The Security Industry Association (SIA) looks forward to 2019, and it is apparent that physical security is moving into its most formative years. Changes presented by emerging technology, open systems and growing connectivity among devices and sensors will make a big difference for manufacturers, systems integrators/dealers and end users. With a more open, connected environment come cyber risk and data privacy concerns – which is why, in SIA’s 2019 Security Megatrends, cybersecurity...
Open Options, based in Addison, Texas, provides a truly open access control architecture that will strengthen the ACRE portfolio and increase the breadth of solutions offered by the global provider of security systems. The acquisition of Open Options is also an opportunity for ACRE to focus on growth opportunities in North America and “balance the scales a bit,” says Joe Grillo, CEO of ACRE, which significantly grew its reach in Europe, the Middle East and Africa with the acquisitio...
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth...
ESA is proud to recognise the distinguished group of companies supporting the industry in 2018 through its Executive Strategic Partners program. Executive Strategic Partners program This program allows us to partner with key manufacturers and service providers that are looking to make a significant impact on the industry" “This program allows us to partner with key manufacturers and service providers that are looking to make a significant impact on the industry,” says Merlin Guilbe...
Morse Watchmans, the provider of key and asset management, announces the latest addition to their executive management team - Tim Purpura, security industry veteran and Chairman of Mission 500, will be joining as International Sales Manager. Extensive experience “Morse Watchmans’ international sales have shown strong potential in recent years,” said Joe Granitto, COO, Morse Watchmans. “Tim’s extensive experience in the industry will help him strengthen our interna...
Everbridge, Inc., global supplier in critical event management and enterprise safety software applications to help keep people safe and businesses running, has announced that it has achieved a FedRAMP Agency Authorisation for its Everbridge Suite solution. FedRAMP (Federal Risk and Authorisation Management Program) is a government-wide program that provides a standardised approach to security assessment, authorisation and continuous monitoring for cloud products and services. Federal Risk and A...
Tavcom Training, operator of the Register for Certified Technical Security Professionals (CTSP), is pleased to announce that Frank Smith and Nick Grewcock from the Security Systems and Alarms Inspection Board (SSAIB) are among the first auditors to be admitted. The CTSP Register was extended to include auditors and consultants fulfilling technical roles in the electronic security and fire systems sectors in June 2018. Frank Smith commented: “I’m delighted to have been recognised as a CTSP-registered auditor, no less because it’s a fantastic way for me to celebrate my fifth anniversary at SSAIB. The CTSP Register is a very valuable addition to our industry as it gives a platform for technical competence and experience to be verified.” Being named on the CTSP Register is also beneficial to all of the auditors we have at SSAIB" Professional recognition of technical auditing “It provides a huge benefit to end users, because it gives them confidence and peace of mind that the person undertaking the work is qualified to do so. Being named on the CTSP Register is also beneficial to all of the auditors we have at SSAIB as it is a professional recognition of our technical auditing knowledge.” Nick Grewcock, who has been with SSAIB for 18 months, said: “Seeing my name on the CTSP Register is great; once these next six months are out of the way and I’ve achieved the minimum two-year auditing criteria I’ll be proud to see my listing move up from an engineer to an auditor.” CTSP Register for security system “There are a lot of steep learning curves involved in auditing, so it’s good that the CTSP insists on an allotted amount of time to avoid just anyone registering for CTSP recognition as that would heavily dilute the quality that this level of recognition warrants. The CTSP Register for security system professionals goes a long way to reducing the risk of inconsistent standards. By benchmarking the registrant to an agreed minimum level, this will ensure quality in the industry and improvement in the standards, creating confidence and reassurance for customers and other contractors.” CTSP Registrar Kevin Matthew stated: “The security industry has many varied but equally important roles, so the decision to include auditors and consultants was designed to be inclusive of this professional diversity and to continue to raise professional standards. We are delighted to recognise Frank and Nick on the Register; it is apt that they are amongst the first auditors to register as the vocational pathway has been developed in partnership with SSAIB, which is one of the endorsing bodies.”
