Trackforce announces the launch of its new Command Center, which removes the need for security companies to have onsite supervisors at each customer site. The Command Center achieves this with its ability to intuitively capture, process, and display essential information from the field required by supervisors to perform their duties on an easy to navigate screen, irrespective of their location. Security workforce management The Trackforce Command Center equips security supervisors stationed a...
Napco Security Technologies, well-known for developing innovative technology and labour-saving solutions for security professionals, now offers dealers dramatically improved cellular transmission on all top radio brands, plus extra mounting flexibility, with its growing line of StarLink Omni Extended Range Exterior Cellular Antennas, each of which comes complete with premium low-loss cable and mounting hardware. The StarLink® SLE-ANTEX Series are marine-grade antennas, ideal for indoor or o...
FlytBase, Inc., an enterprise drone automation company, releases a white paper highlighting the factors critical to large-sale deployment of autonomous drones for security and surveillance applications. The journey from the ‘early adopter’ phase to the ‘early majority’ phase of the adoption curve for drone deployments in industrial & commercial security will require: a) reliable, off-the-shelf hardware, b) cloud-based, hardware-agnostic software, and c) faster time-t...
While security salesmen are touting megapixels and anti-passback features, they are missing an opportunity to communicate the role of technology in the broader context of risk management and incident response – and in saving lives. That’s the message of Gerald Wilkins, PSP, Vice President of Active Risk Survival. Incident response is at the core of how an enterprise reacts to risk and is a standardised approach to the command, control, and coordination of emergency response. Effect...
Kingdom Services Group pledges their support for the London Mayor’s Women’s Night Safety Charter. Launched by the Mayor’s Night Czar, Amy Lamé, it aims to make London a city where all women feel confident and welcome at night. Women’s night safety It is asking businesses who operate during the night to sign-up to some simple pledges including: Nominate a champion to actively promote women’s night safety Demonstrate to staff and customers that we take wo...
Security isn’t easy for schools and universities. As education institutions increasingly become vulnerable targets for threats and attacks, they face the security challenges of maintaining a welcoming and open environment while ensuring the comprehensive safety of the students, teachers and staff. The balance between providing high levels of security with a certain level of convenience becomes crucial, especially when considering the large audience schools work with – the staff, admi...
The Spanish video door entry systems brand had advanced us that 2019 would be the year of connectivity. And they’re truly making it happen: Fermax announces the launch of their new DUOX monitors with WiFi connectivity. And with them comes the ability to answer calls and open the door from a mobile device (smartphone or tablet). True to their commitment to make the best technology available to the mainstream market, Fermax releases the DUOX VEO WiFi and DUOX VEO-XS WiFi monitors with integrated Internet connectivity, which allows calls at home to be diverted to the user's smartphone or tablet. Video door entry WiFi connectivity on monitors sets a radical change in video door entry, as it allows the user to interact when they are away from their home as they would if they were at home. Thanks the call divert to smartphone and tablet, users can see the person that is at their front door, have a conversation with the them or open the door if they want to, from anywhere in the world. You can answer any call made to your video door entry system, any time It doesn't matter whether you're in the office, travelling or on holiday, in or out of the house: you can answer any call made to your video door entry system, any time: just download Fermax's free BLUE app and pair the monitor with your mobile device. With the new DUOX VEO WiFi and DUOX VEO-XS WiFi monitors, FERMAX has taken the leap into the ‘Internet of Things’, a revolutionary concept where objects are connected to make life easier. Entry-level systems Fermax offers the VEO and VEO-XS monitors with DUOX technology as their new entry-level systems. These monitors were already ahead of any other indoor terminal on the market with their great little technical features. Both the VEO (with handset) and VEO-XS (hands-free) versions have a 4.3" widescreen colour display (16:9 format), ringtone options, automatic image capture and a ‘do not disturb’ function. They also have the impeccable design you would expect from the Spanish brand. And now, you can choose the WiFi call divert option for convenience, natural communication, whether you’re at home or not. And for individual homes, the DUOX VEO WiFi and DUOX VEO-XS WiFi monitors are also available in kits: all-in-one solutions with all the necessary elements for the installation.
