Over the last few years, the presence of the cloud has created significant changes in the field of access control, and for good reasons. Cloud-based access control not only produces reliable, real-time control of the organisation but can also be fully integrated with third-party systems to help mitigate and limit risks within the organisation. Flexible and robust security protocols The cloud ultimately eliminates old hardware and improves on new security protocols with minimal eff...
Matrix Comsec, the manufacturer of telecom and security products, was conferred with the prestigious 46th ELCINA Award for Excellence in Research and Development for the year 2020-21 at the glittering Award Ceremony held in New Delhi on 22nd October 2021. The award highlights Matrix’s commitment to R&D and its track record of launching innovative and cutting-edge products. Cutting-edge solutions Commenting on the achievement, Ganesh Jivani, Chief Executive of Matrix said, “We...
Eagle Eye Networks, the globally renowned company in cloud video surveillance solutions, has announced enhancements to the Eagle Eye Cloud Video Management System (Eagle Eye Cloud VMS), providing three Editions - Enterprise, Professional and Standard. Customers can choose the Edition that best meets their needs, based on factors such as, number of locations, number of users, system complexity and regulatory requirements. Eagle Eye cyber-secure cloud solutions Eagle Eye Networks’ growing...
Acronis, the globally renowned company in cyber protection, has released its annual Cyber Readiness Report, providing a comprehensive overview of the modern cyber security landscape and the key pain points faced by businesses and remote employees worldwide, amid the global COVID-19 pandemic. Acronis’ Cyber Readiness Report Acronis’ Cyber Readiness Report revealed that more than 80% of global companies admitted they were not prepared to transition to remote work, exposing key vulner...
ADI Global Distribution, a pioneer in wholesale distributor of security, AV (Audio Visual) solutions and low-voltage products, has announced that it has integrated with D-Tools’ business management software solutions, D-Tools Cloud and System Integrator. Customers can now access ADI’s full product offering directly from the D-Tools’ software interface. Business management software D-Tools software is designed to drive sales and improve operating efficiency, by streamlining th...
Four out of every ten (41%) of England-based medium and large-sized businesses, which are running CCTV systems, have already deployed facial recognition analytics in their systems, in order to capture human faces and compare images to human face databases, with a view to identifying matches for access control, event security or for public safety purposes. Facial recognition analytics One in six (16%) of CCTV system owners admitted to having access to this capability on their system, but not ye...
Allegion, a global provider of security products and solutions, has announced the first integration between Overtur, Allegion’s digital environment connecting all building phases in opening design, construction and ongoing management, and Software for Hardware, an industry-renowned software developed for door, frame and hardware distributors. Software integration The partnership announcement comes in advance of the DHI conNextions 2021 conference, where both companies will be demonstrating the collaboration. Contract and integrated hardware dealers, who engage Allegion on specifications, written by the company’s Architectural Services or who use Overtur platform themselves, for opening specification writing and collaboration, can now export hardware specification information to Software for Hardware’s platform and continue to the project process. Data-centric approach to opening design Transitioning an opening specification to the submittal phase can be time consuming" “Transitioning an opening specification to the submittal phase can be time consuming, especially if manual entry is involved,” said Michael Rebbec, Overtur platform integration’s Product Owner at Allegion. Michael Rebbec adds, “With this integration, we aim to equip Software for Hardware customers with the benefits of Overtur’s data-centric approach to opening design, with Software for Hardware’s expertise in estimating and detailing a project, in the construction phase.” Overtur’s software platform Overtur’s comprehensive platform enables all project team members to collaborate on a project’s opening data. In the design phase, collaborators can upload plans and door schedules, through a plugin within Autodesk’s Revit programme or by directly uploading Adobe PDFs, and Microsoft Excel documents. Once loaded, hardware consultants can assign and configure individual products to each opening, such as a lock, a closer or an exit device. Once finalised, project information is available in multiple formats, including Hardware Set schedules and a fully written specification. Exporting data into Software for Hardware platform Customers who use Overtur for their opening specifications (either through Allegion’s Architectural Services or on their own) can now further benefit from this technology. Once the opening information is finalised, customers can export their data into the Software for Hardware platform, without the need for manual entry of data. Once imported to Software for Hardware platform, customers can add necessary configuration and dimensional information for estimating and submittals. No need for manual data inputs The Overtur and Software for Hardware integration benefits our shared customer base" “The Overtur and Software for Hardware integration benefits our shared customer base, by providing a process to save valuable time and effort,” said Ian Oxman, the Co-Owner of Software for Hardware, adding “Data duplication and error are eliminated, as the Overtur integration removes manual data input.” Frank Ruane, President, Quarters Hardware, located in Woburn, Massachusetts, said “Technology like Overtur can save the distributor many hours of data entry and reduce errors. Allegion and Software for Hardware have created a really useful tool for door, frame and hardware distributors.” DHI conNextions 2021 Starting Wednesday, on Oct. 20, 2021, attendees can visit booth #313, at DHI conNextions 2021 conference, to experience a live demo of the Overtur and Software for Hardware integration. Overtur is Allegion’s digital environment connecting all building phases in opening design, construction and ongoing management of door security and openings. It provides a centralised place to capture, maintain and verify door opening requirements, information and decisions, with easy options to push information to industry-renowned tools.
Access control and integrated security management vendor Maxxess has expanded its UK and Ireland operations with the appointment of Russell Baker as business development & account manager. Responsibilities Russell will be based out of the company’s European head office in Bracknell, UK, and will handle the substantial increase in demand for the firm’s signature solution, the eFusion™ access control, and security management platform. Building on the success of Maxxess solutions in the corporate, higher education, hospitality, and healthcare sectors, offering enterprise-class access control and integrated security, he will support existing partners and end-users and as well as developing new relationships with systems integrators, consultants and end-users across the UK and Europe. Work experience Russell has over two decades of experience spanning video surveillance, access control, intruder, and systems integration A familiar face in the security industry, Russell has over two decades of experience spanning video surveillance, access control, intruder and systems integration. He started his career at Chubb and went on to sales management roles with security systems integrators and tech vendors including Vicon and Zenitel Group. A longstanding member of the Association of Security Consultants (ASC), Russell has a proven track record in consulting roles as well as sales management. Feedback Lee Copland, Managing Director Maxxess EMEA, said, “We’re delighted to welcome Russell on board. He is well-positioned to leverage the increasing demand for cost-effective, integrated systems that drive operational efficiency by digitising processes and workflows.” “He will build on Maxxess’s existing installed base as well as helping many more organisations upgrade and digitise their infrastructures and bring new technologies on line.” Developing better access solutions Russell Baker commented, “With Maxxess eFusion and eVisitor enabling more affordable integrated site security and safety solutions, I am looking forward to working closely with consultants and systems integrators to develop project opportunities.” “These solutions are now very much in demand as customers look towards better access and people management solutions to support more flexible workplace operations post-pandemic.”
GeoVision has announced the release of GV-Control Center (V4.0), integrated security management software, designed for central monitoring systems. GV-Control Center is designed for enterprise system users, to handle high-volume video data. From real-time monitoring, video playback, event detection pop-up, I/O central monitoring, 3D E-map and communications, GV-Control Center helps security guards to quickly identify threats, and take swift actions. GV-Control Center (V4.0) GeoVision unveils a re-designed user experience on GV-Control Center (V4.0), to streamline its interfaces and aim at building a consistent experience, across the platforms of GV-VMS and GV-Edge Recording Manager. Additionally, GV-Control Center V4.0 introduces the new viewing windows, Face Recognition (FR) Watch and ASManager View, to integrate the monitoring of face recognition, access control and LPR events into the central monitoring operation. The AI (video analytics) events from forefront GV-VMS software and GeoVision AI cameras are also incorporated in the new version.
