says engineer Giorgio Ciapponi, who is responsible for the project on the Morbegno town council. “We’re also confident that we will save money in the long term by having Bosch maintain and operate our systems.” Carlo Papi, Commercial Director of the Public Administration Division of Bosch Energy and Building Solutions Italy, explains: “Working with a certified energy service company (ESCo) like us is a way for small communities like Morbegno to significantly improve their energy efficiency. The available public funding often isn’t enough. We’re going to invest 2.63 million euros in this project.”
Following the recent attack in Parsons Green, the joint terror analysis centre increased the terrorism threat level to the UK from severe to critical. As a result, the government carried out additional counter-terrorism operations around the country to help protect people in public places. Securitas took the decision to proactively support the emergency services and military operations by asking their Protective Services Officers to provide additional patrols at transport hubs across the UK. Additional security patrols Over the weekend – 16-17 September 2017 – their teams completed an additional 223 patrols, in addition to their normal security duties, providing visible, uniformed reassurance and completing security patrols in crowded places. They co-ordinated these activities though their Securitas UK Operations Centre (SOC) and from the moment they made the decision, their mobile teams immediately provided on-the-ground support. Vigilance against security threats Securitas pride themselves on providing total security – protecting people and property. In a world of ever-present security threats, we all have an increasingly important role in keeping each other safe, too. The current threat level for international terrorism in the UK has dropped from critical to severe, however they encourage everyone to remain vigilant and report any suspicious behaviour or activity to the Anti-Terrorism Hotline or emergency services.
Digital Barriers plc is pleased to announce that its ThruVis thermal screening camera technology was deployed by G4S to enhance security at the Manchester “One Love” Concert at the Emirates Old Trafford Cricket Ground, Manchester on the 4th June, 2017 and throughout the week of the British Summer Time event at Hyde Park, London 3-9th July 2017. Manchester “One Love” Concert Digital Barriers and G4S offered their services to the organisers of the One Love concert, responding to the need for additional security assurance. The event’s security infrastructure, including ThruVis, protected an audience of 50,000 visitors, as well as staff and artists including Liam Gallagher, Coldplay, Katy Perry and Robbie Williams. British Summer Time Event At the British Summer Time event in Hyde Park, ThruVis was deployed for the whole week both at VIP entrances and also at public gates, screening at rates of up to 1,000 people per hour. A total of 50,000 people were screened by ThruVis through the week at an event headlined by artists such as Kings of Leon, The Killers and Tom Petty and the Heartbreakers. Additional security assurance G4S chose to use ThruVis as it provides a unique new security capability. Firstly, it offers additional security assurance by seeing non-metallic threats like explosives and ceramic knives, as well as guns, at distances in excess of 5m. Secondly, as a thermal camera, it is completely safe and respectful of personal privacy. Finally, by reducing queuing times and minimising the need to divest clothing, ThruVis dramatically improves the visitor “experience”, as shown by the 98% satisfaction rating from visitors screened at Hyde Park. Enhanced security at minimal inconvenience G4S Director of Events Eric Alexander, said, “We used Digital Barriers' ThruVis passive screening solution, to support our security arrangements at the event. We recognise that new security innovations play an important role in strengthening our capability and increase the public's confidence in the measures we use to keep them safe.” Colin Evans, Chief Operating Officer at Digital Barriers, said, “The public expects enhanced security around high profile public events and would prefer this to be provided with minimal further inconvenience. We are confident ThruVis is the only security technology available today that meets this need and we are delighted to be working with G4S to make this important new capability widely available.”