Amthal partners with CAME BPT on a number of prestigious projects to create bespoke door entry systems that operate using integrated smart technology for the benefit of residents across the UK. Renowned intercom specialists CAME BPT has continued to specify use of Amthal, operating with leading real estate consultants to design and integrate door entry solutions in line with high-end specification. Specialist networked systems This minimises the supply chain and ensures a more efficient works programme from start to finish, and ongoing" CAME BPT and Amthal have worked together from initial design and specification stages to create specialist networked systems, incorporating high-end smart technology entrance panels and video hands free intercom handsets. Says Steve Bond, Installer East Sales Manager at CAME BPT UK: “Amthal as an all-encompassing fire and security specialist, collaborates well with our team to deliver on smart technology, created and installed to achieve exact customer expectations. The real professionalism is shown in Amthal’s ability to partner with us right from the initial design process, through planned installation to maintenance and monitoring services. To the customer, this minimises the supply chain and ensures a more efficient works programme from start to finish, and ongoing!” Smart video control Most recently, Amthal and CAME BPT have collaborated to upgrade smart video control at the prestigious Arundel Square development. Based in the heart of Islington, Arundel Square has been designed in symmetry of the surrounding prominent Victorian terraces. Run by a Resident’s Management Company (RMC,) it presents studios 1, 2 and 3 bedroom apartments with full concierge services, overlooking a professionally landscaped vista of an established garden square. With every finishing detail considered in line with the sensitive design, a necessary upgrade to its video intercom system was extensively planned with a bespoke solution, created by CAME BPT in partnership with Amthal to complete the integrated installation. Jamie Allam, Amthal Commercial Director concluded: “The work at Arundel Square is testament to our close working relationship with CAME BPT, whereby we are confident in their products and know we can operate together well to ensure a smooth delivery with minimal disruption to those involved.” Remote monitoring Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience “By being involved so early on, we are able to understand and make recommendations on the right approach, when it comes to security design and installation without compromising on style or cutting-edge technology. The result is the perfect blend of smart security, to add finishing touches to any development and guarantee a very professional job all round.” Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, fire, access and CCTV systems. Amthal Fire & Security are accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
Getac announces the launch of the new UX10 rugged tablet, offering reliability, powerful performance and lightweight portability to professionals operating in challenging field environments every day. For emergency service paramedics, field utilities technicians and industrial manufacturing engineers, bad weather, remote locations and adverse working conditions are all part of the job. To work efficiently, they need powerful mobile devices they can count on day-in, day-out, regardless of the location or circumstances. Maximise worker productivity The lightweight and compact UX10 has been designed to maximise worker productivity in any environment. It’s 10.1-inch Full HD LumiBond® touchscreen display with 1000 nits of brightness and optional digitiser mode offers crystal clarity in all weather conditions, from bright sunlight to heavy rain, and can even be used while wearing gloves. The UX10 features multiple battery configurations including an optional high capacity battery MIL-STD-810G and IP65 ratings ensure operation in temperatures ranging from -29o to +63o C and drop resistance of up to 6ft, for complete peace of mind when working in harsh, dangerous or chaotic situations. The UX10 features an Intel 8th Gen Quad-core CPU, 8GB RAM and 256GB SSD for exceptional computing power, while connectivity options including Bluetooth, Wi-Fi and 4G LTE with integrated GPS, keep workers connected in even the most remote locations. Enhanced security features The UX10 also features multiple battery configurations including an optional high capacity battery for full-shift computing and optional bridge battery, enabling hot battery swaps for continuous operation. For maximum functionality, the UX10 is compatible with a wide range of accessories including detachable keyboard, hard carry handle and secure vehicle docks. A robust suite of enhanced security features, combined with authentication options including Windows Hello facial recognition webcam, magnetic stripe reader, smart card reader and fingerprint scanner, keeps sensitive data protected at all times. “Working in sectors such as utilities, industrial manufacturing and the emergency services can be unpredictable and extremely challenging, so the last thing personnel want to worry about is their device failing on the job,” says Rick Hwang, President of Rugged Business Unit at Getac Technology Corporation. Optional vehicle docks “The new UX10 is purpose built to provide the reliability, performance and usability that workers need, meaning they can focus on the task at hand, whatever the situation.” The UX10 comes with Getac’s three-year bumper-to-bumper warranty, covering accidental damage as standard, for even further peace of mind. Digital transformation has revolutionised industrial manufacturing in recent years The UX10 is optimised for the latest Electronic Patient Care Records (EPCR) and ambulance mobilisation software, putting life-saving critical information directly into the hands of field personnel when they need it most. A range of optional vehicle docks and optional hard carry handle further optimises device mobility, allowing the UX10 to be easily operated and transported in time-critical situations. Digital transformation has revolutionised industrial manufacturing in recent years. The UX10 allows workers to monitor plant performance, integrate critical workflows and maintain quality control, all through a single device. Direct communication An optional RS232 port supports the use of legacy equipment, while an optional LAN port allows for direct communication with different machines and equipment throughout the facility. Manage your workforce, fleet and assets directly on the UX10 using the latest field services management applications. Optional dedicated GPS enables fast and easy mapping when using GIS software, while integrated screen-blanking technology decreases the risk of accidents and driver distraction. The UX10’s light weight, compact form factor and multiple hands-free carry options make it ideally suited to full shifts in the field. In addition to the UX10, Getac’s suite of rugged devices for the industrial manufacturing, utilities and emergency services industries include the F110, ZX70, K120, T800, T800-Ex and A140 fully rugged tablets, V110 fully rugged convertible notebook and S410 semi rugged notebook. The UX10 will be available to order in August.