On the occasion of the Milipol 2021 (Milipol Paris 2021) exhibition, the event dedicated to homeland security and safety (taking place from Oct. 19-22, 2021, in Paris, France), Deveryware will introduce its range of security solutions, to support investigators and enhance homeland security. As the European expert in investigation technologies and global security services, Deveryware will present its innovations, specially designed to facilitate police and the Gendarmerie’s investigations. Tools and services for investigations With features, such as judicial geo-location, analysis of phone records, digital forensics for phones, hard drives and any digital device, mobile DNA analysis, etc., Deveryware offers investigators the tools and services to extract and analyse the data, which is necessary for conducting their judicial investigations and solutions that are designed to process digital evidence and accelerate their investigations. Deveryware’s investigation solutions offer: Real-time geo-location of smartphones, trackers (through the DeveryLoc and DeveryLight platforms), Call data record analysis (DeveryAnalytics Telephony Data software), Fight against fraud and financial crime (services of the OAK Branch subsidiary), Digital investigation (solutions and services of TRACIP, Deveryware subsidiary and the 1st French private laboratory for digital forensics). Innovations introduced at Milipol Paris 2021 Deveryware will introduce 3 major innovations at its stand, which are based on its main areas of expertise For those who want to test and manipulate the on-premise search kit and the digital forensics equipment, they will be available at the TRACIP booth (#5R 122) at the Milipol 2021 exhibition. Deveryware will introduce 3 major innovations at its stand, which are based on its main areas of expertise. Call data record analysis - DeveryAnalytics Telephony Data The analysis of telephone investigation data constitutes a major challenge for investigators. Deveryware has developed a unique solution for them, DeveryAnalytics Telephony Data. It notably allows them to: Detect contacts and interactions between individuals, Uncover networks, Save time and enhance investigation capacities. The DeveryAnalytics Telephony Data software was adopted by the French Gendarmerie Nationale in March 2021 and is currently being deployed. Responding to cyber-attack incidents - TRACIP TRACIP, the data recovery and digital forensics expert, offers a unique methodology to clean up and recover data following a cyber-attack (compromised of computers and smartphones, infection of IT stock through ransomware). This process offers several advantages: On-site deployment in a couple of hours thanks to mobile, lightweight infrastructure, Back to normal within a couple of days, Preservation of evidence of the attack for compensation purposes (insurance claims, legal proceedings). GHALE, the next-generation emergency call platform Deveryware has developed GHALE, the platform that revolutionises emergency calls and offers greater connectivity between emergency mobile applications and public safety answering points. Thanks to the development of a new European standard, PEMEA - Pan-European Mobile Emergency Application, GHALE makes it possible to: Use its emergency mobile app, while travelling across Europe Have multilingual and multimedia communications with PSAPs: Location sharing, sending of photos and videos, chat Make video calls adapted to speech/hearing impaired people
From September 28 and 29, 2021, the International Security Expo 2021, the world’s premier government, industry, academia and end-user security event, returned for the first time in nearly two years. International Security Expo 2021 Co-located with the newly-launched International Cyber Expo 2021, the events welcomed thousands of security professionals, from all corners of the industry, including senior representatives from Heathrow Airport, British Army, Bank of England, Tesco Stores Ltd, BAE Systems, Chester Zoo, CPNI, Dell, Neptune Energy, Post Office, NaCTSO, DASA and the Embassy of Argentina. Furthermore, recently appointed Minister for Security and Borders, Rt. Hon Damian Hinds MP, was also in attendance and carried out a keynote speech, clearly demonstrating the importance of the event to the security sector. Global audience in attendance Reconnecting the market from far and wide, the international audience was made up of attendees from 36 countries Reconnecting the market from far and wide, the international audience was made up of attendees from 36 countries, including Israel, Italy, Sweden, Switzerland, Spain, Canada, Hong Kong, Singapore, Belgium and Australia. This included senior delegates from NATO - HQ AIRCOM, Germany, Government of Gibraltar, US Army RCCTO, New Jersey State Association of Chiefs of Police and the Embassy of the State of Kuwait. Reconnect and source new products The overwhelming feedback from visitors and exhibitors alike, proved a strong desire for the opportunity to reconnect, source new products and take advantage of in-person learning opportunities. Speaking about the appeal of the events, Harry Forsyth, Risk and Intelligence Analyst, Kings Secure Technologies, said “Both International Security Expo and International Cyber Expo are excellent events to reconnect with people in the industry, watch some great talks and broaden my horizons. The quality of the products exhibited was noticeable.” Covering a range of physical and cyber security solutions Fellow visitor, Rob Cochrane CSMP MBA, Security & Risk Consultant and Security Manager at Ferrero, also attended the show, to get a better understanding of what is currently on offer, across the market. Rob Cochrane said, “The show is great and has delivered everything I need. It's very broad, in terms of its sell, as there is plenty of material from physical measures to cyber solutions.” Rachael Shattock, the Group Event Director at Nineteen Group, said “The overwhelmingly positive feedback from visitors and exhibitors alike is testament to the reputation of the show, and the value it gives to all those who attend. We were delighted to see so many visitors and exhibitors, excited to be back at the show, reuniting with their peers.” Rachael adds, “The energy in the hall spoke for itself and the breadth of product launches further demonstrates how the industry has continued to focus on research and development, constantly innovating to improve our safety and security. We are already looking forward to a bigger and better event in 2022 and welcoming back many of our international exhibitions, and visitors, who were unable to attend, due to the COVID-19 pandemic.” Government supported international security event The specialist Government Zone was a key part of the exhibition The specialist Government Zone was a key part of the exhibition and demonstrated significant support from the UK Government and associated agencies. It provided a central meeting point for visitors, to network and discover the latest projects and plans for the future from exhibitors, including Accelerated Capability Environment (ACE), Border Force, British Transport Police, The Civil Aviation Authority (CAA), Counter Terrorism Policing, Defence and Security Accelerator (DASA), The Joint Security and Resilience Centre (JSaRC), The National Counter Terrorism Security Office (NaCTSO), The National Security Technology and Innovation Exchange (NSTIX), Police Crime Prevention Initiatives (PCPI), Research and Intelligence Support Centre (RISC), Security Industry Authority UK and UK Defence & Security Exports (UKDSE). Demonstrating the increasingly sophisticated smuggling techniques used for international drug trafficking, Border Force carried out a live demonstration of a seized Ford Kuga that uses a sophisticated magnet system to open a concealment area, within the rear of the vehicle. Firearms, security devices and door entry apparatus on exhibit Elsewhere, British Transport Police provided attendees with the opportunity to witness an experienced dog handler and a trained Explosive Search Dog demonstrate the capability and effectiveness of responding to these threats. Officers on the stand also highlighted a selection of equipment including firearms, less lethal devices, door entry apparatus and medical supplies, used to actively deter, detect and disrupt terrorist and criminal activity, across the railway network in London and other major cities. High-profile government officials offer insightful sessions In addition to exhibiting, several high-profile government officials took to the stage, to present insightful sessions, across the two days of the exhibition, including Mark Goldsack, Director DIT, UKDSE, Angela Essel, Head of JSaRC - Joint Security and Resilience Centre (JSaRC), Tracy Buckingham, Deputy Director Security and Cyber Security Exports - DIT UKDSE, Kevin Knappett, Cell Broadcast Delivery Lead Digital Infrastructure Directorate UK Government, DCMS UK GOV, and Shaun Hipgrave, Director Prepare, Protect, CBRNE & Science Directorate - Homeland Security Group, Home Office. Helping attendees understand the role of the government in advising and providing strategic support, Mark Goldsack, Director, UK Defence and Security Exports, spoke about the market intelligence available, for those businesses looking to do business abroad. He shared insights on the role of the UKDSE, in order to promote and encourage trade, provide information and analysis on the business landscape, in regions around the world, as well as to provide access to a network of trade advisors to UK businesses. Diverse make-up of the security industry critical to success Following Mark Goldsack’s session, Shaun Hipgrave, Director, Protect & Prepare, CBRNE and Science Directorate, HSG, Home Office, took to the stage. He highlighted the key priorities and areas of responsibility for Homeland Security in the United Kingdom, ranging from Borders and Aviation Security, CBRNE S&T, Protect & Prepare, as well as JSaRC, and stressed how the diverse make-up of the security industry was critical to its success. On day two of the event, there was a real buzz on the show floor, as it was announced that Rt. Hon Damian Hinds MP, recently appointed UK Minister for Security and Borders, would open the second day, with an exclusive keynote speech. Innovation, the key in ever-changing security threats Events, such as the International Security Expo and International Cyber Expo, bring the security community together During his address, Damian Hinds highlighted how events, such as the International Security Expo and International Cyber Expo, bring the security community together, to inspire and be inspired. He commented, “In the security field, you have to keep on innovating, because the threat, what we’re up against, keeps on shape-shifting and changing.” He reflected on the industry’s resilience, during the COVID-19 pandemic, its remarkable ability to innovate and the importance of a close working relationship, so as to achieve a safer and more secure society. Speaking post his keynote session, Damian Hinds added, “I think it’s really important for people to come together, to be able to learn from each other, to see what is happening and make connections and to work out how we can all work together to improve our safety and security.” Global Counter Terror and Serious & Organised Crime Summit The event’s free-to-attend and CPD certified educational programme saw over 90 inspiring sessions and 120 speakers deliver insightful sessions, across five theatres. The Global Counter Terror and Serious & Organised Crime Summit was packed out throughout the two-day event, with eager listeners regularly spilling out the door. One of the most popular