Hytera Communications Corp. Ltd., Hytera America, Inc., and Hytera Communications America (West), Inc. (collectively, "Hytera") has filed a petition at the US International Trade Commission (ITC) requesting review of a Final Initial Determination issued on July 3, 2018 by ITC Administrative Law (ALJ) Judge MaryJoan McNamara that features in Hytera's Digital Mobile Radio (DMR) products sold in the US infringe patents of Motorola Solutions, Inc. (MSI). Hytera files petition at US ITC Hytera's position remains that its products sold in the US do not infringe MSI's patents, and that the initial determination is incorrect. MSI originally asserted seven patents in its complaint but later withdrew three. ALJ McNamara ruled that a limited number of claims in the four remaining patents at issue are infringed, but also determined that MSI did not satisfy the technical industry prong of the domestic industry requirement as to another of its patents and did not find Hytera to have violated the statute with respect to that patent. During proceedings in this case, before the period for factual discovery ended, Hytera had produced for the ALJ's consideration documents and source code related to several new designs. In addition to asking the ITC to reverse the ALJ's initial determination, Hytera has also petitioned the Commission to affirm that these latest products are not infringing. Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI" Digital Mobile Radio products "Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI," said Tom Wineland, Vice President of Hytera Communications America (West), Inc. "MSI did not oppose our new designs based on six of the asserted patents." In June of 2018, Hytera announced a new range of features for its digital mobile radio (DMR) portfolio, including its mobile radios, portable radios, and repeaters. These new features include extending full-duplex calling into repeater-mode operation (RMO) and direct-mode operation (DMO), enlarging full-duplex coverage beyond trunking mode without requiring extra hardware. Hytera also extended its over-the-air programming capability to conventional repeater operation, allowing individual radios to be reprogrammed remotely. Furthermore, optimised push-to-talk (PTT) functionality allows users to talk instantly after PTT even before a call is established. Hytera portable radios and repeaters Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity" "Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity, help improve the safety of users, and offer a better user experience," added Hytera's Wineland. "They boost Hytera’s leading position in providing innovative, versatile, high-quality DMR solutions that also present a compelling value to our dealers and customers." Hytera's petition before the ITC remains confidential by terms established by the Commission, which typically completes reviews within 120 days. Since the Commission has not issued its final decision, there is presently no constraint on the import or sale of any of Hytera’s products. Hytera also learned in May of 2018 that the US Patent and Trademark Office's Patent Trial and Appeal Board has accepted three Hytera petitions to invalidate MSI's patents based on prior art. "Hytera looks forward to the disposition of this case at the ITC and to resolving the series of nuisance litigations our competitor has filed against us," adds Wineland. "Hytera is focused on innovation and prefers to compete fairly in the marketplace rather than in the courtroom. Hytera is confident that our products do not infringe."
Global Gaming Expo (G2E) Asia, the marketplace for the Asian gaming and entertainment industry, officially came to a conclusion at The Venetian Macao. The Expo’s 12th edition was its largest to date, boasting a 33,000 square meters of show floor and a globally renowned showcase of more than 220 exhibitors with cutting-edge products, services and technologies. It additionally hosted 16,358 local and international trade visitors, at an annual increase of 17.2 percent. Josephine Lee, Chief Operating Officer of Reed Exhibitions Greater China, notes, “We’re proud to have concluded our largest, most exciting and successful expo to date! G2E Asia truly gets bigger and better each year. We never rest on our laurels and always recognize the need for growth and improvement. Our dedicated teams, both on and off the show floor, work hard throughout the year to ensure the event’s continued growth. Of course, G2E Asia also depends on the collaboration of our partners and participants. Our loyal exhibitors and thousands of visitors complete the show’s formula for success. We’d like to thank them for their contributions and their dedication to the industry, and to G2E Asia! Here’s to even more success in 2019!” G2E Asia 2018 event highlights included: New Product Hot Hits presented real-time rankings of the most popular products and services showcased by G2E Asia exhibitors New Product Hot Hits Returning as the most popular digital item at G2E Asia 2018, New Product Hot Hits presented real-time rankings of the most popular products and services showcased by G2E Asia exhibitors. This year’s grand champion and winning product was WeChat mini games, presented by Rolling Bet Technology Company Limited. Macau SAR Legislators Tour As Macao’s meetings, incentives, conferences and exhibitions (MICE) industry increasingly elevates its status in the international arena, G2E Asia’s enriched and diversified non-gaming content continues to provide a vital platform for the region’s ongoing development. The aim of the inaugural Macau SAR Legislators Tour was to further enhance understanding of the long-term goal to develop and expand Macao SAR into a global tourism and leisure hub. This year, several members of the Legislative Council of Macao took part at the invitation of the Macau Convention & Exhibition Association and Reed Exhibitions. Cotai Trek, exclusively reserved for G2E Asia Privileges members, included a customised tour to three integrated resorts located along Macau’s Cotai Strip G2E Asia Cotai Trek The half-day G2E Asia 2018 Cotai Trek, exclusively reserved for G2E Asia Privileges members, included a customised tour to three integrated resorts located along Macau’s famed Cotai Strip, including MGM COTAI, Galaxy Macau and Wynn Palace. The “Trek” comprised a guided VIP tour of gaming and non-gaming amenities, together with each property’s unique highlights including a peek at MGM Cotai’s permanent art collection of Macau and Eight Views of Macau Series; the Galaxy Macau’s Fortune Diamond and Wave Pool; and Wynn Palace’s Penthouse Gaming Salon and eclectic Fontana Buffet. “I was thoroughly impressed by the tour. Our guides, all members of top management, took the time out of their busy schedules to show us their amazing properties. With such a diverse selection of gaming and non-gaming options, all three were a truly defined the modern integrated resort." Mr. Anton Ivanov, general manager of Grand Hotel Varna JSC. “The trek gave us a unique and first-hand glimpse of both the front and back of the house. It was fascinating to see how these massive properties worked ‘behind the scenes’. Their design and features were so innovative and remarkable. Just when you thought they had thought of everything, these resorts are proof that creativity and innovation are alive and well in the industry!” Ms Michelle Elliott, senior cash operations and collections executive of Les Ambassadeurs Club UK Ltd. G2E Asia 2019 returns to The Venetian Macao from May 21-23, 2019. Its expanded exhibition space aims to deliver a larger and more comprehensive event.