Redvision, the manufacturer of high-performance, rugged CCTV cameras in the UK, now offers a Visor Extension for its VEGA 2010, rugged, camera housing. The Visor Extension, which fits to the housing’s front bezel, then shades the enclosed camera from sunlight and glare, such as in low sun at dawn or dusk. The Visor Extension also has the benefit of reducing rain on the housing’s optical window. Stephen Lightfoot, technical director at Redvision, explains, “The VEGA 2010, rugged, camera housing is designed to enclose and protect CCTV camera and lens combinations up to 290mm long. The Visor Extension is like a ‘peaked cap’, shading the camera and housing window from extreme lighting conditions, such as dazzling low sun. The Visor Extension protrudes by up to 72mm from the camera window and simply retrofits to the VEGA 2010’s front bezel.” Silicon wiper to remove dirt and water The VEGA 2010 also has a Tru-park, silicon wiper option, which removes dirt and water from the camera window. When not in use, the wiper is concealed neatly behind the front bezel. Wiper power comes from the VEGA 2010’s, PoE-driven, CHAT interface board, which also provides power for the camera, washer and built-in heater, along with Ethernet and audio communications. The VEGA is made from tough, die-cast aluminium, which is both IP67 weather-proof and IK10 impact-rated. It is finished with a marine-grade plating, followed by a durable powder-coating paint. Although the standard colour is light grey (RAL 7035), it can be finished in any RAL colour to order. All cabling is managed inside the housing’s built-in, wall or pedestal mounting bracket, which has an integrated junction box. The VEGA 2010 is one of the most compact, tough and well-designed, fixed, rugged, camera housings in the security industry.
NEC Corporation announces its participation in INTERPOL World 2019 at Sands Expo & Convention Centre, Singapore, from Tuesday, July 2 to Thursday, July 4, 2019. At NEC's booth (booth# F11), a broad range of public safety solutions for law enforcement and government organisations will be displayed. Visitors will be able to experience a variety of NEC solutions, including its multi-modal biometric immigration gate and AI-driven video analytic platform. Biometric authentication processes As part of the INTERPOL World Co-Creation Labs programme, NEC will join panel discussions and share insights on the future of biometrics and immigration control. Overview of NEC exhibits: NEC will join panel discussions and share insights on the future of biometrics and immigration controlSolutions for immigration control and border security - In-vehicle facial recognition solution that enables the identification of individuals inside a vehicle without the passengers exiting. Multi-modal biometric immigration gate that incorporates both face and iris recognition technologies to facilitate a smooth and secure identity verification process. Mobile authentication service that is equipped with liveness detection technology to prevent fraudulent activities through biometric authentication processes, such as the use of photos on mobile devices. Security solutions for critical infrastructure - NEC Enhanced Video Analytics (EVA) platform utilising AI technology that integrates a series of video surveillance capabilities, including behaviour detection, crowd behaviour analysis, abnormal behaviour/abandoned object detection, and age/gender estimation. Optical fiber sensing technology to detect unauthorised access to regulated areas. Other solutions - Control Room Solutions from APD Communications, which was acquired by NPS (Northgate Public Services), an NEC Company, in January 2019, including an Integrated Communications Control System and Contact Record Management. APD provides solutions and technologies for approximately 70% of UK police forces and a range of countries worldwide. Co-creation Labs programme Biometric technologies, such as facial recognition and fingerprint recognition, which received the world's No.1 certification accuracy. Overview of the ‘Co-creation Labs’ programme: Further development and the sharing of identifiers, including biometrics - Are we jointly prepared for returning foreign terrorist fighters (FTF)? Date: Tuesday, July 2, 2019 (day 1) 15:30 to 17:00 Location: Co-creation Lab 3 Speaker: Walter Lee, Evangelist and Government Relations Leader, NEC Corporation What are the future of controls that improve the reliability of the control of an individual, the safety of travel between countries and eliminates the threats of domestic attacks? Date: Wednesday, July 3, 2019 (day 2) 13:30 to 15:00 Location: Co-creation Lab 1 Speaker: Michael O'Connell, Vice President and Executive Advisor, NEC Europe
ExtraHop announces ExtraHop® Reveal(x) Cloud™, a Software-as-a-Service (SaaS)-based network detection and response (NDR) solution for the cloud-first hybrid enterprise. Reveal(x) Cloud provides deep and continuous visibility, enabling Security Operations (SecOps) teams to analyse every transaction, detect threats, and respond to attacks to gain control over their hybrid attack surface and protect their investment in the cloud. While the cloud has proven to be a force multiplier for DevOps and IT Ops, for SecOps teams already struggling under the burden of a sprawling attack surface and a shortage of skilled analysts, adopting cloud platforms can be a vulnerability. With SecOps taking the blame for stalled migration efforts, enterprises are recognising the need to take a cloud-first approach to securing elastic workloads rather than trying to retrofit old practices to new technology design patterns. Investigate complex threats Without native network visibility in the cloud, enterprises have been limited to log- or agent-centric tools Without native network visibility in the cloud, enterprises have been limited to log- or agent-centric tools, making it difficult to detect and investigate complex threats in a timely manner