Nedap Security Management’s standards of excellence achieved another stamp of approval last month with ISO 27001 certification. This assures that all its products and services, including the AEOS access control system, are fully compliant with the highest international standards for information security. Fokko van der Zee, Managing Director of Nedap Security Management says: “This is the formal confirmation of our ambition to excel at everything we do. A crucial aspect of that, part...
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anythi...
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality...
With more than 50 percent of U.S. households projected to use smart home technology by 2023, Interlogix, a provider of security and life safety solutions, is ready with an array of security platforms that support smart devices and links to top interactive service providers. Interlogix is a part of Carrier, a provider of innovative HVAC, refrigeration, fire, security and building automation technologies. “We’re uniquely positioned to meet the demands of the smart home segment that&rs...
Aiphone, the international manufacturer of intercom and security communication products, announces the next generation of video intercoms has arrived with the IX Series 2 Peer-to-Peer Video Intercoms. The new intercoms offer Session Initiation Protocol (SIP) compatibility, enhanced CCTV control, line supervision, backwards compatibility with the original IX Series and many more features and benefits to help create safer buildings with increased system flexibility. End users can create more effi...
Berlin-based manufacturer Bird Home Automation Group expands its line of IP video door intercoms with the new DoorBird D2101IKH. This new model is equipped with an info panel and an integrated keypad for access control PIN codes. Further components of this powerful door intercom and access control solution include a wide-angle camera, RFID reader, one call button and two-way audio system. Backlit info panel The DoorBird D2101IKH IP video door intercom is weatherproof and made of stainless stee...
As a provider of facial recognition and other biometric, as well as information and communications technologies, NEC Corporation welcomes greater industry collaboration and effective discussion for the future of facial recognition technology and business. As a point of background, NEC produces face, iris, fingerprint, palm print, finger vein, voice and ear acoustic recognition technologies, and has over 700 biometric recognition installations in over 70 countries around the world. In recent weeks, the company has seen renewed calls for government regulation and discussions about how they as an industry can build a foundation of responsibility to protect people against discrimination, invasions of privacy and violations of human rights. NEC Corporation welcomes this debate as they believe it will lead to solutions that can make our world a better place. Furthermore, they are eager to move the discussions forward. Identifying travellers using facial recognition The Department of Homeland Security is using facial recognition technology at more than a dozen airports to positively identify travellers As more companies come forward to add their voices to this dialogue, Takashi Niino, President and CEO, NEC Corporation, believes the company will start to see new and different roles that these technologies can play in protecting and improving our global communities. In the United States, for example, the Department of Homeland Security is today using facial recognition technology at more than a dozen airports to positively identify travellers entering and exiting the United States. Three days after the technology was introduced at Dulles International Airport, an imposter was stopped using a fake document. As recently as late November, the lead architect of this system from U.S. Customs and Border Protection (CBP) reported that it had identified at least 36 imposters so far. Additionally, the first curb-to-gate biometric experience in the U.S. just launched at a major international airport terminal to a positive customer response, potentially changing the future of travel. Protecting society and securing borders NEC, therefore, supports various governments' considerations for reasonable policy, setting privacy standards for personal information and preventing unlawful discrimination related to this technology. Businesses, consumers, and the government should work together to help balance the need for privacy with the benefits of protecting our society, securing our borders and providing consumer convenience without the fear of negative consequences. NEC has a decade-long leadership position and pedigree where NIST evaluations of our facial recognition technologies are concernedAccuracy is vitally important to the effectiveness of biometric technologies. NEC is committed to the National Institute of Standards and Technology (NIST) and their evaluations. NEC has a nearly decade-long leadership position and pedigree where NIST evaluations of our facial recognition technologies are concerned, and you can read more about it on our global website. Digital Trust Business Strategy Division In addition, NEC has established a ‘Digital Trust Business Strategy Division’ to create and promote a strategy based on ‘Human Rights by Design’, considering the impact of the adoption of artificial intelligence (AI) on society and the utilisation of biometric information on human rights and privacy. NEC seeks an adoption path for these technologies that is in line with the worldwide principals of freedom, justice, rights to privacy, transparency and continuous improvement. NEC strongly believes that facial recognition can add significant value to our lives.