sessions was delivered by Nick Bailey, retired Detective Sergeant involved in the Salisbury Novichok poisoning. Nick took attendees on an emotional journey, by talking through the events of March 4, 2018 and the impact it has had on his mental health, describing himself as ‘a different person, broken physically and mentally’. Session on coming to terms with trauma Discussing the uniqueness of it being a state-sponsored attack, he spoke to attendees about coming to terms with trauma, resilience and the damaging effect of losing control of many aspects of everyday life, which he has had to face. In another session, Philip Ingram MBE, Former Senior Intelligence & Security Officer and Editor in Chief, Figen Murray, Protect Duty Campaigner, and Aaron Edwards, Senior Lecturer at Royal Military Academy Sandhurst, sat on a panel to discuss the blurred lines between terrorism and organised crime. Session on terrorism and organised crime Moderating the session, Roy McComb, Director of Inquisitio Consulting Ltd and Former Deputy Director of the National Crime Agency immediately opened the session for attendees, to address questions to the panel, which ranged from - Are we spending too much money on terror and organised crime at the expense of other issues?, Should we negotiate with terrorists?, and How do we cut off the financial stream to terror and organised crime? Sponsored by Adani and Patriot One Technologies Inc., at the International Security Conference, speakers from British Transport Police, City of London, Imperial War Museums, HVM Advisors and more, provided attendees with insights, across CNI, transport and aviation, with day two turning to the night-time economy, public sector and major events. ‘The State of Aviation Security’ session In a session titled, ‘The State of Aviation Security’, Philip Baum reflected on the role of mental health In a session titled, ‘The State of Aviation Security’, Philip Baum of Green Light Limited and Coventry University reflected on the role of mental health, as ‘a major challenge to the industry’. Philip Baum spoke about the importance of behavioural analysis, describing this as, “The first and foremost measure we ought to be implementing to mitigate future threats, before reflecting on the new challenges brought about by the pandemic and introduction of social distancing in airport security screening.” Disaster & Resilience Conference Across the hall, in the Disaster & Resilience Conference, sponsored by Everbridge, senior leaders from Unilever, Joint Security and Resilience Centre (JSaRC), Ministry of Defence, Public Health England, and London Fire Brigade took to the stage to offer the audience actionable insights on responding to a crisis. In one session, Tony Thompson, Fellow, Institute of Civil Protection and Emergency Management helped attendees address how they should monitor and respond to events in real-time, use integrated technology solutions to drive greater efficiencies and cost savings, and finally deliver a unified security platform. Global Cyber Summit The inaugural Global Cyber Summit also welcomed major names in the field of cyber security. Tracy Buckingham, Deputy Director of Security & Cyber Exports at UKTI DSE spoke about the UK’s role in cyber and security capabilities, on the global stage and how collaboration between government, industry and academia, a trio she described as ‘the cornerstone of the UK’s approach to cyber security’, is vital to the strength of the UK’s cyber security industry. Elsewhere, Professor Ciaran Martin CB, Oxford University, and Former Chief Executive Officer (CEO), National Cyber Security Centre, delivered a session on the current cyber threats and priorities. Underpinning Martin’s speech was the belief that people have unconsciously polluted the cyber environment, resulting in the need for a rethink, to make it a safer place to inhabit. During his session, he explored five key areas that required change, namely, people, money, rules, technology, and skills. Platform for product innovation and latest launches With globally renowned exhibitors coming together under one roof, visitors perused the stands of the likes of Adani, Marshalls, Audax Global Solutions, Bastion Security Products, Leidos, Patriot One, Rapiscan Systems, HS Security Group, PointWire, Pitagone, Smiths Detection Group, Tripwire, Heras, Leonardo, Apstec systems, Jacobs, Astrophysics, Intqual and Mitie to source a wide range of security products and solutions. The show floor was recognised as a hotbed for innovation, with many exhibitors taking the opportunity to launch new products. Apstec Systems showcased version 4 of its Human Security Radar that combines a sleek design, smaller footprint For example, Apstec Systems showcased version 4 of its Human Security Radar (HSR V4) that combines a sleek design, smaller footprint and improved mobility with enhanced AI, additional detection capabilities and flexible integration. Meanwhile, Everbridge showcased its Global Critical Event Management (CEM) certification programme, with formalised standards for assessing an organisation’s enterprise resilience. As well as showcasing its range of protective street furniture options, Marshalls Landscape Protection (Marshalls) used the event to launch its new seating range, Verso. The full range has been tested to IWA14-1 using a 1.5 tonne M1 vehicle and a 7.2 tonne N2A vehicle travelling at 30mph. It can be used to create a variety of configurations that blends seamlessly into all environments. Lochrin Combi SL2 fencing system on exhibit Meanwhile, Lochrin Bain introduced its industry disrupting B3 (SR2) rated fencing system, Lochrin Combi SL2. The fence offers the same attack delay times as other systems of the same level, but no specialist tooling or training for installers, and security professionals. Elsewhere, Bastion Security Products announced the launch of its new single and double steel doorsets, which feature BastionCORE attack resistant materials, to mitigate cut through and cylinder guard removal attacks. Rebecca Hughes, Country Marketing Manager (UK) at Heras, said “Heras was delighted to be a Premier Partner Exhibitor at the ISE and support an event, where the UK security industry could come together, showcase the latest innovations in physical and cyber security, and discuss key issues, where effective security can be beneficial for UK plc.” Rebecca Hughes adds, “We are delighted that our new innovations were so well received at the show and generated strong interest. We expect this to translate into a strong order book.” Solutions to meet new cyber security risks The inaugural International Cyber Expo also played host to new launches, for example, a solution from Senetas Corporation that allows employees to download files from the web without risk or hidden threat. Votiro Secure File Gateway leverages patented Positive Selection technology for anti-malware and anti-ransomware protection, while preserving 100% file functionality and user workflow. Chris Pinder, Chief Operating Officer, IASME Consortium, said “This has been a great show for IASME. We’ve had both the quantity and quality of visitors we’d hoped for, with a great range of people representing our client base. We are looking forward to following up on some promising leads and interesting contacts.” Catherine Craig, Channel Manager at 3M added, “We’ve had consistently good engagement and conversations on the stand. It’s been so helpful to be able to tap into a wide range of different markets and people all in one place. It’s been a great show and we’ve already signed up to return in 2022.” Products under the spotlight Attendees also snapped up the opportunity to take a deep dive into the latest new launches Attendees also snapped up the opportunity to take a deep dive into the latest new launches in the Product Innovation Theatre. Here, exhibitors, including Exeon Analytics, Census Labs, Robin Radar, 3M Privacy Solutions, Heras, Safetyflex Barriers and Smiths Detection, took to the stage to deliver a range of insightful sessions. For example, Christoforos Papachristou, Strategic Account Manager for Census Labs provided attendees with insights on how the Internet of Security Things, a network of sensors, wearables, and IoT devices that use cloud and edge computing, create a cohesive security force. On day two, Jeremy Tettmar, Sales Manager, Safetyflex Barriers revealed the next generation of crash rated street furniture from ultra-slim profile, shallow mount anti-terrorist bollards to cost-effective, large perimeter Hostile Vehicle Mitigation (HVM) equipment. Live and interactive demonstrations Visitors were also able to witness these products and more in action across a number of live, interactive demonstrations and within specialist zones. The LPCB Live Testing Lab gave visitors the opportunity to witness a team of professional forced-entry specialists, attempt to break through physical security products, including mesh fencing systems from the likes of ARX and Fastline, key safes from Burton Safes, glazing units from Selectaglaze, hinged gates from Lochrin Bain, turnstiles from Frontier Pitts and Eagle Automation, and more. At the International Cyber Expo, the realities of a cyber-attack also came alive with a number of interactive features. CrisisCast in collaboration with Cyberprism carried out a theatrical live cyber-attack on a high-tech revolving stage. Cyberprism’s role in a live cyber-attack situation We’ve had some great conversations and will be leaving the show with some really strong leads" Brian Mitchell, Lead Producer, CrisisCast, said “It’s been great to see both visitors and fellow exhibitors embrace the essential role that storytelling has, in engaging with audiences and demonstrating the role that Cyberprism plays ,during a live cyber-attack. Presenting an immersive demonstration, which brings to life the real-time battle between defender and attacker, has been a great way to impress clients with how the software works. We’ve had some great conversations and will be leaving the show with some really strong leads.” Visitors were able to engage in the dialogue from both sides of the attack and understand the psychology and motivating factors from two perspectives at one - the attackers and the entity’s boardroom. Elsewhere, Cyber Griffin offered attendees a NCSC certified, immersive training experience through its award-winning tabletop exercise designed to explore the decisions that people make to protect their businesses from modern-day threats. The perfect place to network The event’s international hosted buyer meeting programme enabled senior buyers, from around the globe, to come together and do business, regardless of travel restrictions. In conjunction with the Department of International Trade’s UK Defence & Security Exports, the free-of-charge personalised match-making service gave qualified buyers, an exclusive space away from the show floor, to speak to hand-picked solution providers. The sessions ran both virtually and physically to meeting all needs. Rachael Shattock, Group Event Director at Nineteen Group, added “I can’t describe how fantastic it feels to reunite the whole security industry face-to-face, after over 18 months without a physical event, and provide a platform to network, learn and discover the latest security solutions from the world’s leading suppliers. This year is also particularly special as we successfully launched the first International Cyber Expo with its own dedicated Global Cyber Summit conference programme, interactive activities, and a raft of top suppliers.” International Security Expo and International Cyber Expo will return to Olympia London, in London, United Kingdom, from September 27 - 28, 2022.