due to lack of continuous visibility across all environments. Reveal(x) Cloud is a SaaS-based solution that provides security teams with a zero-infrastructure service for AWS that deploys quickly, delivers immediate asset discovery, and offers threat detection, investigation, and response. The solution takes advantage of new enterprise features introduced by AWS during AWS re:Inforce 2019, including Amazon Virtual Private Cloud (Amazon VPC) traffic mirroring that supports passive observation of network traffic from cloud workloads, and private network peering that allows for the secure transmission of data between AWS accounts. It also connects natively with AWS data sources, such as Amazon CloudWatch, AWS CloudTrail, and Amazon VPC flow logs. Purpose-built solution “Today, security operations teams often rely on tools and data sources like logs that don’t provide a complete picture,” said Dave Brown, Vice President, EC2 Compute and Networking Services, Amazon Web Services, Inc. “With the introduction of Amazon VPC traffic mirroring, we’re allowing customers to extract traffic of interest from any workload in an Amazon VPC and send it to the right tools to detect and respond faster to attacks often missed by traditional log- and agent-centric tools. With Reveal(x) Cloud, ExtraHop is delivering a purpose-built solution designed to enable AWS customers to take full advantage of network traffic for better cloud visibility, detection, and response.” Reveal(x) Cloud offers a host of features designed to help SecOps teams support the shared responsibility model, protect cloud workloads by ensuring compliance, and deliver security across the hybrid attack surface. Track rogue instances Automatic Discovery and Classification: Up-to-the-minute visibility and classification across all cloud workloads allows SecOps teams to track rogue instances, prioritise investigations by risk score, and correlate malicious activity and asset criticality to focus on the highest-risk threats. Application Layer Decoding: Full support for AWS services, such as Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), and AWS Elastic Load Balancing means visibility into behaviour, not just activity, while machine learning at the application layer provides immediate detection of exfiltration activity. Encrypted Payload Visibility: Reveal(x) Cloud decrypts SSL/TLS-encrypted traffic at line rate, including cipher suites supporting perfect forward secrecy, providing complete visibility into all communications, including encrypted malicious traffic. Rich Integrations: AWS CloudTrail events enrich network-based threat detection with on-box activity (disabled logging, suspicious processes, suspect file execution), while connection with Amazon CloudWatch allows granular tracking of privilege manipulation. Customers can also leverage integrations with orchestration platforms, such as Phantom, ServiceNow, and Palo Alto Networks, to automate response workflows. Complex attack surface It's time to stop retrofitting old models onto the new reality and start building cloud-first security operations" “The modern hybrid enterprise has created an expansive and complex attack surface that cannot be managed by traditional security tools or architectures," said Jesse Rothstein, CTO and co-founder, ExtraHop. "It's time to stop retrofitting old models onto the new reality and start building cloud-first security operations. With Reveal(x) Cloud and Amazon VPC traffic mirroring, SecOps teams finally have inside-the-perimeter visibility and control over their hybrid attack surface.” “With Amazon VPC traffic mirroring in Reveal(x) Cloud, ExtraHop is further reducing the barriers to cloud adoption, by giving enterprises the same level of insight they’ve always had into their on-premises traffic,” said Mike Sheward, Senior Director, Information Security, Accolade. Native security features “Visibility has always been key in security, combine Reveal(x) with the native security features you find in AWS, and you’re going to have more actionable visibility than ever. Cloud providers continue to work with security vendors and with enterprise customers to provide functionality and integrations that make it easier, more efficient, and more secure to build presence in the cloud,” said Fernando Montenegro, Principal Analyst, 451 Research. “Amazon VPC traffic mirroring is just the latest example. ExtraHop’s Reveal(x) Cloud fits within this trend, as it allows customers to use traffic monitoring to achieve better network visibility, detection and response, and to do that as a service. This is likely to assist SecOps teams making the transition to support cloud deployments. At ePlus, we believe the right technology transforms IT from a cost center to a business enabler,” said Justin Mescher, Vice President of Cloud and Data Center Solutions, ePlus. Evolving business models Pervasive enterprise digital transformation efforts are dramatically expanding the attack surface" “We’re building Reveal(x) Cloud into our CyberSecurity and Cloud practices to allow us to act quickly and accurately to improve our customers’ cloud readiness and security posture. Pervasive enterprise digital transformation efforts are dramatically expanding the attack surface, but many organisations are failing to transform their cybersecurity approaches to keep pace, continuing to use the same cybersecurity methods they have always used while attempting to support continuously evolving business models,” said Joe Vadakkan, Global Cloud Security Leader, Optiv. “Combining industry-leading technologies such as ExtraHop’s Reveal(x) with Optiv’s end-to-end services, enables us to provide clients with an approach to cybersecurity that is aligned to new business models and centred on client-focused outcomes. We believe that ExtraHop Reveal(x) Cloud will deliver great value to cloud workloads by providing the necessary visibility to more efficiently detect and respond to incidents.”