The American National Standards Institute (ANSI) has appointed Susan Carioti, the vice president of certification, standards and guidelines at ASIS International, to a three-year term as a director-at-large on the ANSI board of directors. Standards and conformance-based solutions As a director-at-large, Carioti will work with members of the board to determine and approve the policies and direction of ANSI’s strategic vision, and in close collaboration with stakeholders from industry and government, to identify and develop standards and conformance-based solutions to national, international and global priorities. “The role at ANSI is quite an honor and recognises ASIS’s commitment and grit as both an accredited standards development organisation and certification body,” said Carioti. “I look forward to continuing this important work and raising the bar with ASIS members and the security community.” ASIS National Standards Development Program Carioti joined ASIS more than a decade ago, and as an ANSI-accredited standards developer, established ASIS’s credible national standards development program. In addition to overseeing the ASIS standards program internationally by way of ISO security, risk and resilience activities, she provides strategic direction and management in advancing ASIS certification programs in conformance with ISO 17024 Personnel Certification accreditation requirements. An active participant in numerous ANSI groups for more than twenty years, Carioti currently serves on the ANSI appeals board and served many years on the ANSI executive standards council. “Sue’s experience and expertise are a valuable addition to the ANSI Board,” said Fran Schrotter, Sr. VP & COO, ANSI. “She has demonstrated tremendous commitment and drive for excellence in ANSI standards and conformity assessment activities. We more than welcome her ideas and contributions.”
Spearheading the intercom sector with cutting-edge technologies and unique applications, Akuvox earned the spotlight at four recent security trade shows. The excitement surrounding Akuvox’s booths included cloud intercom solutions, smart home integration and the use of artificial intelligence. Akuvox cloud intercom solutions Over 80% of Akuvox’s visitors inquired about its cloud intercom solution. This indicated that it’s the prime time for the industry to adopt cloud for stellar user experience and additional revenue streams. Unlike its competitors, Akuvox offers more flexible solutions which better align with diverse requirements of different countries and regions. Though rooted in security and communication, Akuvox also received much attention from smart home professionals. Harnessing the power of Android via a decade’s R & D, Akuvox provides an easy solution for converging intercom with home automation. Its Android indoor monitor runs smart home apps like Zipato, Fibaro, iRidium and Control4 without a glitch. AI-enabled door phone, R29S Moreover, the AI-enabled door phone, R29S, definitely caused a stir. Visitors flocked to the booths to try out its facial recognition feature. A disruptor, Akuvox is among the world’s firsts to introduce AI into intercoms. By continuously optimising the algorithm since then, R29S is now able to carry out split-second verifications with high accuracy. A home base of deep innovation legacy, bright technical minds and strong service awareness, Akuvox is well-positioned to increase the value not only for homes and buildings, but also for its partners.
Matrox Graphics Inc. is pleased to announce that the Matrox Mura IPX 4K DisplayPort capture and IP encode/decode cards are now shipping. These new dual DisplayPort 1.2 video wall cards feature 4Kp60 with full 4:4:4 colour sampling support alongside a dedicated onboard network interface controller (NIC), offering the most advanced capture, encode, stream, record, and decode capabilities from a single card. The Mura IPX capture cards are ideal for OEMs and system integrators looking to build cutting-edge video wall controllers that deliver fast-moving video content and high-frequency desktop graphics and text to local and/or networked videos walls. Active cooling options Available in passive and active cooling options, the all-in-one Matrox Mura IPX cards feature two full-size DisplayPort 1.2 connectors for native capture of 4Kp60 physical sources, while the network connector enables the encoding and decoding of up to two 4Kp60, four 4Kp30, eight 1080p60, sixteen 1080p30, or exponentially more SD streams. System builders now have a building block to satisfy the increasing requirements of multi-4Kp60 content and can continue to mix and match System builders now have a building block to satisfy the increasing requirements of multi-4Kp60 content and can continue to mix and match from a wide selection of Matrox video wall cards to construct scalable, high-density, low-footprint video wall systems. Cost-effective integration “The new Mura IPX capture cards address two major pain points for the video wall industry,” says Fadhl Al-Bayaty, business development manager, Matrox Graphics Inc. “First, is the ability to capture and transfer multiple 4Kp60 channels over the bus without any colour-quality degradation. Second, is the inclusion of IP technology directly on the board, a critical differentiator only available with Matrox capture cards.” “The ability to simultaneously stream, record, and decode while capturing physical signals from one board makes the new Mura IPX products the most powerful capture cards on the market. This industry-unique design translates into a smoother, more cost-effective integration process for OEMs and system builders looking to deploy high-density video walls.”