HID Mobile Access integration with HRMIS means management can view all staff records on one platform A government department in Malaysia sought to upgrade their access control system and integrate the new system with their internal human resource system, HRMIS. With the proliferation of smart devices in the country, the agency took advantage of the “bring your own device” (BYOD) trend by moving their access control system to an innovative mobile solution. Public service human resources This government department in Malaysia is one of Malaysia’s federal government offices. The department is responsible for the development and implementation of public service human resources in the country. Their functions include planning, development and management of all areas pertaining to human resources for the public sector, to ensure that Malaysia’s public agencies have the human capital and infrastructure to function at optimal efficiency and effectiveness. As the functions of the agency continue to expand in breadth and scope, in accordance with the demand for the public services in the country, their staff has steadily grown over the past years. And, similar to other organisations, an increase in personnel also means an increase in management challenges. Improving security with integrated access control By early 2015, this department had a total of 350 civil servants under its employ. Looking to upgrade its time and attendance system that was tied to a card-based access control system, they sought a new, innovative solution to provide a better user experience for its staff. According to the facility officer in government department of Malaysia, the old access control system had been in place since 2002, and it was a perfect time to upgrade based on current technological developments. “We’ve had a card-based access control system at our entrance for a while, one which has served us well since the requirements we had were very basic,” said the officer. “However, with new technology comes new ways for us to improve our system. It is time for us to embrace change.” Minimising security threats from lost cards Improving security was another goal this department wanted to accomplish with a new solution. With a card-based system, a misplaced access card could result in a security threat – anyone who picked up a lost card could gain access to the department. Also, due to their small form factor, the loss of cards often went unnoticed and was reported late. Thus, another requirement of the new access control system was that it had to minimise the possibility and magnitude of security threats from lost and misplaced cards. The department also wanted a solution that can be integrated into their HRMIS human resources portal The department also wanted a solution that can be integrated into their HRMIS human resources portal, so information about staff attendance and schedules could be viewed online under a unified platform. “In addition to improving the user experience, we also wanted to tie our previously siloed systems together to provide the management with better information about our staff’s time in and out of the office. This would allow us to have the complete picture of each staff member’s availability for better manpower allocation,” said this officer. HID Mobile Access control system The government department in Malaysia procured the services of Prymax Technologies Sdn Bhd, an HID Global partner that provides ICT system integration in the education, government and private sectors. After assessing HID Global’s products and solutions, they chose to deploy HID Mobile Access to enhance its access control system at their building’s entrance. The solution includes HID Mobile IDs and multiCLASS SE RP40 mobile enabled readers, as well as a VertX EVO V2000 reader interface and a network gateway controller. The deployment took less than three months. With more and more staff bringing and using their own smart devices to the office, this department embraced the BYOD trend fully through its new access control system. By deploying HID Mobile Access, the department enabled the staff to use their own mobile phones to replace cards for office access. Connected smart devices The multiCLASS SE RP40 mobile enabled card readers support Bluetooth and work with both iOS and Android devices, as well as a range of credential technologies. The readers are connected to the VertX EVO V2000 controller via a TCP/IP network wired with CAT6 cabling to processes all access control decisions in real-time. At the entrance, the staff member can conveniently tap their mobile device to the reader or use HID Global’s patented “Twist and Go” gesture technology, an option configurable by department’s IT staff. "The HID Mobile Access solution provides and exceeds the level of security we were looking for, while improving the convenience of our staff" The users’ HID Mobile IDs and access rights are provisioned over-the-air to end-user mobile devices via the intuitive HID Mobile Access Portal administration, and can be revoked remotely by the administrators in case the devices are lost or stolen. HID Mobile Access also communicates with their HRMIS portal and relays staff attendance data to the server. Their staff can now view and remark on attendance, as well as send records online through the portal. Integrated resource management solution “The majority of our staff welcomes the change, citing the convenience of using their own mobile phones to check in at work is a great improvement over carrying yet another card for this purpose. From the management perspective, using mobile devices to verify a staff member’s attendance ensures that we are getting the real attendance records, as it completely eliminates card skimming. Also, since reporting is done on a browser, the administrators can generate reports easily at any time,” said the facility officer. HID Mobile Access integration with HRMIS also means that management can view of all staff records on one platform, streamlining the evaluation and allocation of personnel for projects. This also provides management with unprecedented insights into staff productivity to identify highly productive workers. “Like any other government agency around the world, we take security very seriously. Hence, any solution we deploy has to fulfill a stringent set of requirements. The HID Mobile Access solution not only provides and exceeds the level of security we were looking for, but it also does so while improving the convenience of our staff members. We are very pleased with the results of this project,” said the officer.