Device Authority, a globally renowned company in identity and access management (IAM) solutions for the Internet of Things (IoT), has announced its latest major software release, which includes KeyScaler Edge software solution. The current global market is driving a more mature Edge computing model, with localised AI (Artificial Intelligence) and ML (Machine Learning) becoming more mainstream. However, no solution exists in the market, to address localised Edge gateway IoT security services. Automation for efficiency in Edge IoT deployments Organisations require automation for Edge deployments, in order to drive efficiency at IoT scale. This includes: Security lifecycle management Device bound identity Leaf device authentication and authorisation to edge gateways Zero touch on-boarding and registration Automated credential management Security compliance and regulatory adherence Safety, confidentiality, data theft/privacy, brand reputation and revenue protection is important for edge deployments Additionally, organisations still need to meet compliance and regulatory adherence, for private local network deployments. Safety, confidentiality, data theft/privacy, brand reputation and revenue protection are important for edge deployments. “We’re delighted to bring KeyScaler Edge to the market and help our customers, with their IoT edge deployments. Our BETA programme has been a success within healthcare, retail and transport sectors, and we’re regularly speaking with companies, who have experienced similar challenges and see KeyScaler Edge as the solution,” said Darron Antill, the Chief Executive Officer (CEO) of Device Authority. KeyScaler Edge KeyScaler Edge is the first device, identity-centric IAM (identity and access management) solution, to address the complex end-to-end challenges of IoT security lifecycle management, at the Edge. It is a lightweight version of KeyScaler, which is created specifically for Edge nodes, with the ability to register, authenticate and provision certificates, and tokens, to devices in the local network, independent of an available internet connection. “KeyScaler Edge gives technical, security and operations teams, the confidence that their IoT devices won’t lose robust security when no connection to the Cloud is available,” said James Penney, the Chief Technology Officer (CTO) of Device Authority. Central visibility of Edge James Penney adds, “We’ve developed the functionality to support any public and private CA, as well as provide central reporting and management of all certificates, and central visibility of Edge, and Leaf Node relationships. As Edge becomes more mainstream, customers are asking for online and offline capability, and for KeyScaler to solve the associated security challenges.”
Recent cyber-attacks have disabled and even shut down physical assets. Robust foundational security and training staff, able to recognise an attack can help mitigate the threat, as ABB’s Rob Putman explains. Edge devices and data analytics As cyber security specialists, we must navigate an ever-changing threat landscape, one that is made even more complex by the increased interconnectivity between Operational Technology (OT) and Information Technology (IT), as companies look to leverage edge devices and data analytics, as well as remote connectivity, in the wake of the COVID-19 pandemic. As the threat surface evolves, the industry must guard against attacks on key physical infrastructure, carried out by a range of malicious actors, including nation states and criminals intent on blackmail. The chemicals sector, a high-value target for cyber-criminals Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost In 2017, not long after a ransomware attack that targeted Maersk, the world’s largest shipping firm, made the news around the world. Another cyber-attack, this time targeting physical industrial assets, generated fewer headlines, and yet could have resulted in both real, as well as financial, damage. Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost, both financial and reputational, to the operator, should production be interrupted or stopped entirely. Cyber security vulnerabilities put physical assets at risk The attack in question, a ‘Triton’ custom malware attack on a petro-chemical facility in Saudi Arabia, targeted a safety system, taking over system controllers. Bugs in the code triggered an emergency shutdown, but could have led to the release of toxic and explosive gases. It was a vivid reminder of how cyber security vulnerabilities are increasingly putting companies’ key physical assets at risk. Two more-recent high-profile incidents illustrate my point. In February, a Florida water treatment plant was hacked. The malicious actor remotely accessed the system for three to five minutes, during which time they opened various functions on the screen, including one that controls the amount of sodium hydroxide (NaOH) in the water. The hacker changed the NaOH from about 100 parts per million to 11,100 parts per million, which could have resulted in a mass poisoning event. Colonial Pipeline cyber-attack incident Then, in May, the Colonial Pipeline system that originates in Houston, Texas and carries gasoline, and jet fuel, suffered a ransomware attack. Using a VPN, hackers targeted back-office IT systems, forcing Colonial to shut down IT hosts and network infrastructure, severing communication with those OT systems that are responsible for communicating ‘transactional data’ associated with fuel delivery. In this instance, a single compromised password disrupted Colonial’s ability to invoice its customers. This dependency on OT data stopped pipeline and business operations, and the company was elected to pay the hackers an initial ransom of US$ 4.4 million, in order to restore operations. The Colonial attack was multi-dimensional, in that it not only impacted Colonial’s business, but also the wider US economy and national security, since the pipeline transports nearly half of the east coast's fuel supplies. Outdated IT system elevates physical risk The increased interconnectivity between IT and OT can also create vulnerabilit Attacks such as these prove that, armed with little more than a laptop, an email account and access to the dark web, determined hackers can cause disproportionate damage to physical infrastructure. As mentioned at the outset, the increased interconnectivity between IT and OT can also create vulnerability. Producers often want to know: Is it risky to connect a production asset or their operational environment to the Cloud? My answer is, if you do so without having done any risk audits around people, processes and technology, or without enhancing and maintaining that environment, then yes, that is risky. For example, we often observe that the life cycle of a production asset far outlasts the IT systems that are used to run it. Take a cement kiln. Several generations of plant operators may have come and gone, but that asset may still run, using legacy software, such as Windows XP and why not? Need to replace aging distributed control systems Well, that’s fine, if you are not concerned about having that asset compromised, and all that entails. A ‘flat’ IT network, an aging distributed control system, and machines with legacy versions of Microsoft Windows, all these elements, which are still commonplace in many industries, make it much easier for attackers to find and infiltrate a company, without needing sophisticated tools. The age-old mantra of not interfering with a piece of equipment or software that appears to be working, often applies to the individual assets. For example that cement kiln that are still controlled by the same Windows XP-based control software. However, if we’re honest, things have changed quite a bit, not because something was broken, but because innovation came in. That same kiln control system is most likely connected to other systems, than when first commissioned and that opens it to exposure to threats that it was never designed for. The human element There is a misconception that IoT-connected devices can open companies to risk There is a misconception that IoT-connected devices can open companies to risk, but many recent, high-profile cyber-attacks have been conducted from a laptop, by hacking someone’s VPN, or are a simple phishing/malware attack. In all these cases, the human element is partly to blame. Take the Florida attack. The compromised computer at the water treatment facility was reportedly running an outdated Windows 7 operating system and staff all used the same password, in order to gain remote access via the Teamviewer app, which the hacker was then able to use. Physical and human assets, key to robust cyber security Discussion on the best way to mitigate the threat is often framed solely around specific technical solutions and ignores the fact that robust foundational cyber security is really driven by two very different, but equally important, types of capital: physical assets (e.g. production machinery), and human assets. The truth is that smart digital software and industry-renowned cyber security applications, while critical, are in many cases, only as good as the weakest human link in the chain. Industry would, therefore, do well to ask itself the following question: Do we have a security problem, or a complacency problem? At this juncture, it is important to point out that the majority of companies that ABB works with, are at least aware of the threat posed by cyber attackers, and the potential impact of an attack, on their revenues, reputation and bottom line. User error and human-generated exposures Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital However, user error and human-generated exposures are where most of these attacks occur. Those human failures are mostly not due to malicious intent from employees, but to the lack of training of the employees on secure behavior. Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital. However, there are also age demographics at play here. Much of the operations employee base is heading towards retirement and often, there is no plan or ability to backfill these people. Need to invest in new digital and automated technologies If you think you don't have enough people now, in order to stay on top of basic care and feeding of the OT environment, with regards to security, what is that going to be like in 20 years? For this reason, there must be a major industry reset, when it comes to its workforce. Companies must invest in new digital and automated technologies, not only to ensure that they stay ahead of the curve and mitigate risk, but also to attract the next generation of digitally literate talent. Robust cyber security is built on solid foundations When we talk about foundational cyber security, we mean fundamentals, such as patching, malware protection, high-fidelity system backups, an up-to-date anti-virus system, and other options, such as application allow-listing and asset inventory. These basic controls can help companies understand their system setup and the potential threats, identify vulnerabilities, and assess their risk exposure. The Pareto principle states that around 80% of consequences come from 20% of the causes. In the context of cyber security, that means 80% of exposure to risk comes from 20% of the lack of security. If companies do the foundational things right, they can manage out a significant amount of this risk. Importance of maintaining and upgrading security controls However, having basic security controls, such as anti-virus software in place, is just the first step on that journey. Equally important is having someone within the organisation, with the requisite skill set, or the extra labour bandwidth, to operate, maintain and update those security controls, as they evolve. Educating, training and recruiting existing employees, and the next generation of talent, along with forging partnerships with trusted technology providers, will ensure that industry can leverage the latest digital technologies, in order to drive business value, and secure physical assets against cyber-attacks.