ISC East, in collaboration with premier sponsor, the Security Industry Association (SIA), reported strong growth results at the conclusion of this year’s industry event in New York City. The International Security Conference & Exposition is the Northeast’s largest security trade show, where close to 7,500 security and public safety professionals convened this month to meet experts from over 300 leading security brands, all the while co-locating with the launch of Unmanned Security Expo New York and Infosecurity North America, Europe’s global information security event. Welcoming 85 new companies and brands and close to 1,000 more industry professionals compared to 2017, the ISC East exhibit hall bustled and featured expanded in-depth content - including new technologies and product categories, more special events/networking opportunities, and a variety of all-new complimentary education through SIA Education@ISC and Unmanned Security Expo New York. Comprehensive Security for a Safer, Connected World The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there" Mary Beth Shaughnessy, Event Director for ISC Security Events, noted, “It was exciting to see such a robust expo floor and high attendance growth with our New York event this year, all while matching up to our brand theme of Comprehensive Security for a Safer, Connected World. The top attended education sessions were formed around a diverse spectrum of topics including cyber-physical integration, converged security for smart cities buildings, the impact of IT and AI on video surveillance/intelligence, critical incidents prevention and mitigation, plus drones, drone-detection, drone-regulations and policies, and more. The present and future is bright for ISC East and we are committed to providing great solutions and education for this community.” Over the past 4 years, the ISC East Show Floor has grown by over 60% in square footage and has come to be known as ‘the highlight of the year,’ stated by Linda Esposito, Security Specialist of US Postal Inspection Service. “The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there. In addition, Alex Pachikov of Sunflower Labs, a first-time exhibitor at Unmanned Security Expo, commented, “This was the perfect venue for us to introduce the Sunflower Labs drone-based security system. We had the perfect audience and fantastic exposure to potential customers, installation partners and system integrators.” Unmanned Security Expo Additionally, while Unmanned Security Expo presented 15+ sessions dedicated to the in-depth issues, policies and opportunities for UASs and UGVs, the SIA Education@ISC East program offered 25+ complimentary education courses and highlighted two distinct Keynote Speakers for the first time at ISC East - Philip Halpin, Senior Vice President & Head of Global Security for Brown Brothers Harriman, and James A. Gagliano, Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor at St. John’s University. SIA Education@ISC East 2018 SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in education sessions, engaging keynotes and hands-on workshops" “SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in our education sessions, engaging keynotes and hands-on workshops,” said Don Erickson, CEO of the Security Industry Association. “This year’s sessions highlighted cutting-edge topics like the move to smart cities, convergence in the security industry, the use of artificial intelligence in video analytics, and how some legacy connections leave modern access control data vulnerable to hacking.” With so much learning and knowledge-sharing happening on the show floor, security professionals still found time to participate and engage at the numerous special events that ISC East had to offer, including: the first-ever SIA Women in Security Forum Breakfast, the new Mission 500 Hygiene Kit Building, the ever-popular ASTORS Homeland Security Awards, ISC East’s Featured Product showcase featuring some of the most innovative product technologies, a high-profile celebrity appearance of former NY Yankees player Tino Martinez , the signature ISC East Grand Opening Ceremony, the Crack the Tap Cocktail Reception, and so much more. ISC Security Events As ISC East comes to a close, the ISC Security Events portfolio continues to provide comprehensive security for a safer, connected world through ISC West and Unmanned Security Expo, and Connected Security Expo taking place on April 9-12, 2019 (SIA Education@ISC: April 9-11 | Exhibit Hall: April 10-12) in Las Vegas.