SphereVision has added a smoke simulation feature to its 360-degree imaging software to aid training, emergency planning and incident management. Specifically designed for fire and rescue teams, a variable density smoke layer can be applied to the 360-degree imagery allowing first responders to assess fire equipment, alarms and exit routes, and plan and train for a variety of incidents. A SphereVision Project, complete with site layouts and maps, embedded photographs and site documentation, can also now be viewed in VR headsets without the need for specialist training. Health safety review to risk assessment The new SphereVision functionality has been developed alongside geoSphere4D and tested by a UK nuclear energy company. “Imagery has always been a useful aid to training, emergency planning and incident management and for many of our clients the requirement has been based around visual content, with an underlying need for measurement capabilities,” commented Ian Anderson, Managing Director of geosphere4D, a technology-led geospatial survey company that has been using SphereVision for more than 5 years. The new functionality is now being used as an aid for site familiarisation, health and safety reviews and risk assessment planning" “Working with SphereVision we were able to take feedback from a real-world application – using the captured imagery to assist with operational activities at a nuclear facility, and develop functionality that has taken 360-degree imagery to the next level,” continued Anderson. “The new functionality, including the smoke layer and VR viewing, is now being used as an aid for site familiarisation, health and safety reviews and risk assessment planning in areas that would normally require training, specialist equipment and work orders to access.” 360-degree imagery for smoke detection Following client feedback on an existing 360-degree project SphereVision developed the smoke effect overlay. The SphereVision tool allows fire and rescue teams and other first responders to experience the potentially disorientating and dangerous effects of smoke or other gases within restricted or confined spaces accessing restricted or dangerous locations without risk. The use of commercially available VR hardware, such as the HTC Vive, also opens a new dimension for 360-degree imagery. Another application of the SphereVision Project platform includes incident investigation Efficient incident management Using the SphereVision VR solution panoramic media can be accessed by a broad range of personnel for training and planning purposes. The use of controls within the imagery, accessed by the VR headset cross hairs, means users do not require specialist IT or VR viewing skills, and images can be used during an incident by responding personnel. Another application of the SphereVision Project platform includes incident investigation, where imagery can be used to assess damage, plan remedial work and provide site familiarisation to post incident work crews.