The COVID-19 pandemic is only accelerating the expansion of Automation, Robotics, Machine Learning (ML) and Artificial Intelligence (AI), and changing how people live their daily lives. This expansion leads the way with technologies that are developed to solve problems, improve operations, streamline processes and assist people, to focus on learning new skills, creativity, and imagination. Transformation of the physical security industry One of the latest industries to be permanently transformed is physical security. The era of utilising security cameras is slowly changing into more advanced and more efficient technological applications - security robotic solutions. SMP Robotics is a California-based company, which is a pioneer in developing robotic technologies, powered by AI, to assist, improve and deliver on new expectations in today’s world. One of their services is smart surveillance systems. This represents a proactive approach to security. The company, SMP Robotics’ Founder and Chief Executive Officer (CEO), Leo Ryzhenko, stated “Autonomous robotic technologies will become a driving force in future security solutions.” Robotics and AI in autonomous security solutions The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards The company uses robotics and AI technology to implement autonomous security solutions, which reduce liability and overhead, as well as improving the quality of services. Robotic guards are capable of patrolling all types of facilities, in both urban and rural contexts. The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards. The inspection robots, deployed by SMP Robotics, are easily integrated with many existing security technologies, armed with obstacle avoidance and anti-collision measures, automatically recharge, and can recognise faces up to 50 metres. As the world grows increasingly complex, technology like this is essential to ensure safety for all. AI-enabled autonomous video monitoring ground vehicles The advancements in technological breakthroughs of SMP Robotics position the company and its AI-powered, autonomous video monitoring ground vehicles, to be the most adaptable to any industry, cost-effective for clients’ business needs, in providing various types of services from public safety, crime prevention, to asset protection and physical security. SMP Robotics continues to implement new innovative solutions and groundbreaking technologies in its latest generation of autonomous models. Currently, many were already deployed or in a process to be delivered to a number of key clients, in various industries throughout the globe, from oil & gas, nuclear power plants to data centers, healthcare facilities, and amusement parks. Smart security robots Tal Turner, the Vice President (VP) of Business Development and Partnerships, SMP Robotics, said “We provide autonomous, artificial intelligence, all-weather, all-surface, smart security robots that are turnkey and operate independently on their own, using real-time obstacle avoidance, face recognition, and other cutting-edge technological advancements.” According to Coherent Market Insights, the Robots as a Service (RaaS) market direction will grow by 15.9% by 2028 and reach the threshold of 41.3 billion dollars. SMP Robotics stands at the forefront of the security robotic revolution, making an impactful change to make the world a safer place.
Schools were never designed and built with social distancing in mind. So it’s perhaps not surprising that as children returned to schools for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head teachers are considering taking learning and large gatherings, such as assemblies outdoors, when possible. Managing ‘class bubbles’, hygiene and ventilation While Dr. Yvonne Doyle, the Medical Director of Public Health England (PHE) has publicly reassured parents that schools are not the ‘drivers’ or ‘hubs’ of COVID-19-19 infection in communities, there is a lot of pressure on school leaders to manage ‘class bubbles’, extra cleaning and hygiene, ventilation, and COVID-19 testing, to protect families and staff. It’s a logical step to switch, in certain circumstances, to outdoor activities where fresh air is on tap, and social distancing is far easier to manage. Specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms, which had been growing in popularity, even before the pandemic. These facilities offer numerous benefits as an extension of existing learning spaces and provide children the opportunity for hands-on learning, beyond a stuffy classroom. However, if outdoor spaces are routinely called upon as part of COVID-19 contingency planning, how can schools ensure that their outdoor classrooms and wider areas are secure, robust, and fit for purpose? When specifying outdoor classrooms and learning spaces, it’s essential to take into account the well-being of the students and staff, who will use them, noise pollution and acoustics. Most importantly, education managers need to ensure the surrounding area is secured and adequately protected from threats, including terrorism. Perimeter security measures for schools How can schools and nurseries secure their perimeters, so that outdoor learning is totally safe for all? A starting point is to seek out architects and suppliers, who have a good understanding of security standards. Worryingly, Jacksons Fencing’s research recently found that only one-third of architects are seeing both LPS 1175 and the UK police initiative, Secured by Design (SBD) physical security standards, specified for schools. This highlights a lost opportunity for architects to propose solutions that are appropriate to the level of risk and needs of the school, without turning the site into an unwelcoming fortress. Helping schools identify specific security needs Head teachers would be wise to work with architects, who not only know the latest security standards inside and out, but are also are willing to play a more advisory role, helping the school identify exactly what is needed. Head teachers should prioritise solutions appropriate to their site’s specific risks It’s also vital that architects don’t simply replace existing fencing and gates, with the same security systems that have been in place for years. Instead, they will need to meet changing needs and risks. Our research finds that teachers often report issues, with the school perimeter and gates, from being climbed over (28%) and causing injury, to gates not locking properly (10%). Head teachers should prioritise solutions appropriate to their site’s specific risks, which sometimes require altering of existing measures. School fencing is an important aspect of any education site. As well as defining its boundary and making a visual distinction between public and private property, the fencing and gates that surround and secure a school, will typically meet a wide variety of other important criteria, including preventing unauthorised entry to the grounds, protecting pupils, staff, and visitors from accidents and injury, deterring theft and anti-social behaviour, and reducing the risk of malicious damage, and acts of terrorism. Welded mesh panels for perimeter fencing Popular options for schools include welded mesh panels for perimeter fencing or sports areas, and railing systems to act as demarcation, in order to control foot and car traffic. Within the outlying boundary, barriers, bollards and parking posts will keep pedestrians, and vehicles safe from each other, while timber fencing and gates can be designed to control the flow of people, around the grounds and reduce the areas, where students can be hidden from view. Automated gates and access control Perimeter fencing must be complemented with safe entrances and exits for vehicles and pedestrians. Every school has unique entry-control requirements, determined by factors, such as size, location and the local environment. These needs influence the decisions you make, when preparing technical specifications for school security gates. Do you require gates to be steel or timber, manual or automated, single or double leaf? Specialist suppliers will be in the best position to offer inputs on school gates, which typically need to offer solid security and durability, with a welcoming aesthetic. Specifying access control system When specifying a school access system, it’s important to consider the areas of the school When specifying a school access system, it’s important to consider the areas of the school, such as sports fields, car parks, and children’s play and learning areas, and whether it requires playground segregation. Selected gates should meet the design of the fencing, to create a secure perimeter with no weak points, with automated gates conforming to all current safety regulations. . Noise pollution can be a problem as well, including noise coming in or leaving the school in residential areas. If more teaching is to be carried out outside, it’s worth considering acoustic barriers to reduce noise in and around the school. Timber acoustic barriers for security and privacy Timber acoustic barriers offer security and privacy, and can reduce noise levels, by as much as 32 decibels (in laboratory conditions), so are ideal for city centre schools or those located close to busy highways. There are many ways to build an outdoor classroom. Timber products can help to create a welcoming environment, such as wooden shelters, pergolas, fencing, and decking. Always check that high quality timber, ideally guaranteed for 25 years against rot and insect attack, is being used to provide an attractive, cost-effective, safe and sustainable solution, for all weather conditions. DBS approved installers And of course, installers must be DBS approved, so that they can install outdoor classrooms, during school holidays, or within term time, with minimal disruption. The COVID-19 pandemic had a huge impact on schools and learning. While nobody wants to think of fresh outbreaks of the infection, or any other virus, installing an outdoor classroom made from high-quality, long-lasting materials is a great way to future-proof school learning and ensure safety, and preparedness. Putting extra thought and care into the security angle will provide schools with decades of protection against a host of unforeseen events.