IP communications enabler Softil today releases its Outlook 2019 for the Mission Critical Communications industry. For Softil, enabling Mission Critical Communications (MCC or MCX) will be its fundamental mission for the year ahead accelerating the transition to 21st century technologies for people whose jobs help and save the lives of others. "Softil sees 2019 as the year when MCC solutions and services finally get into the hands of First Responders be they the armed forces, police, ambulance or other emergency service groups, as well as professional radio users in the fields of transportation and mining among others," says Sagi Subocki, Softil's Vice President, Products and Marketing. "The year will see First Responders and professional radio users becoming better supported in their tasks through the applied use of technology." Dual-mode devices The emergency worker's device is not an interworking appliance, but instead, it can simply allow users to be connected to both worlds - simultaneously The year 2019 will see First Responders begin supplementing the humble radio so trusted by multiple generations of firefighters, police officers and emergency workers over the years with smartphones. At first, these might also be dual-mode devices, combining LMR and LTE capabilities. Once smartphones become commonplace in MCC, all will be able to work faster and better. It is nice to envision how new generation of the technology replaces the old generation in a blink of an eye - just like you see in the movies. This is not how it happens in real life - the old and new must peacefully coexist for a while. Moreover, they do not just coexist, but rather interwork. The emergency worker's device is not an interworking appliance, but instead, it can simply allow users to be connected to both worlds - simultaneously. High speed rail networks We should see LMR devices being extended with MCPTT capabilities first before full-blown MCX devices completely replacing them. Softil predicts that quite a few dual-mode radios will appear on the market during 2019. Mission Critical Communications for trains, commonly referred to as LTE-R, are already deployed, but on a limited scale. Today, South Korea is leading the railway world with new MCC LTE-R terminals deployed on its high speed rail networks. However, as the standards for MCC for Railroads are in the final stages with 3GPP Release 15 providing the base, and Release 16 defining the necessary changes in architecture, Softil expects many more LTE-R trials and deployments over the next 2-3 years - especially as GSM-R (old communication technology for trains) will sunset in 2025. Unassociated videos The console will become the critical element in the interconnection of the LMR and MCX worlds and be in service before the end of 2019 The Dispatch Console is a critical element of emergency communications - someone has to have a ‘10,000 foot view’ of everything happening with First Responders in real time to coordinate all activities. This is where the dispatch console operator comes into play. As MCC over LTE trickles onto the front line in 2019, dispatch consoles will manage video streams, video communication, chats and more. The console will become the critical element in the interconnection of the LMR and MCX worlds and be in service before the end of 2019. It is essential to keep track of what is happening on the front line - we need to create records of all the activities of emergency workers at all times. In the past, voice and some unassociated videos were recorded, but in the new MCX world, there is a mass of data that needs to be recorded and archived. Provide reliable connectivity This spans audio, video, chat, location and much more from a vast array of supplementary data from ‘Life-saving things’, commonly known as IoT devices. The industry will see the first recording solutions appearing in 2019 as they are critical for the overall MCS umbrella. In the mining industry, communication is a key element of the ecosystem and on a par with all the sophisticated machinery and tools in use. MCC over LTE new communication capabilities, such as video, chat and file exchange, offer great advantages to miners over the traditional radio. However, common LTE towers cannot provide reliable connectivity inside mines and such deployments will require private LTE. Softil expects pilot Private LTE with MCS (Mission Critical Services) setups to go into trials in 2019, with full-scale deployments in 2020/2021. Offering greater speeds 5G developments are advancing quickly, driven by the insatiable appetite for speed, bandwidth and full QoS/QoE spectrum of humans and machines alike 5G developments are advancing quickly, driven by the insatiable appetite for speed, bandwidth and full QoS/QoE spectrum of humans and machines alike. Core 5G trials are already under way around the world, but that doesn't affect MCX at the moment. However, Softil expects to see some alignment of MCX technologies with 5G networks and architectures in the next 3GPP Release 16 (due December, 2019) and further enhancements in Release 17. The year 2021 will most likely will be the year when MCX will commercially start running on top of 5G, offering greater speeds and capabilities. ProSe is the 3GPP standard for direct, or so-called Device-to-Device communications. This is essential for MCC as it is always possible that in the course of emergency operations, the macro network will become unreachable. First responder smartphones In this event, First Responders must still be able to communicate with each other, so this is a critical need to make daily use of MCX over LTE possible. The year 2019 might be the year when ProSe begins its journey. However, thanks to dual-mode devices, LMR will still be there for device-to-device communications. Voice controls are not new - Siri and Alexa have been helping with everyday tasks for several years now, but as First Responder smartphones appear, Softil expects that voice controls will be elevated to the next level of importance in 2019 with commands such as ‘alert all my group members,’ ‘show me the map,’ ‘start recording my video,’ and ‘switch