In March 2018, the Siemens Building Technologies Division joined buildingSMART International (bSI) as a member of the Strategic Advisory Council and several National Chapters. Siemens is the first building technology vendor to become part of this international not-for-profit organisation. buildingSMART International bSI is the creator of the ‘openBIM’ data format which defines open, vendor-neutral international standards for BIM (Building Information Modelling). These standards are essential in order to promote rapid digitalisation in the built asset sector. BIM is a digitally assisted, future-proof, holistic process for planning, constructing and operating buildings BIM is a digitally assisted, future-proof, holistic process for planning, constructing and operating buildings and helps boost productivity in the construction industry. It affects all stakeholders involved in the building process – from building owners, architects and planners to building technology vendors, property operators and facility managers, to demolition and disposal companies. The virtual building process has enormous benefits: the data model generated in the planning phase of a building can be used across all other phases in the building's lifecycle. In the construction phase, it is possible to test construction plans and ideas in virtual space to assess their practical feasibility. Physical construction work does not start until the simulation has been successful. In addition, BIM makes it possible to optimise energy efficiency measures and to factor in future changes in usage right in the planning phase. This results in substantial cost savings in the subsequent operating phase, which accounts for 80 per cent of a building's lifecycle costs. BIM makes it possible to optimise energy efficiency measures and to factor in future changes in usage Siemens Building Technologies Matthias Rebellius, CEO of Siemens Building Technologies explains, "Our membership of bSI underpins our clear commitment to BIM and incorporates our building digitalisation expertise into bSI's groundbreaking standardisation efforts. This will allow us to take the next major step together toward optimising all phases in the building lifecycle." Richard Petrie, CEO at bSI concludes, "Siemens' decision to join buildingSMART as a Strategic Member is a very significant endorsement of the importance of our solutions and standards work, our vision and the strength of our community. Siemens' scale and professionalism will be of huge assistance as buildingSMART gears up to address the growing work programmes demanded by the uptake of openBIM and digital ways of working in the built asset sector." BIM data from Siemens Building Technologies is currently available for more than 1,200 products including field devices, automation and fire safety products. More data is being added, with plans to increase the BIM data pool to encompass more than 2,000 products.
The MTP Gold Medal is one of the most recognisable awards in the Polish market, which is given after a thorough assessment of innovative products of the highest quality. Each year, nearly 500 products from different countries all over the world compete for the Gold Medal Award. However, only the ones that meet statutory criteria and gain positive recommendations of professional jury receive this prestigious award, which in 2018, offers all together 30 pieces. The Jury, a team of experts, composed of eminent specialists from relevant fields of economic life looking for the products of modern, innovative products based on superior technology. The MTP Gold Medal is thus a confirmation of product excellence. The four winners are Dahua’s NKB5000 Keyboard, TPC-BF2120 camera, XVR5216AN-4KL-16P recorder and HAC-PFW3601-A180 camera. BF2120 introduces the fusion function, uniquely imposing an image from the thermal imaging module on the Full HD image Precise object information NKB5000 UHD Decoding Network Keyboard, a regular winner of renowned international design awards and an innovative product, combines the functions of a classic control desk for CCTV systems with a video decoder. The keyboard can be used with fixed and rotary IP cameras, recorders, and video walls. Built-in alarm inputs and outputs or bi-directional audio make it a complete and multifunctional product. TPC-BF2120 camera is a unique combination of a traditional Full HD camera with increased sensitivity. In contrast to the traditional bi-spectral cameras, BF2120 introduces the fusion function, uniquely imposing an image from the thermal imaging module on the Full HD image, enabling the operators to gain images with unprecedented details and precise information on objects generating heat. Safe and smart living XVR5216AN-4KL-16P recorder, a versatile device that allows recording of all the most popular vision standards, namely HDCVI, TVI, AHD, CVBS and network cameras, enables easy and convenient adaptation of the existing cable infrastructure, as well as the expansion of systems with modern IP devices. Supporting multi-signal, sending both video and audio, as well as controlling PTZ cameras or power supply with one cable, XVR5216AN-4KL-16P recorder simplifies installation planning and reduces the cost. Winning MTP Gold Medal 2018 is a strong recognition of Dahua’s continuous effort on innovation HAC-PFW3601-A180 camera, an analogue panoramic camera delivering 4K resolution, generates image using 3 independent Sony StarvisTM transducers with 3.6 mm focal length. It has been created to work in extremely low light conditions. The virtual PTZ and WDR functions ensure greater image detail, increasing the security level provided by the analog monitoring system. Thanks to the HDCVI technology used, it is possible to use existing coaxial cabling as well as data transfer up to 500 m. Winning MTP Gold Medal 2018 is a strong recognition of Dahua’s continuous effort on innovation. With a mission of ‘Enabling a Safer Society and Smarter Living’, Dahua will continue to focus on ‘Innovation, Quality, and Service’ to deliver world class products and services to customers and partners all around the world.