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organisations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organisation, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organisation’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organisations to check whether drivers are licenced and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organisation is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organisation. This includes fraud, bankruptcy, poor business practices, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licencing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilising software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernise legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Type of site: Grade A multi-tenant office Location: The Bailey, 16 Old Bailey, London, UK Site size: 115,000 sq. ft over ten floors Client needs: Easy access for users Touch-free and digital sign-in Free flowing movement through reception, avoiding crowds and queues Fast access to other floors via lifts Visitor management system that can be used by multiple tenants and reception staff easily Secure and clear intercom/entry phone and door automation for out-of-hours, deliveries and trades people access Easy access and parking for disabled users Reliable and resilient security, including CCTV monitoring of strategic locations Integriti intelligent integrated access control system Inner Range’s enterprise-level intelligent integrated access control system, Integriti, provides robust security, as well as seamless integration, to an array of other building management systems. Some of the key features of Integriti include: Easy to use proximity card entry for users and tenants Forge Bluepoint, powered by Yardi, visitor management system to create secure, but easy to use credentials for visitors, including via smartphone High-level lift integration, by Mitsubishi that reads user credentials and directs users to the quickest lift, for their desired destination Integrated CAME BPT video entry phone and access control to automate doors, for disabled access near dedicated parking bay, for disabled users, as well as for out-of-hours access, deliveries and trades people Hard-wired IP closed circuit television system (CCTV) with Hikvision cameras, to monitor strategic locations End-to-end encrypted messaging, through every interface and integration, by Inner Range’s Integriti for high-level security Provision for future entry turnstiles/speed lanes Richard Harvell, Engineering Director at Knight Harwood, who managed the refurbishment at The Bailey, said “Our key requirement was to be able to move users, including visitors, swiftly through reception, to their correct floors, with minimal or no touch points. And, all of this, without compromising security.” High-level lift integration Antron Security’s solution, centered on Inner Range’s intelligent access control system, Integriti" Richard Harvell adds, “Antron Security’s solution, centered on Inner Range’s intelligent access control system Integriti, more than delivers. The high-level lift integration automatically directs users to the fastest lift for their floor and only allows access beyond reception, for those with bona fide credentials. We have been impressed with Integriti’s sophistication and integration capabilities, as well as Antron Security’s expertise and diligence in designing and installing our bespoke access and security system.” The Client - The Bailey UK property firm Endurance Land, which is a member of the Hong Kong-based property conglomerate, Nan Fung Group, owns The Bailey. The property, which is situated directly opposite the famous Old Bailey High Court in London, was originally built in the early 20th Century for the Chatham and Dover Railway Company. Its Grade II listed Edwardian Baroque façade features classical reclining figures, while a larger ‘western extension’ was built in 1999, to modern city office standards. Knight Harwood commissioned for refurbishment Knight Harwood was recently commissioned to refurbish the whole site, along with architect, Orms and building design consultancy, GDM Partnership. The commercial site meets Grade A office specifications and offers exceptional internet reliability, and speed for tenants. It achieved a platinum connectivity rating, by WireScore, the Mayor of London’s digital connectivity rating scheme, in 2020. Sophisticated access and security management system A new and sophisticated access and security management system was part of the refurbishment brief. Knight Harwood stipulated an access and security management system that would ensure a free flow of users and tenants through reception, without crowding or queues. This would need to include integrating intelligent lift controls, so as to ensure users were swiftly taken to their designated floor, as well as a good visitor management system that all tenants could use, without the need for a central security team to manage requests. Touchless access and digital sign-in for users Touchless access, as well as digital sign-in for users was also important for the client Touchless access, as well as digital sign-in for users was also important for the client. An intercom or entry phone and access control operated doors were needed for disabled users, who would be accessing the building from the dedicated disabled parking bay, as well anyone arriving ‘out of hours’, or for trades people and deliveries. High-levels of physical and cyber security were needed to keep all legitimate users and the site safe, without hindering access. CCTV monitoring would be needed in strategic locations. Future proofing, including laying under-floor cables ready for entry turnstiles/speed lanes, was desired. Antron Security managed the project Antron Security project managed the design, supply and installation of the access control and security system for The Bailey and acted as the ‘go to’ contact for Knight Harwood. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 30 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI and Safe Contractor approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Bespoke security solutions Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for The Bailey. Inner Range has been a globally renowned company in the design and manufacture of intelligent security solutions, since it was established in 1988. Inner Range systems have been installed in over 25 countries. Its flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls, for single sites through to global estate portfolios. Key integration Inner Range’s powerful Integriti intelligent access control system integrates with Mitsubishi’s high-level lift controls Inner Range’s powerful Integriti intelligent access control system, known for its breadth of integration options, integrates with Mitsubishi’s high-level lift controls and Bluepoint’s visitor management system, to ensure all users and visitors can access their floors, and designated areas with ease. The Mitsubishi lifts are able to read credentials from proximity cards, or mobile phones, at a user check-in point, at the reception, or in the lift lobby itself. High-level lift controls to reduce crowding and queues The high-level lift integration with ‘destination control’ means the lift software takes into account, where each of the building’s lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. The user is immediately directed to the most efficient lift via a display screen at reception, or in the lift lobby. If users are able to go to more than one floor, they can update their preference in the lift itself. This integration ensures users move through reception quickly and efficiently, with no unnecessary stops. Fully integrated visitor management Inner Range’s Integriti intelligent access control system also allowed Bluepoint’s visitor management system to integrate with the Mitsubishi lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint An email is generated and sent to the visitor’s inbox, where they can create a mobile QR code pass and save it to their smart phone wallet When the visitor arrives, they use their mobile phone to scan the QR code in the Bluepoint invite, at the reception desk to check-in The reception team can then direct them to the Mitsubishi lifts, which display the lift car that they need to get to their meeting To leave, the visitor presents their QR code at the lift or door reader, which tells the system they’re leaving The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system CAME BPT entry panels and video intercom system The QR code gives the visitor the ability to access everything they will need, including the lifts and any locked doors en-route. The integration between Integriti and Bluepoint’s visitor management system was achieved using the Bluepoint API. Bluepoint is cloud-based, hosted on the Microsoft Azure platform. CAME BPT entry panels were installed to allow disabled users to access the building, near the dedicated disabled parking bay, as well as for any visitors entering the facility out-of-hours, to contact the security team, or for deliveries and trades people to use, in order to access doors at the rear of the building. The entry panels allow for a reliable and intuitive video entry intercom system. Hikvision CCTV cameras installed CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP CCTV system CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP closed circuit television (CCTV) system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view, in response to alerts and footage can be viewed together with additional information from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener and more energy efficient sites, by tracking how tenants use the building, and amending heating and lighting settings, as a result. Integriti also provides trace reporting, that can identify a user’s movements, if they have become unwell and identify who else has been near them. System benefits for users include: Touch-free entry and digital sign-in for users and visitors No unnecessary stops for users on their way into the building Reduced risk of crowding or queues in reception area Easy to use visitor management system Robust security that doesn’t impinge on access Future proofing with cabling provision for speed lanes/entry turnstiles in place