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Managed services provided through the cloud offer multiple advantages for system integrators. These include: Increased recurring monthly revenue: Managed services are a new business model that generates more stable and predictable income streams for integrators. Stickier customers: Managed services foster a more involved relationship between integrators and their customers, which can help boost customer retention. The cloud enables integrators to serve more sites without hiring additional technicians High gross profit margins: Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. They are easier to provide: The cloud enables integrators to serve more sites without hiring additional technicians. Problems can be fixed proactively: When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue - possibly before the customer even notices a disruption in service. Increased valuation of business: According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Importance of cloud-based solutions The cloud also challenges integrators to educate customers on the value of the new approach The cloud also challenges integrators to educate customers on the value of the new approach. For example, the cloud changes the expense model of security systems. It allows customers to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into the service, you don’t need a large capital outlay up front - you simply pay a predictable expense every month. Leveraging this difference opens new sales opportunities for integrators. The benefits of cloud services on how physical security equipment and software services can be monitored and maintained through a connected service is a particular benefit to integrators. Data monitoring and security “By having data describing the health of the system shared on the cloud, system integrators can observe data on demand and create proactive maintenance plans in coordination with the end user,” says Stuart Rawling, Director of Business Development, Pelco by Schneider Electric, and one of our Expert Panelists. A daily challenge for end users is balancing human resources used in the operation of a system “Such plans should result in increased system reliability and less downtime. If system performance data is aggregated and anonymised, it could also be used by manufacturers to analyse and form conclusions about maintenance schedules and system lifespan.” A benefit is happier customers. “A daily challenge for end users is balancing human resources used in the operation of a system and daily maintenance, with maintenance having shared responsibility with the system integrator,” says Rawling. The cloud software as a service The SaaS model gives companies the resources to improve the deep learning model" The cloud also can help to make cutting edge technologies more affordable. Economies of scale provided by the Cloud (Software as a Service, or SaaS) are making the sophisticated capabilities of deep learning affordable to a wider audience. Meanwhile, deep learning augments cloud systems with capabilities that may not be available (or affordable) in on-premise systems, thus accelerating the broader move to cloud systems. “Having a SaaS model gives companies the resources to improve the deep learning model,” says Shawn Guan, CEO and co-founder of Umbo Computer Vision, a provider of deep learning video analytics. "We can make more accurate systems that scale better and faster. SaaS enables vendors to do something great with deep learning. You don’t have to redo it for everybody. One customer benefit from another customer and all the knowledge is aggregated together.”
Lack of cybersecurity of video systems made headlines in 2016. The Mirai cyberattack that year impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cybersecurity attacks later in the day were more global in nature. The cyberattacks were carried out by a botnet, a network of bots, which are software applications (in this case, computer viruses) that communicate with each other and run tasks automatically over the Internet. IP-enabled cameras Bots can infiltrate unprotected computers and then use the computing power of their ‘hosts’ to carry out various kinds of cyber-attacks on other Internet targets. In the case of the Mirai attacks, a hidden army of bots worked together to bombard various websites with so many bogus requests that the sites became overwhelmed by the volume of traffic and could not respond to legitimate requests. It’s called a denial of service (DDS) attack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders (DVRs). In other words, the bots used the computing power of our industry’s video products to launch the headline-grabbing cyberattack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders Safeguarded communication Since 2016, awareness of cybersecurity for video systems has grown. Today, it is understood that video solutions should be designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted, and any commands and configurations to control cameras and other devices are transmitted via a secure channel (HTTPS). Some basic best practices can go a long way to improving the cybersecurity of video systems. A small change is to remove default passwords from products and software, and to avoid using ‘guessable’ passwords. All firmware should be encrypted to reduce the possibility of it being downloaded from the manufacturer’s website and deconstructed. Use of a secure operating system that is regularly updated can protect against video tampering, altering, spoofing and snooping. Video surveillance systems Another precaution is to avoid remote login using Telnet or FTP, which are less secure. Finally, use of digital certificate provides assurance that data from a third party is true and not falsified. All data should be encrypted with digital certificates. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats Free downloadable guides and other resources provide specific recommendations on hardening video surveillance systems by applying proven cybersecurity initiatives. For example, the OnSSI Hardening Guide for Networked Video Surveillance Systems includes guidance on password strength, how to avoid poor password practices, collaboration with IT and HR departments and how to apply software and firmware security updates. Hardware-level encryption It also includes standard, advanced and enterprise cybersecurity best practices for cameras, servers and workstations and networks. Another cybersecurity requirement is data-at-rest encryption to ensure that data, such as stored video, is secure right down to the storage medium in which it is held. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Despite the clear benefits, data-at-rest encryption lags other areas, such as network and endpoint security, in terms of the investment it currently receives. A Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security.