There’s no denying that cyber-crime is one of the biggest threats facing any organisation with the devastating results they can cause painfully explicit. Highly publicised cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organisations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organisation a fine of up to four per cent of global revenue or up to 20 million euros. Cyber-crime potentially affects every connected network device. In the biggest cyber-crime to date, hackers stole $1 billion from banks around the world, by gaining access to security systems. It’s more important than ever for organisations to be vigilant when it comes to their cyber security strategy. To help avoid becoming the next victim, I’ve put together a five-point cyber plan to protect your video surveillance system. 1. Elimination of default passwords A small change to a memorable, complex password could have huge consequences for your business It is estimated that over 73,000 security cameras are available to view online right now due to default passwords. ‘Password’ and ‘123456’ are among the top five most popular passwords with a staggering 9,000,000 login details matching this description. Guessable passwords create an unsecure security system which can result in an easy way for hackers to gain access to your organisation’s data, making you vulnerable to a breach. A small change to a memorable, complex password could have huge consequences for your business. Removing default passwords from products and software forces individuals to think of their own to keep their data safe. If a password system is not provided by your organisation we recommend that your password uses two or more types of characters (letters, numbers, symbols) and it is changed periodically. 2. Encrypted firmware Encrypting firmware is an important part of any organisations overall security system. Firmware can leave an open door, allowing hackers to access your data. All firmware should be encrypted to reduce the possibilities of it being downloaded from the manufacturers website and deconstructed. If the firmware posted is not encrypted, there is a risk of it being analysed by persons with malicious intent, vulnerabilities being detected, and attacks being made. With i-PRO cameras and recorders, all firmware is securely encrypted to mitigate analysis There have been cases where a device is attacked by firmware vulnerabilities even if there are no problems with the user's settings, rendering it inoperable, and DDoS attacks being made on other servers via the device. With i-PRO cameras and recorders, all firmware is securely encrypted to mitigate analysis. There is also a possibility of being attracted to spoofing sites by targeted attack email and firmware being updated with a version that includes a virus, so firmware must always be downloaded from the vendor's page. It may also be advantageous to combine this with an imbedded Linux operating system which removes all unused features of the device, it can help to reduce the chances of malicious entities searching for backdoor entities and inserting codes. 3. Removing vulnerabilities within the operating systems Vulnerability is the name given for a functional behaviour of a product or online service that violates an implicit or explicit security policy. Vulnerabilities can occur for a number of reasons for example, due to an omission in logic, coding errors or a process failure. Network attacks exploit vulnerabilities in software coding that maybe unknown to you and the equipment provider. The vulnerability can be exploited by hackers before the vendor becomes aware. You should seek to minimise these issues by looking for a secure operating system which is regularly updated. Panasonic has developed Secure Communications, a platform and package to protect against video tampering, altering, spoofing and snooping As a provider of security solutions, Panasonic is taking a number of steps to ensure its consumers remain safe and secure. We have developed Secure Communications, a platform and package to protect against video tampering, altering, spoofing and snooping. We have combined with a leading provider of highly reliable certificates and technology for detecting and analysing cyber-attacks with its own in-house embedded cryptography technology, to provide a highly secure and robust protection layer for its embedded surveillance products. 4. Avoiding remote login using Telnet or FTP Telnet and FTP are a very outdated source of software which as a result means they lack built-in security measures Telnet and FTP are a very outdated source of software which as a result means they lack built-in security measures. File transfer protocol or transfer through cloud-based services means the files and passwords are not encrypted and can therefore be easily intercepted by hackers. An encrypted software removes the risk of files being sent to the wrong person or forwarded on without your knowledge. Telnet predates FTP and as a result is even less secure. Hyper Transfer Protocol Secure is a protocol to make secure communications by HTTP, and it makes HTTP communications on secure connections provided by SSL/TLS protocols. The major benefits of using this system is that HTTPS and VPN encrypt the communications path, so data after communications is decrypted and recorded. If recorded data is leaked, it will be in a state where it can be viewed. With data encryption, however, it remains secure and can even be recoded to storage. Thus, even if the hard drive or SD card is stolen or data on the cloud is leaked, data cannot be viewed. 5. Use of digital certificates Private and public keys are generated at manufacture in the factory and certificates installed at the factoryDigital certificates are intended to safely store the public key and the owner information of the private key it is paired with. It provides assurance that the accredited data from a third party is true and that the data is not falsified. It is beneficial for all data to be encrypted with digital certificates. Digital certificates are far safer when issued by a third party rather than creating a self-signed version unless you are 100 percent sure of the receiver identity. From April 2016, some models of Panasonic series iPro cameras come with preinstalled certificates to reduce the risk of interception and the hassle of having to create one. With i-PRO cameras with Secure function, private and public keys are generated at manufacture in the factory and certificates installed at the factory. As there is no way to obtain the private key from the camera externally, there is no risk of the private key being leaked. Also, certificates are signed by a trusted third party, and the private key used for signing is managed strictly by the authority. In addition, encryption has been cleverly implemented to reduce the usual overhead on the IP stream from 20% to 2%.