Foreign embassies are an essential part of establishing and maintaining peaceful cooperation, and collaboration between countries all over the world. They can also be the focus of tensions, peaceful and violent protests, terrorism, and many other risks, which mean that thorough and effective security solutions are essential to keep people, property and sensitive documents safe. Foreign embassies Usually located in capital cities, each foreign embassy is the workplace and often residence, of a Country Ambassador. They are used for important diplomatic meetings, holding events, hosting VIPs, and a range of other activities that focus on the political, cultural and social relationships with the host nation. In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations, during times of trouble. G4S security services in Jordan “Anywhere in Amman, where a foreign embassy has outsourced their security, you can be certain that G4S is the company they have come to,” said Ashraf Abul-Hajj, the Managing Director of G4S in Jordan. Ashraf Abul-Hajj adds, “We’ve been doing this for decades and have excellent, long-standing relationships providing security for many embassies in the capital city. We secure over 30 embassies at the moment, and we’ve been working with some of them for over 20 years.” In fact, it was a small Jordanian security company, called Safe and Sound (now under G4S), which started to provide embassy security in Amman, Jordan, all those years ago, before it became a part of G4S, in 2004. Embassy security services G4S now provides a wide range of services to the embassies that it secures in Jordan. These include manned guarding, installing and maintaining security systems, such as CCTV, access control and alarms, secure escorting for VIPs, during their visits, with G4S vehicles and highly-trained drivers, and coordinating security for events, which are being hosted at the embassy. “The main purpose of most of our security solutions is to ensure that nobody gains access to an embassy, who shouldn’t be there,” said Ashraf Abul-Hajj, adding “There are a lot of different risks that embassies face - big and small. Terrorist incidents, while very rare, remain a threat, so our security teams are trained to be vigilant and notice any suspicious behaviour.” Securing embassies during protests Protests at embassies are more common, when people disagree with the actions of a specific country" Ashraf Abul-Hajj adds, “Protests at embassies are more common, when people disagree with the actions of a specific country. Protests, even peaceful ones, are volatile and have the potential to turn violent, so our security officers and systems are there to monitor tensions, continuously assess the risk levels and prevent breaches.” Terrorism and protests are the more extreme examples of security threats, but day-to-day G4S security teams also deal with lower level threats that still need to be managed sensitively and professionally. Preventing breaches Ashraf Abul-Hajj stated, “People try to access their foreign embassies for a variety of reasons, often at times of personal stress or hardship, and can become distressed, and even aggressive, if they are not permitted to enter.” He adds, “Sometimes, we have to deal with very unusual scenarios. At one embassy, a man turned up saying that he had been informed by the embassy that he had won a competition and he was visiting the embassy to collect his cash prize. It was obvious to the team that he was the victim of a con, but his behaviour became very challenging, when he realised this and could not gain entry. Our security officers had to try to calm him down, while stopping him from entering the embassy, without consent.” Ashraf Abul-Hajj concludes, “This shows how varied the challenges facing our teams at foreign embassies can be. An embassy can be peaceful for a long time, but it can only take one negative news story or a single social media post, to spark a significant protest. With our security systems, highly trained security officers and extensive experience, G4S is more than prepared to meet those risks. We are proud to deliver such an important service, keeping foreign embassies safe and secure in Jordan.”
Smiths Detection, a globally renowned company in threat detection and security inspection technologies, has secured a contract with Japan Customs, to provide two Hi Energy 9 MeV, interlaced, dual view HCVS high-performance cargo inspection systems for screening trucks and cargo containers, to Tokyo Customs, at Jyonanjima and Kobe Customs, at Mizushima, in Japan. Installations will start in April 2022. HCVS X-ray screening system This improved HCVS X-ray stationary screening system utilises a new upgraded conveyor mechanism, which optimises security checks, by scanning whole trucks (cabin included), containers, and vehicles for threats and contraband. The HCVS reduces the need for manual inspection while producing rapid and reliable results With the ability to discriminate between organic and inorganic materials, the HCVS reduces the need for manual inspection, while producing rapid and reliable results. It is already deployed at various ports, across Japan and at international ports, such as Belgium’s Port of Antwerp and Israel’s Haifa Port. Japan, major importer and exporter of goods Japan is the world’s fourth largest importer and exporter of goods, making trade essential for the country’s economy. In August 2021, imports and exports rose by over 20 percent, on a year-on-year basis, as Japan’s economy continues to recover from the impact of the COVID-19 pandemic. “As the volume of goods and trade increases globally, being technologically innovative is vital for establishing trust between stakeholders and maintaining the flow of goods, through our local and global markets,” said Kevin Davies, the Global Director of Ports and Borders for Smiths Detection. Ease of trade and securing movements of cargo Kevin Davies adds, “Smiths Detection is proud to support Tokyo and Kobe Customs, in creating the safest port environments possible. With state-of-the-art technology and our global team, we look forward to strengthening the region’s ease of trade and securing movements of cargo, around the world.”
There is a saying that ‘Everything is Bigger in Texas,’ and the Dallas police department fits the bill. The Dallas Police Department is the ninth-largest municipal police force in the U.S., with 3,099 sworn officers and 598 non-sworn staff. It is led by Chief of Police Edgardo (‘Eddie’) Garcia. In the last several years, the Jack Evans Police Headquarters building (named after the 53rd mayor of Dallas) has been upgrading its physical security using a layered approach to ensure the safety of officers and visitors 24/7. The most recent addition is a brand-new fence line fortified with vehicle gates and Boon Edam Turnlock full height turnstiles to control pedestrian access into secured parking areas. Isolating potential hazards The Jack Evans Police Headquarters building was built in 2003. The six-floor facility has 358,000 square feet and is spread over a three-acre site, with a separate 1,200 car parking garage and a two-acre, open parking lot for additional police and visitor parking. In an average month, there are 5,000 public visitors to the Jack Evans building The Headquarters building was under construction when 9/11 terrorists flew airplanes into the World Trade Buildings in New York. Therefore, security was a concern in its original design. Police officials worked with a Police Design Consultant – McClaren, Wilson, and Lawrie Architects of Phoenix, AZ – to help design the building to resist a terrorist attack and isolate potential hazards. The building also needed to control visitor traffic and access. In an average month, there are 5,000 public visitors to the Jack Evans building. Conducting security assessment After midnight on June 13, 2015, a 35-year-old male placed a duffle bag with a remote-controlled bomb to detonate later between cars in the parking lot of the headquarters building. The suspect then began shooting continuously at the lobby windows with a rifle. Officers responded to the scene, a vehicle chase began, and the incident ended outside the city. Fortunately, officers in the lobby took cover and were not injured. Following that incident, the Dallas Police Department conducted a security assessment of the building, and also at seven patrol stations throughout the city. The assessment included testing various construction materials for bullet resistance to various types of weapons. Gensler Architects and Guidepost Solutions, LLC developed the solutions and plans. Paul M. Schuster, Senior Corporal/Facilities Management, was responsible for managing the implementation of the security upgrades. Present outright attack The police officers and staff only want a place that is safe and where they can do their good work" “The police tend to be a symbol of government and some citizens see that as a visible target to lash out at,” says Schuster. Police officers are trained to expect the routine types of calls, such as domestic violence, traffic accidents, and other crimes. “Yet they must be flexible to anticipate the non-routine that can be dangerous and change in a heartbeat. Yesterday we were concerned about handguns, today we are worried about rifles, and the idea of terrorism is always present with outright attacks or bombs. The police officers and staff only want a place that is safe and where they can do their good work.” Public records service Layer 1 – Upgrading the Building’s Lobby Security with Detection and Prevention - In 2016, funding of $1.3 million was approved to upgrade the lobbies of the seven patrol stations to withstand rifle rounds, and $1.9 million to improve headquarters lobby security, and to upgrade an aging security system. In 2016, funding of $1.3 million was approved to upgrade the lobbies of the seven patrol stations Turner Construction Company and Convergint Technologies, LLC conducted the renovations and security technology integration. The headquarters’ lobby was initially built as a two-story glass-walled structure, with an information desk and public records service windows. Visitors could freely enter the lobby and were only screened in an open area to the side if going to the upper floors. Upgrading lobby security “The challenge in upgrading lobby security was the two-story lobby entrance glass. The glass was not bullet rated, due to budget constraints. Changing the front of the building to support ballistic rifle-rated glass would have caused extensive time, exposed the inside of the lobby to weather, and would not have solved all of the security issues. In addition, there were concerns about keeping an ‘open’ and friendly service concept in mind and ensuring that the lobby would not resemble a ‘fortress’,” Schuster said. The solution was to retain the original, two-story glass exterior but add a layer of security inside once a person enters the lobby – a new separate security screening room. A new interior wall with bullet-rated glass and solid bullet-resistant wall materials was constructed inside the lobby to channel visitors to the room. Security revolving door The door will reject both users and they must request permission from the guard Now, all visitors must pass through a metal detector and have their belongings x-rayed prior to entering the original lobby. The room itself also has bullet resistant walls to enable containment of any violent disruption or shooting inside. Once a visitor has been cleared, they exit the screening room into the main lobby via a Boon Edam Tourlock 180 security revolving door which is set to allow only one-way traffic into the lobby. The Tourlock is the most advanced security revolving door in the Boon Edam product range for its ability to prevent tailgating by unauthorised users. If more than one person tries to enter a compartment, the door will reject both users and they must request permission from the guard to pass through again, one at a time. Overhead police helicopter