Simultaneous suicide bombings at several churches and hotels in Sri Lanka on April 21 were of a scale, sophistication and level of coordination that hasn’t been seen since 9/11. Nine suicide bombers targeted three churches and three hotels on Easter morning, and the resulting casualties numbered 359 dead, including 45 children, and about 500 injured. The complexity of the attacks suggests the bombers received help from an outside organisation, likely the Islamic State (IS). Sadly, security warnings from Indian intelligence officials, which might have helped to prevent or minimise the attacks, were ignored by Sri Lanka security weeks earlier. In the wake of the massacre, two of Sri Lanka’s top security officials were asked to resign, and Sri Lanka’s president promised to completely restructure state security. Contradiction to the terrorism report The twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacksA motivation for the Sri Lanka tragedy is thought to be the March 15 shootings at two mosques in Christchurch, New Zealand, where 50 people were killed and 50 more were injured. A 28-year-old Australian white supremacist was arrested and charged with murder. Taken together, the twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacks, as documented in a recent report. The suicide bombers in Sri Lanka were eight men and one woman, most of them well-educated and coming from the middle or upper class. One was the leader of National Thowheeth Jamaath, the homegrown militant Islamist group the government has blamed with carrying out the attacks. There is also evidence to corroborate a claim of responsibility by IS. Some 60 people have been arrested in the investigation. Even days later, police continued to find explosives and said there was still danger. Multiple attacks One explosion on Easter morning occurred at St. Sebastian’s Church in Negombo, 20 miles north of Colombo, where more than 100 were killed. Another bomb killed 28 people at the Zion Church in Batticaloa, and an unknown number died at St. Anthony’s Shrine, a Roman Catholic church in Colombo. The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury. Two more explosions happened Sunday afternoon, one at a small guest house and another at the suspects’ safe house, where three officers were killed. Security at houses of worship has been a high-profile concern in the United States in recent years following incidents such as an attack at Emanuel African Methodist Episcopal (AME) Church in downtown Charleston in 2015 that killed nine people. Just last October, 11 people were killed and six others injured in a shooting at a synagogue in Pittsburgh. Hardening security at churches “It’s no longer enough to pray for a safe and secure environment,” commented Patrick Fiel of PVF Security Consulting in an Expert Panel Roundtable discussion. “Churches are soft targets. Clergy and parishioners will need to work closely with security consultants and local law enforcement to harden their facilities.” Access control, CCTV solutions and mass notification systems are all helpful and can be placed unobtrusively so as not to interfere with aesthetics of the church, Fiel adds. The scale and scope of the bombings in Sri Lanka provide a wakeup call to the global likelihood of terrorist attacksIt doesn’t appear technology would have made much difference in the case of the Sri Lanka attacks, although awareness and vigilance can have an impact. At Zion Church in Batticaloa, for example, a bomber was stopped by pastors from entering the congregation area where some 500 people gathered. Because of their suspicions, the bomb was instead detonated in a courtyard where children were eating breakfast; 28 people died. The scale and scope of the bombings in Sri Lanka provide a dramatic wakeup call to the continuing global likelihood of terrorist attacks. The last territory of the Islamic State in Syria fell in March, but IS and its ideology live on, and continue to be a global terrorism threat. And that’s just one among many possible sources of terrorism worldwide. Hopefully, the recent incidents do not foreshadow more attacks that are even more deadly.
Airbus has agreed a five-year contract with the UK Ministry of Defence (MOD) to manage test and reference services to support the delivery and assured release of Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) capability for deployed operations around the globe. The contract is valued at approximately £22 million (€ 25 million). Airbus offers the UK MOD a seamless transition and delivery of a comprehensive, consistent and coherent service model for the Land Systems Reference Centre (LSRC), delivering test and reference capability to support development, integration, approval and de-risking of C4ISR systems and services. Next generation tactical communications system The LSRC provides the MOD with a through life ‘Systems of Systems’ Test and Reference serviceAirbus aims to make the LSRC the UK MOD’s centre of excellence for advice and test, ensuring that MOD networks can accommodate new applications, hardware and services. Major programmes such as Morpheus, which is the next generation tactical communications system for the British Armed Forces, will be tested in the LSRC. Located at Blandford Camp in Dorset, the Royal Corps of Signals’ headquarters, the LSRC provides the MOD with a through life ‘Systems of Systems’ Test and Reference service. It provides an appropriate test, integration and transition capability that assures release packages for introduction onto the Defence Network and in support of operations and exercises. Test applications and application upgrades The LSRC can provide support and specialist advice for deployed and base ICT capabilities throughout their lifecycle. The LSRC has the capability to test applications and application upgrades on reference systems to assess their impact on other applications and the network as well as the network’s impact on the application. Airbus has decades of experience delivering communications solutions to the UK MOD, as well as many governments around the world, both with ground infrastructure networks and satellite communications delivering unrivalled resilience and security to all forces’ operations.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-line distance education Wintec’s programmes and qualifications are nationally and internationally recognised Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programmes and qualifications are nationally and internationally recognised and its degrees have equal status to those from universities. The degree programmes include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognised nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organisation, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analogue and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrolment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilise Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilisation of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organisations have yet to realise. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognising the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilisation (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilisation reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximising the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
Frequentis was selected for phase two of the modernisation and standardisation of control centre technology (Program MVL) for the police in the German state of North Rhine-Westphalia (NRW). NRW police selected the Frequentis multimedia communication platform, 3020 LifeX, to meet the requirements for future emergency call and broadband radio communications. Phase one of the modernisation project was carried out by Thales Deutschland GmbH. To prepare for future multimedia emergency call and broadband radio communications, the NRW police selected Frequentis AG for the continuation of the modernisation. Reliable technology partner The intensive and successful cooperation between Frequentis and Thales over the last two years – as well Frequentis’ previous success completing the project ‘digital radio concentrator’ – convinced the NRW police that Frequentis was a reliable technology partner. NRW is the largest police organisation in Germany, covering 50 police authorities NRW is the largest police organisation in Germany, covering 50 police authorities which ensure the protection and security of a population of approximately 18 million. To cope with this challenging task, and to live up to its self-acclaimed title as the most innovative police force in Germany, the NRW police relies on forward-thinking technologies for state-of-the-art control centre solutions that will meet future demands of the service. Multimedia communication platform Phase two of the program MVL includes 50 police control centres with approximately 400 operator working positions. In the future, these will be hosted in a virtual cloud-based solution available in five networked technical centers across the region. The Frequentis multimedia communication platform, 3020 LifeX, will ensure efficient emergency call handling and operation on the public safety digital radio network as well as the interconnection of both channels. “We are very proud to be able to continue to work with, and deepen, our long-term cooperation with the North Rhine-Westphalia Police Department, helping them to achieve their goals for innovation. We see this customer as a very important strategic partner.” Norbert Haslacher, CEO Frequentis AG.