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-driven decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis and application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilising data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyse data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant access to connected devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyse this data is of imperative importance. Real time data storage availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing stored data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilise surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Twitter has around 350 million active users a month, all eagerly posting 280-character “tweets” about the world around them. It’s a vast amount of data from all over the globe. Security professionals have begun to appreciate the value of mining all that data for insights to help them protect people, assets and operations. One company leveraging the Twitterverse to provide real-time situational awareness to corporate security end users is Dataminr.Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events Algorithms for actionable security signals The New York-based technology company has developed algorithms that comb through the full Twitter dataset to provide actionable signals to security professionals around the world about security-related events as they unfold. For corporate security, early information about an unfolding event enables them to take action faster in order to secure their people, locations and business operations. “OMG! Just heard a loud bang on the quad,” a tweet might declare. Combined with location information gleaned from a mobile phone, such a tweet could be the first indicator of an unfolding security incident. As an event unfolds, hundreds of such tweets are likely to be posted from the surrounding areas, collectively offering a running narrative of developing events. Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events. Many times, tweets are the first information available from an incident even before the arrival of first responders.Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email “Early notification allows security professionals to be more proactive,” says Dillon Twombly, SVP, Corporate Sales at Dataminr. “We have a broad range of users across Fortune 1000 companies, and also including country security managers, security operations centers, and executive protection. "In retail, we provide information for security operations or loss prevention. Events sometimes have a potential to spin out of control, and we allow security professionals to react faster and get ahead of an event proactively.” Various security platforms Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email. The system can be integrated with a company’s workflow, and the software interfaces with various security platforms, such as physical security information management (PSIM) systems. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event Dataminr addresses all regulatory and legal concerns, and it is GDPR-compliant. However, privacy is generally not a big concern because Twitter data is posted publicly, and Dataminr gleans information related to a specific event, not a specific Twitter user’s individual data. “Over the past couple of years, we have grown the security vertical,” says Twombly. “The market is receptive to the value of social media as a tool for users tasked with responding in a comprehensive way to a range of issues.”The company’s services are useful across the full range of vertical markets in the security industry Public safety and security In addition to security and public safety applications, Dataminr also provides services to financial companies and even media outlets. In fact, the 9-year-old company started in finance, where stock or currency traders were able to leverage breaking news notifications to make decisions faster. In the media vertical, Dataminr provides information to 500 newsrooms globally. Public safety and security uses have evolved, and Twombly currently spearheads the company’s work in corporate security, calling on his experience in the security world. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event.Customers can customise the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter Tracking Twitter posts enables a company to get ahead of an evolving story and help to shape the narrative. Twombly says Dataminr has “deep and broad relationships” with corporate customers and delivers information that can possibly be used by multiple departments in an organisation. The company’s services are useful across the full range of vertical markets in the security industry, from transportation to major industrials to financial services to energy. In the education vertical, major universities are customers, as are local school districts. Customers can customise the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter. Twombly says the company’s software is constantly evolving and being fine-tuned in response to changing needs. Dataminr is a “strategic partner” of the social media giant and works closely with them on product development, he adds.
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access control devices to become an integral part of a security system for assets and people with the highest level of protection. They sought locks to offer a durable, secure and flexible alternative to standard mechanical security. They found an easy, electronic way to administer a powerful, user-friendly system based on battery-powered physical keys and secure, advanced microelectronics. Flexible high-security locking Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissionsCreval chose eCLIQ key-based wireless access control for its banking premises. Bank doors across the Lombardy region are guarded by more than 30 durable eCLIQ cylinders, putting Creval managers in complete control of entrance security. eCLIQ is a scalable electronic extension of the CLIQ access control system deployed in critical infrastructure sites across Europe. Cylinders are fully electronic, protected against manipulation and with 128-bit AES encryption built into both lock and key microelectronics. Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissions. Time-limited access rights Creval’s security manager is now able to grant access based on scheduled times and specific doors, and right down to the level of the individual site user. It is also straightforward to set time-limited access rights for a user key, increasing security if a key is lost. Audit trails and event logs are collected to the same, fine-grained degree. Key management is easy with software operated from a local PC or securely on the web via a standard browser. In the unlikely event a key is misplaced, Creval administrators simply delete its validity from the system. “We are satisfied with the results of the new access control system,” says Claudio Brisia, Logical Security Manager at Creval headquarters in Sondrio.