At the end of their visit, visitors will exit the building via the lobby through a separate Boon Edam Tourlock 180 that leads into the front vestibule where they first entered the building. The Tourlock is set to allow public visitors to exit only and will reject attempts at re-entry. The first layer of security was completed inside the Headquarters building However, any police officer or staff can present a credential and use the door to enter the lobby with a valid credential. In this manner, the first layer of security was completed inside the Headquarters building, while keeping the best aspects of the lobby design, including the antique police car, and the overhead police helicopter. Western access points Layer 2 – Upgrading the Headquarters’ Perimeter Security with Protection and Deterrence - In 2021, the Headquarters building implemented its next, planned security layer to deter crime and violence in the outer ten acres of the property complex, which consists of the three-acre building site, a two-acre, open parking lot, a five-acre garage and an access street between those. This phase was financed by a $1.2 million bond in 2017. Surrounding the north, south and western access points around the facility is a brand new, Impasse II heavy-duty steel palisade fence by Ameristar in a black powder coat finish. The fence is comprised of individual steel pales secured vertically to a framework of specially formed rails and I-beam posts. The pales bend outward at the top to deter climb-over attempts by intruders. Pedestrian entry option Close by is a Public Transit Light Rail station which some officers use to and from work At the north and south entrances located on an access road behind the Headquarters building, HySecurity and Lift Master motorised gates are positioned to allow only authorised police officers and staff to access the exterior secure areas by car. Adjacent to each of these vehicle gates are Boon Edam Turnlock 100 full height turnstiles to allow pedestrian police officers to enter the parking area and walk into the headquarters building. Close by is a Public Transit Light Rail station which some officers use to and from work; and some officers choose to park their personal vehicles outside the secure area; therefore, the Turnlock 100’s provide a discrete, pedestrian entry option that safeguards users who otherwise might walk through the vehicle gates and risk injury or allow unauthorised vehicles to enter. Outdoor weather conditions The Turnlock 100 turnstiles were selected for their ability to stop tailgating and also for their rugged construction that can withstand outdoor weather conditions. Their full height structure deters climb over attempts and a black powder coat finish was selected to match the adjacent fencing perfectly. The Turnlock 100 turnstiles were selected for their ability to stop tailgating On the west side of the property, adjacent to the quartermaster’s building, is a public parking lot for visitors. Another Impasse II fence separates this parking lot from a staff-only, side entrance into the Jack Evans headquarters building. The fence forces all public visitors to walk on the sidewalk to the front of the building to enter via the main entrance and screening room. Police fleet parking However, any police officers that are walking across the lot from the quartermaster’s building can use their badge to access the staff-only, side entrance to the Headquarters building by entering through a third, Boon Edam Turnlock 100 turnstile. The exterior fencing around police fleet parking and the Headquarters building improves the safety of officers, staff and the building itself by keeping potential threats out at a distance. Police facilities, and particularly police headquarters, are subject to incidents ranging from ‘random’ violence on individual officers to large protests related to local or national incidents. “While usually peaceful, we have noticed that as the groups disband or move to other protest sites, groups of individuals will test site security by pulling on exterior entrances to see if they can gain access and potentially be disruptive to operations,” stated Schuster. Police facility design Separation of the public from the movement of prisoners is at the core of good police facility design “A concern is if one person can open the entry, others will follow and outnumber responding officers. The one-at-a-time access granted by the Turnlock 100 turnstile allows police to better control and separate individuals that might be disruptive or who might follow officers accessing the secure area.” Police facilities are usually designed to provide enclosed areas to move arrested persons from vehicles to holding or processing-controlled environments. If these staging areas are overflowing, officers may park their vehicles in the fleet area and walk the prisoner into the building. Separation of the public from the movement of prisoners is at the core of good police facility design. Open parking lots “There have also been incidents nationally, where officers are beginning their shift and walk to their patrol vehicles to secure their work gear and are attacked by pedestrians walking through open parking lots. If you think of patrol vehicles as ‘mobile offices’, it is easy to see that officers can become distracted as they begin their shifts and not always aware of their surroundings until they leave the property. Securing these fleet areas should be the practice everywhere,” says Schuster. These areas are often directly adjacent to the building and are therefore a concern because of threats Every facility must also contend with deliveries, and medium to large facilities usually have loading docks and trash recycling. These areas are often directly adjacent to the building and are therefore a concern because of threats such as vehicle bombs or incendiary items in trash dumpsters; for the police headquarters it made sense to secure these areas from public access. Physical security plan “Securing the private access road to the Jack Evans Police Headquarters has always been a desire, and now the addition of the steel fencing, the vehicle gates and Boon Edam turnstiles has created a barrier of safety that protects all of our people and assets to the very edges of our property,” states Schuster. “This new deterrence layer makes our officers and staff feel safer and it protects our fleet of vehicles and the back sides of the building from random attacks, bombings or shootings. We are very glad to have this second phase of our long-term physical security plan completed.”
Alcatraz AI has announced that they are bringing the Alcatraz AI Rock facial authentication solution to BrainBox AI’s offices. BrainBox AI is at the forefront of building automation and a renowned company in the green building revolution. Identity and facemask verification solution As BrainBox AI’s office recently re-opened with limited capacity, the company is taking proactive steps, through Alcatraz AI’s robust identity and facemask verification solution, in order to keep employees safe. As one survey showed, two-thirds of employees have safety concerns, regarding the return of on-site operations. Considering these statistics, health and safety must be top priorities for businesses, as they re-open. BrainBox AI is keeping its employees’ safety at the top-of-mind, by installing Alcatraz AI’s Rock solution, before they return, to ensure greater safety and security. Alcatraz AI’s Rock facial authentication solution Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies, to provide facilities with enterprise-grade identity verification, which is needed to create secure spaces. Rock’s state-of-the-art security features include touchless access, multi-factor authentication, video at the door and intelligent tailgating detection. Alcatraz AI’s access control solution, the Rock, effectively detects tailgating and sends ‘real-time alerts’, if an unauthorised person enters, and sends real-time notifications to ACS/VMS. BrainBox AI, leading the green building revolution “BrainBox AI is leading the green building revolution, and we are looking forward to bringing frictionless, multi-sensor technology and a touchless authentication feature to the office,” said Tina D’ Agostin, the Chief Executive Officer (CEO) of Alcatraz AI, adding “By utilising the Alcatraz AI Rock, we’ve helped BrainBox AI’s offices re-open smoothly and safely.” “BrainBox AI is excited to announce its partnership with Alcatraz AI. Our employees’ safety is always our top priority. We are confident The Rock’s touchless authentication and the frictionless security system will give each BrainBox AI employee peace of mind, when returning to the office,” said Jean-Simon Venne, the Co-Founder and Chief Technology Officer (CTO) of BrainBox AI.
ASSA ABLOY’s Code Handle door entry solution is a simple solution for keeping private rooms very private, in order to allow access only to those who require it and authorised personnel. Code Handle door entry solution The PIN code setting of the Code Handle access control solution allows users to keep control of who has access, particularly important when they want to keep items away from children. In primary schools, Code Handle protects each and every room that staff and security don’t want pupils to access. This ensures that only authorised teachers and support staff, who know the code to unlock the door, can access these rooms. All they need to do is enter the code on the Code Handle‘s keypad and the door opens. Works together with existing locking units Code Handle, by ASSA ABLOY, works in combination with the existing locking units Code Handle, by ASSA ABLOY, works in combination with the existing locking units, already installed in facilities. Users can keep the cylinder or lock, and just change the handle to a battery-powered Code Handle. With Code Handle, there is no need to cable the door, connect it to the mains or install an electronic access control system. The Code Handle door entry solution is perfect for staff offices, kitchens, store rooms, staff toilets, or any other school room that is to be kept private and secure. ASSA ABLOY’s Code Handle has various benefits, including: Auto-lock - Staff rooms are used many times, throughout the day, With Code Handle’s auto lock feature, there is no need to remember to lock the door, when exiting. Easy to install and retrofit - All it takes is two screws and two minutes of time, to install Code Handle on almost any interior door. Keyless and convenient - Secure rooms with no keys, no wires and no expensive access control system, with the Code Handle door entry solution.
Round table discussion
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical security industry doing to make more affordable and cost-effective technology solutions for end users?
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download