At the University of Tennessee, Knoxville, the Technology Integration Services department provides infrastructure, customer service and web application support to the faculty, staff, students, and units of the College of Business. Its focus is to facilitate the use of the campus infrastructure and support while adding complementary infrastructure and services to meet the unique needs of the college. The college took a very innovative approach to operating and securing its 174,000sq ft state of the art Haslam Business Building. The technologically advanced facility incorporates over 40 meeting rooms and needed a way to efficiently schedule and fill classrooms and conference space, yet maintain security and control. Physical access control CSC identified the Gallagher security management platform as the best fit for the foundation of the system The university had previously used an antiquated access control and security system across the campus, and realised it did not meet the demands of this new high-tech facility. Ramsey Valentine, Director of Technology for the College of Business, turned to WWR Engineering of Knoxville, and Coactive Systems (CSC) of Canton, Ohio to design and deploy a state-of-the-art integrated security business solution. The difficulty involved in deploying this solution was that certain components, like physical access control, were readily available, but other components such as digital signage information kiosks and the integration of all components of the system, were not off-the-shelf. CSC’s Brad Green and John Kortis worked with Director Valentine to understand the college’s specific needs and develop a solution that exceeded their expectations. CSC identified the Gallagher security management platform as the best fit for the foundation of the system. Application programming interface Gallagher systems are installed in approximately 90 percent of Australia’s and New Zealand’s universities. With proven strength in the tertiary market internationally, the Gallagher system was selected because of its open architecture, application programming interface, and published software developer’s kit. CSC also teamed with the local office of Simplex Grinnell. Led by Mitch Hall, Simplex was the contractor responsible for the assembly and installation of the Gallagher security system and the kiosks provided by CSC. WWR was responsible for the engineering drawings and interface to the existing security systems. The College utilises Meeting Room Manager from NetSimplicity for room scheduling; CSC created an integration from Meeting Room Manager with Gallagher Command Centre software. CSC also designed and custom manufactured the 42 kiosks that the college uses at each classroom and in meeting room areas. Door position switches Use of the kiosk requires a valid access card carried by all students and faculty The kiosks are the user-interface to the ‘system’ for room access and scheduling. Use of the kiosk requires a valid access card carried by all students and faculty. Each touch-screen kiosk contains digital signage showing the classroom name and detailed information about the room schedule and its status. Users can also access current weather, news, and stock information via the touch screen. The kiosk may be programmed to display emergency messages and egress data if needed. The kiosks are connected to the college’s network on which Gallagher Command Centre resides. The Gallagher system controls and monitors the door functionality including electric lockset and door position switches. Meeting Room Manager is utilised by staff to schedule rooms for classes and assign students via the campus intranet. Gallagher server and controller application programming interfaces extend the functionality and flexibility of the Gallagher system as the platform for integration. Providing technology solutions Utilisation of the integrated system provides continuous communications security and access control for the college, while allowing students unencumbered access to the meeting rooms and classrooms. Gallagher would like to acknowledge the support of the University of Tennessee and their security partners Coactive Systems of Canton and Simplex Grinnell, Knoxville in the development of this in-site study. CSC is a full service IT integration company providing technology solutions for audio, video, data, voice, dispatch, asset management, inventory, kiosks, security, communication, insurance, retail and medical systems. CSC’s services include custom software development, system installation, maintenance and cabling. Photos reproduced with permission from University of Tennessee.