The Security Industry Association (SIA) has expressed strong support for MI HB 5828 and HB5830, two bills designed to improve school security across the state of Michigan. Michigan Legislation In a letter to Michigan House of Representatives Committee on Appropriations Chairwoman Laura Cox and Vice-Chair Rob VerHeulen, SIA CEO Don Erickson praised the bills’ creation of a comprehensive school plan and fund to enable local districts to procure security solutions to protect students from malicious perpetrators and update building code requirements to include security measures. “Sadly, our nation’s schools have increasingly become a soft target for mass violence – at Sandy Hook Elementary, recently at Stoneman Douglas High School and in many other attacks,” said Erickson. “We support holistic approaches to improving school safety and security in response to these tragedies – recognising there is no single action that can be taken that will, by itself, make our schools safe.” SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts Improving school security SIA represents about 900 security and life safety solutions providers – companies that develop, manufacture and integrate technologies that help keep people and property safe from hazards. These industry leaders strive to introduce robust security solutions integrated into our nation’s K–12 public schools, private academic institutions, colleges and universities. In addition to serving member organisations working to improve security in schools and other environments, SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts that developed threat- and income-based guidelines for schools housing grades K–12 to implement appropriate, layered security measures. These guidelines are available to help guide school investments. Additionally, PASS provides integrators with risk assessments and white papers that can be used when working with schools to evaluate and establish the best security protections for their buildings. SIA believes state assistance like that in the Michigan legislation is a start to addressing key security gaps in schools and is especially critical to high-risk school districts or those with limited budgets.
A new Concierge and Physical Security Information Management (PSIM) solution from Intergrated Security Manufacturing (ISM) is protecting two tower blocks in Haringey, enabling authorised council employees to control door access and manage fire and security systems from anywhere within the council’s estate. Newbury House, Finsbury House, John Keats House and Thomas Hardy House in Wood Green, London, already feature four of ISM’s state-of-the-art Ultimate door entry systems as well as another two, third-party technology systems (Elizabeth Blackwell and George Lansbury) from Entrotec, utilising its Apex Dual path speech technology. Thanks to the Genesys PSIM from ISM, multiple technologies can be controlled, regardless of the manufacturer, providing enhanced security to residents in 510 flats across the six towers. This delivers greater flexibility and control, eliminates the potential disruption caused by installing new equipment, and protects the council’s legacy investment. It also means that further buildings with existing ISM or Entrotec systems can be added as required with only minimal additional investment. Integrated security system Genesys allows the integration not just of door entry systems, but also multiple systems from multiple manufacturers – all from one holistic integrated security system. Every electronic security or fire safety device from CCTV and intruder alarms to electronic locking and public address can be monitored and controlled from a single platform. Most importantly, it features Migrating 3+ technology, a patented automatic failover technology that adds higher levels of automatic configurable redundancy and power. Control is effectively distributed across multiple workstations. "To improve our efficiency and give faster responsesto our residents we neededto provide conciergeservices to all our estates" Len Fevrier at Homes for Haringey has been impressed with the system and how it has performed so far: “We have used the ISM Ultimate door entry products and its Genesys 2 control room software platform extensively in the Borough over many years and have enjoyed excellent product reliability and technical support. To improve our efficiency and give faster responses to our residents we needed to provide concierge services to all our estates,” he says. “The development of the Entrotec integration into the Genesys platform, allowed Haringey to combine technology, including CCTV and fire, without going to the expense of replacing legacy door entry equipment unnecessarily. This delivers a much-needed saving during these challenging economic times for local councils, and we plan to roll this system out across the rest of the Broadwater Farm Estate and potentially other sites in the borough.” Intuitive software Managing Director of ISM, Stephen Smith, says this project is a perfect example of the flexibility of Genesys and its door entry system range: “Genesys is a ‘true’ PSIM system built around intuitive software that combines a range of industry leading features and benefits including an enhanced graphical user experience and 3-D modeling and a comprehensive event management database. Events and alarms from any integrated security application are presented to the operator clearly as and when they happen.” The PSIM software operates as a standalone platform over LAN or WAN networks for remote and local sites with workstations that can be transferred to any operating security control room on the network. This offers the end user flexibility when closing down sites or buildings for off-peak or out of normal working hours or in the unlikely event of any system failures. Ultimate is a fully addressable digital telephone entry system that is robust in design and easy to install. Unlike other door entry systems on the market it has multi speech paths that allow numerous conversations to be had at one time Such was the complexity of the project, that from initial design of the system to completing the installation took around two years to complete. Fire alarms, access control and CCTV can all now be controlled from one computer from any of the Council’s network.