my primary camera’ becoming commonplace - all while wearing gloves. Early market trials MCC over LTE devices will get into the hands of users adding the ability to use special goggles with embedded screen and eye control Climbing mountains or even stairs is done one step at a time. MCC over LTE devices will get into the hands of users adding the ability to use special goggles with embedded screen and eye control. This is already available in many virtual reality (VR) games and will become a natural extension. Softil does not expect VR UI to become mainstream in 2019, but some early market trials should see the light. Emulating the Black Mirror anthology TV series that explores how humanity's greatest innovations and darkest instincts collide, Softil expects that adding Augmented Reality capabilities to VR UI goggles will emerge in 2020/2021. Looking at a person's face, a car's license plate or a store's name, these smart goggles will quickly produce and visualise all the information available on any person or object. Practical solutions The Internet of Things (IoT) is a vast space of tiny sensors, devices, modules and systems - all communicating with each other and producing petabytes of data aided by AI capabilities to make sense of it all in real time. Nothing is immediate with IoLST, but expect some interesting trials to begin in 2019, and practical solutions coming to market in 2022-2025 When it comes to the world of public safety and emergency communications, IoLST holds tremendous promise, offering capabilities such as detection of ‘shots fired,’ ‘officer down,’ the ability for a firefighter in a building to take control over sprinkler systems and emergency valves from his/her MCX handset, and to connect and communicate with any car or infrastructure on the road (collectively known as V2X) and much more. Nothing is immediate with IoLST, but expect some interesting trials to begin in 2019, and practical solutions coming to market in 2022-2025. Unbreakable trust relationships Blockchain technology allows the establishment of strong, secure and unbreakable trust relationships amongst a large enclave of ‘things’ Every industry has jumped on the blockchain bandwagon looking for practical use and applications for such a promising technology. Without any regards to the blockchain, MCC is currently living its own revolution in moving from the traditional radio to broadband technology. Once broadband MCX becomes mainstream, the public safety and emergency communications industries will look into blockchain technology as a possible solution to streamline and simplify day-to-day operations. It is unlikely that blockchain powering First Responder communication solutions happens before 2023, if at all.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
As the world continues to become more connected, it’s becoming increasingly important to adjust security and safety procedures in the workplace. But today’s ever-evolving office environment can present unique safety and preparedness challenges. No two businesses are exactly alike, with some located in numerous buildings or spread out across campuses, while others have employees that frequently journey from different locations, work remotely or travel internationally. With this shifting environment, Rave Mobile Safety’s recent Workplace Safety and Preparedness survey asked over 500 full-time employees in various industries across the United States about their views on safety at work and emergency preparedness. Preferred safety measures Only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situationsThe survey looked at how employees and companies respond to various workplace emergencies: workplace violence, active shooter, medical emergency, fire, hazmat incidents, weather events and cyberattacks/system outages. Respondents provided insight on the current state of safety in their workplace, as well as how they want to be contacted when an emergency occurs. Though opinions on the preferred safety measures differed between generations and also between on-site and offsite workers, one fact remains consistent: there is much to be done to instil a better sense of safety in the workplace. While the findings show that employees feel safe in their workplace, only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situations. Quick thinking Of the plans currently in place, excluding fire, 57 percent of the other major emergency plans were rarely or never tested. With so few drills in place, employees are left not knowing the best ways to respond to emergencies like weather events or hazmat incidents or if their employer recommends a certain response to situations like medical emergencies. Testing these plans is essential so that all employees, whether they are new to the company or not Even if plans are in place to begin with, not ensuring your employees understand and are comfortable with how to react to certain situations, can put the organisation in harm’s way. Testing these plans is essential so that all employees, whether they are new to the company or not, have the appropriate response top of mind and their actions become second nature during a situation that will likely require quick thinking. Workplace violence Instilling regular practices will only further ensure that responses will happen seamlessly, regardless of the emergency. Beyond the general awareness of drills and practices, most surprising in the responses was the fact that 34 percent of female respondents were unaware of workplace violence emergency plans. This is particularly shocking because workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour Statistics. This shows an obvious lack of preparedness from organisations. It’s immensely important that employees to understand the relevant dangers of the workplace, especially when alternative could have a fatal result. The differences between baby boomers and millennials in the workplace is a common barometer showing how the workplace is continuing to change. Emergency plans Workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour StatisticsWhat may have worked for previous generations must be reworked and adjusted so every generation is made aware of and understands the plans and procedures in place. These changes can help make workplace safety plans fresh and continuously relevant. With that in mind, millennials currently represent the largest segment of employees unaware of emergency plans for major workplace emergencies. 