Indiana Department of Correction (IDOC) is a state-wide organisation, comprised of 21 adult facilities housing over 28,000 inmates. Safety of both inmates and the public is a top priority for IDOC and forms part of the organisation’s mission and vision. The inefficiency and increased cost associated with managing multiple security technologies and systems led to IDOC’s Director of Construction Services Kevin Orme to seek a solution that not only increased efficiency and reliability for the prison facilities staff but ensured that both inmate and public safety remained consistent with their organisation mission and vision – the top priority. Effective pulse fence systems Gallagher security monitored pulse fence systems are safe, effective, reliable, and safely deter and detect disturbancesGallagher Certified Channel Partner Security Automation Systems (SAS) is a valuable partner to both Gallagher and IDOC. SAS has worked with IDOC and Gallagher to design and manage the installation and maintenance of the current system and to develop further solutions to meet future requirements and increase efficiency and safety. Gallagher security monitored pulse fence systems are safe, effective, reliable, and safely deter and detect disturbances without triggering false alarms. An essential requirement for upgrading a number of low security level 1 facilities to level 2 is perimeter detection. Some IDOC facilities require up to 1000 feet of interior chain link fence to be covered by effective non-lethal perimeter detection. SAS worked with the IDOC requirements and proposed the Gallagher D21 disturbance sensors to provide the perimeter detection solution. Perimeter security for correctional facility “Gallagher’s system changed the way I think about perimeter security,” says IDOC’s Director of Construction Services Kevin Orme. “Gallagher is the specified standard for any correctional facility above minimum security.” The product is great, works reliably every day, and I don’t have to worry about it" Gallagher’s perimeter security system is included in all new IDOC construction, as well as being retrofitted into existing facilities throughout the state. The efficient installation process of the Gallagher system meant IDOC could significantly reduce time in comparison to other technology in the agency. “The product is great, works reliably every day, and I don’t have to worry about it,” he adds. “We’ve been able to make more effective user of security resources too. Officers have been reallocated from the perimeter to in-prison offender contact areas.” Operator-friendly software “Hardware failure rate and recurrent costs are very low, and the software is operator-friendly reducing human error,” says Mr. Orme. “Maintenance is much easier; the prison’s maintenance staff have the ability to fix any minor issues.” The D21 Disturbance Sensor measures and analyses the impact on the fence when disturbed. The sensor raises an alarm only when specified limits are exceeded, preventing any nuisance or ‘false’ alarms caused by disturbances such as wind or rain. Integration with Command Centre software Compared to other technologies considered by the state, the D21 sensors were the most cost-effective solution"Ryan Tomlinson from SAS says the D21 sensor was suggested for two main reasons. “First, the D21 sensors integrate seamlessly with the Gallagher Command Centre software, which was a key factor in the decision process. We were already integrating non-lethal electric fencing, door control and video systems with Command Centre and the state preferred not to add another, separate system. The second reason we chose the D21 sensors was cost. Compared to other technologies considered by the state, the D21 sensors were the most cost-effective solution.” Mr Tomlinson had confidence in Gallagher and its products to carry out the job successfully. “Although this was to be our first installation of the D21 product, we were confident that between the technical ability of our staff and the support from Gallagher, we would be able to provide a successful installation,” he says. “The D21 sensors were simple to install. They easily mounted to fence posts and other structures the system was monitoring and installing the communications backbone was low-cost and straightforward.” Monitoring real-time data in Command Centre We were able to power-up each new zone of sensors and get them on-line with the Gallagher Controller 6000s"“After the initial process of setting the address of each sensor, we were able to power-up each new zone of sensors and get them on-line with the Gallagher Controller 6000s. Next, we were able to individually adjust the parameters of each sensor and monitor real-time data in Command Centre according to the particular characteristics of the structure the sensor was affixed to." “Overall, I was impressed with the ease of installation, the adjustability of the sensors and how well the sensors integrated with the Command Centre software.” Following the installation of the Gallagher system, IDOC was able to reclassify the facility as level 2, thus allowing them to house a wider group of offenders using the cost-effective, yet highly secure perimeter security solutions offered by Gallagher.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces yet another successful apprehension, courtesy of sister company, Sonitrol’s, incredibly effective TotalGuard technology. Sonitrol of Lexington, Kentucky performed the system installation and does on-going 24/7/365 monitoring. Brandenburg Auto is a small, family-owned and operated auto repair shop in Lexington, Kentucky, run by Jack Brandenburg and his son, Jack Jr. The business had recently experienced a break-in, during which the phone line was cut prior to entry, rendering their previous security system incapable of sending alerts when the intrusion occurred. Installing entire system Brandenburg Senior was initially reluctant to deploy the new Sonitrol TotalGuard solution, as he felt they already had cameras and he was concerned because the new technology would not have a keypad. However, after Danny Goodpaster, Sonitrol Security Consultant, demonstrated the technology and showed him a video of an actual break-in resulting in an apprehension, both father and son decided to move forward. Sonitrol staff had implemented a process of pre-deploying the TotalGuard devices in their offices Sonitrol scheduled the installation with an expedited timeline considering the recent loss the business had experienced. The technicians actually finished a previous job earlier than expected, which allowed them to come to the Brandenburg facility one day earlier than planned. Prior to installation, Sonitrol staff had implemented a process of pre-deploying the TotalGuard devices in their offices before arriving on site, which allowed the team to install the entire system in less than half a day. Scheduled installation This was quite a fortuitous turn of events, because that very night, the night before the original scheduled installation, an intruder cut the phone line again and entered through the shop door. The new TotalGuard system was no longer on the phone line, and the unfortunate thief was immediately detected by Sonitrol monitoring personnel and the police were dispatched. Law enforcement arrived quickly, and in numbers, making the apprehension and minimising the impact to the next day of business for this valued customer. The full system is comprised of three TotalGuard sensors and a standalone TotalGuard, which does not need a panel because it is wired directly to the camera. TotalGuard alarms on motion, impact, audio, and video and communicates to the central station without needing a phone line. The system is arm/disarm via Sonitrol mobile app and the business phone is the keypad, so no maintenance and no wearing out of the equipment. All control is from the mobile app, and updates are pushed to the system automatically.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?