The town of Morbegno in the Italian Alps near the Swiss border will be relying on the competence of Bosch Energy and Building Solutions Italy to boost energy efficiency in its public buildings and other facilities within the scope of a long-term project financing contract. 2017 Safe Parks Project Among other things, it includes installing LED technology in all public lighting and in the interior lighting systems of municipal buildings, upgrading the municipal heating systems while continuing to maintain the existing district heating network, bringing the fire protection systems and warning signs in all municipal buildings into line with current standards, installing new public lighting systems within the scope of the “Progetto Parchi Sicuri 2017” (2017 Safe Parks Project) and carrying out both routine and any required special maintenance of the upgraded systems. The contract also calls for modernising panelboards and replacing over 15,000 meters of power lines, installing a solar power system and an air-water heat pump, and implementing a number of “smart city” functions such as a 24/7 call center, remote control and management of systems, and new photovoltaic systems on municipal facilities with total capacity of 45 kWp. Improved energy efficiency Under the terms of the contract, Bosch Energy and Building Solutions Italy will plan and implement all of the measures and ensure that everything works properly over the next 20 years. “The contract with Bosch will give our town technologically advanced, high-quality equipment and systems,” says engineer Giorgio Ciapponi, who is responsible for the project on the Morbegno town council. “We’re also confident that we will save money in the long term by having Bosch maintain and operate our systems.” Carlo Papi, Commercial Director of the Public Administration Division of Bosch Energy and Building Solutions Italy, explains: “Working with a certified energy service company (ESCo) like us is a way for small communities like Morbegno to significantly improve their energy efficiency. The available public funding often isn’t enough. We’re going to invest 2.63 million euros in this project.”
Following the recent attack in Parsons Green, the joint terror analysis centre increased the terrorism threat level to the UK from severe to critical. As a result, the government carried out additional counter-terrorism operations around the country to help protect people in public places. Securitas took the decision to proactively support the emergency services and military operations by asking their Protective Services Officers to provide additional patrols at transport hubs across the UK. Additional security patrols Over the weekend – 16-17 September 2017 – their teams completed an additional 223 patrols, in addition to their normal security duties, providing visible, uniformed reassurance and completing security patrols in crowded places. They co-ordinated these activities though their Securitas UK Operations Centre (SOC) and from the moment they made the decision, their mobile teams immediately provided on-the-ground support. Vigilance against security threats Securitas pride themselves on providing total security – protecting people and property. In a world of ever-present security threats, we all have an increasingly important role in keeping each other safe, too. The current threat level for international terrorism in the UK has dropped from critical to severe, however they encourage everyone to remain vigilant and report any suspicious behaviour or activity to the Anti-Terrorism Hotline or emergency services.
Digital Barriers plc is pleased to announce that its ThruVis thermal screening camera technology was deployed by G4S to enhance security at the Manchester “One Love” Concert at the Emirates Old Trafford Cricket Ground, Manchester on the 4th June, 2017 and throughout the week of the British Summer Time event at Hyde Park, London 3-9th July 2017. Manchester “One Love” Concert Digital Barriers and G4S offered their services to the organisers of the One Love concert, responding to the need for additional security assurance. The event’s security infrastructure, including ThruVis, protected an audience of 50,000 visitors, as well as staff and artists including Liam Gallagher, Coldplay, Katy Perry and Robbie Williams. British Summer Time Event At the British Summer Time event in Hyde Park, ThruVis was deployed for the whole week both at VIP entrances and also at public gates, screening at rates of up to 1,000 people per hour. A total of 50,000 people were screened by ThruVis through the week at an event headlined by artists such as Kings of Leon, The Killers and Tom Petty and the Heartbreakers. Additional security assurance G4S chose to use ThruVis as it provides a unique new security capability. Firstly, it offers additional security assurance by seeing non-metallic threats like explosives and ceramic knives, as well as guns, at distances in excess of 5m. Secondly, as a thermal camera, it is completely safe and respectful of personal privacy. Finally, by reducing queuing times and minimising the need to divest clothing, ThruVis dramatically improves the visitor “experience”, as shown by the 98% satisfaction rating from visitors screened at Hyde Park. Enhanced security at minimal inconvenience G4S Director of Events Eric Alexander, said, “We used Digital Barriers' ThruVis passive screening solution, to support our security arrangements at the event. We recognise that new security innovations play an important role in strengthening our capability and increase the public's confidence in the measures we use to keep them safe.” Colin Evans, Chief Operating Officer at Digital Barriers, said, “The public expects enhanced security around high profile public events and would prefer this to be provided with minimal further inconvenience. We are confident ThruVis is the only security technology available today that meets this need and we are delighted to be working with G4S to make this important new capability widely available.”