38 percent of this age group are unaware of existing emergency plans, compared to just a 28 percent average of employees over the age of 35. This could be associated with the fact that some organisations are not communicating plans with newer employees or even that organisations that employ a significant number of millennials might not have plans in place at all. Affecting everyday work If the newest generation is unaware of these plans, then it is only a matter of time before Generation Z enters the workforce and is in even worse position when it comes to emergency awareness. The survey results showed that on average, workplaces use two methods of communication for emergencies Feeling safe and secure at work should not be something that workers need to focus on, however more than a quarter of respondents that work remotely said that worrying about safety is exactly what is affecting their everyday work. With that in mind, it’s even more concerning to see that there seems to be a clear divide between current methods and preferred methods of communication during an emergency. The survey results showed that on average, workplaces use two methods of communication for emergencies, with the top two being intercom system announcement/building alarm (27 percent) and email (22 percent). Mass text messages At first, these methods seem to cover both remote and in-office employees, but survey results actually showed that both groups preferred and would be better reached during other methods. While email is the second most common emergency method currently in place by organisations, it actually ranks as the fourth most preferred method at a mere 11 percent. Even with a clear preference towards communication via mass text messages by respondents (39 percent of remote workers prefer this method), less than 20 percent of companies actually take advantage of this technology. This clear disconnect shows that organisations must find what works best for their employees instead of using methods that were previously established or that are just currently being used. Preparedness plans What remains important for organisations, regardless of size or industry, is to keep emergency preparedness plans ever evolving Communication can not only be essential to alert employees to everyday situations, like office closures, but it is also imperative in preventing emergencies to escalate when they do occur. Although this survey discusses the current state of safety in the workplace, it’s that the disconnect between employee perceptions and employer polices that’s the most concerning. Companies need to take steps to understand how their employees would like to be reached during an emergency, as well as how employees would also like to reach out to management to report their own concerns. What remains important for organisations, regardless of size or industry, is to keep emergency preparedness plans ever evolving and well communicated, so your employees are confident in the emergency plans in place. By proactively planning and practicing for emergency events through table top exercises and drills, employers can demonstrate their commitment to employee safety and preparedness and build employee confidence.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorised access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT device security management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyses data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyse more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified vendor agnostic software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing connected devices from cyber threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Information can be a scarce commodity in the midst of terrorism or a mass shooting incident. Information can also save lives during the first critical moments of such events. The general public can now download a free smartphone app that provides instantaneous real-time information as a terrorism or mass shooting event is unfolding. TerrorMate crawler software Called TerrorMate, the app began development in 2013, in the wake of several terrorist attacks in France. People in the affected areas were relying on media sources, which sometimes do not provide information on a real-time basis as an event unfolds. To provide information faster, TerrorMate’s proprietary “crawler software” uses more than 200 key words to monitor Internet, social media and “dark web” sources. They also monitor Telegram channels, which are private encrypted messages that terrorists use to communicate. TerrorMate has access to four channels used by the Islamic State. Know your enemy Any leads are then confirmed using 1,100 human sources “on the ground” around the world, including contracted security consultants and law enforcement. TerrorMate employs 15 analysts and 10 software developers who work in a global control room in Belgium 24/7 to monitor any situations. Unlike media professionals, who are monitoring a range of news stories in a variety of fields, TerrorMate operators are focused solely on terrorism and mass shooting events. TerrorMate’s proprietary “crawler software” usesmore than 200 key wordsto monitor Internet, social media and dark web sources “We keep up with what the threat is doing,” says Barry Oberholzer, founder of TerrorTech, the developer of TerrorMate. “You need to know your enemy. We keep analysing and researching so we know the enemy. Mass shootings are hard to predict, and terrorists keep changing their methods, from suicide bombings to vehicle attacks. The game keeps changing, and we see that and keep up to speed on what they’re doing.” Intelligence communication TerrorMate also keeps up to date by communicating with authorities around the world, ranging from an intelligence agency in Spain to the customs and immigration services in Great Britain, from Belgium’s state security services to France’s national police. In addition, TerrorMate is an authorised alert distributor of the Integrated Alert and Warning (IPAW) system operated by the U.S. Department of Homeland Security and the Federal Emergency Management Agency (FEMA). Mission goals TerrorMate has a two-pronged mission. One goal is to provide actionable intelligence to law enforcement to help prevent an imminent attack. If TerrorMate personnel identify a possible threat, whether on social media or the dark web, they confirm the information and then communicate it to local law enforcement. The second goal is to provide real-time information to the general public about terrorism and mass shooting events. The app can be downloaded from the iTunes app store or Google Play. TerrorMate employs 15 analysts and 10 software developers who work in a global control room 24/7 to monitor any situations In addition to providing timely reports, the TerrorMate app includes a “safety guide” during an attack, advising phone numbers that users can call or people they can contact for additional information; listing which areas they should avoid; which public transport systems are functioning, etc. The goal is to get people to safety as soon as possible. During an attack in Barcelona on August 17 this year, the app provided a discount code to enable users to get a free taxi ride home from the affected areas. Tailored location alerts Because the app uses the smartphone geolocation feature, TerrorMate can send tailored alerts based on where a user is located. Users can also choose whether they want only local (in-country) or international alerts. Users may upload media, including photos and video, to the app; all information is verified by the TerrorMate control room and then shared with authorities. Because the app uses the smartphone geolocation feature, TerrorMate cansend tailored alerts basedon where a user is located The app also allows users to share their location with a list of contacts, in effect enabling users to see where their loved ones are during an incident, and to send and receive messages. The feature was developed after the May 2017 bombing at an Ariana Grande concert in Manchester, United Kingdom, when parents needed information on whether their teenagers were safe as the tragedy unfolded. Vehicle integration TerrorMate will integrate with vehicle systems such as OnStar and Uconnect within the next six months. Companies may also subscribe to the service. A benefit is early warning of a terrorist event that might impact a company’s operation. For example, one stock broker subscribes to the service to get early warning of any incident that might negatively impact stock prices. Corporate licensing fees are one source of potential revenue for the company, which currently is self-funded and has little revenue, according to Oberholzer. Identifying what constitutes a mass shooting is not always a clear-cut process, and often the determination happens in real-time. The basic criteria TerrorMate uses is multiple casualties in a highly populated area. Analysts make the call based on real-time information as it comes into the control center about an unfolding incident. Any early information that is reported is labelled as a “possible” mass shooting until it is confirmed. TerrorMate is currently available in English, French, German, Spanish, Italian, Russian, Korean, Japanese, Chinese, Dutch, Swedish and Portuguese.
The Polizei Bayern successfully opened its first operations centre in mid-September at its Police Headquarters in Central Franconia in Nuremberg. At the heart of the communication system was the Frequentis 3020 LifeX platform including digital radio connections and the newly developed AudioHub. The headquarters in Nuremberg is the second largest operations centre in the German state of Bavaria. It comprises 21 operator working positions that receive and process between 800 and 1,200 police calls per day. In the event of an emergency, an additional 13 operator working positions can be activated. Dispatch calls successfully Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours. The system proved its stability and operators were able to dispatch calls successfully without issue. "The professionalism of Frequentis during the preparation, implementation and follow-up commissioning of the system gave us confidence in their abilities. All of the aspects important to us as customers were immediately considered and processed by the Frequentis team. Above all, the usability of the system was well received by the operators.", said Anton Beierweck, Head of State-wide IT Procedures at the Police Headquarters Upper Bavaria South. Provides highest protection LifeX was first deployed for Bavarian Police Force in 2015, ahead of the G7 summit. The system was adapted to the needs of the event which required 18,000 emergency services personal to protect government leaders and control demonstrations. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020 "What has been clear from the start of the project is the willingness of the Polizei Bayern to innovate. We are very proud to have met their high requirements in terms of technology and services and appreciate the professional cooperation with the organisation who provides the highest protection and security in Bavaria.", Robert Nitsch, Frequentis Vice President Public Safety. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020. Two more operational centres are planned to be brought on line before the end of 2018.
From 2019, Airbus will embark on the modernisation of the PMR (Professional Mobile Radio) network of the Berliner Verkehrsbetriebe (BVG) public transport company. By 2020, the PMR provider will have overhauled the network infrastructure and converted the system to Internet protocol (IP). Airbus has also concluded a service agreement with the BVG until 2025. Airbus will provide the Berlin-based company with advice and support over the course of the modernisation process. The entire contractual package also comprises, alongside the technical retrofitting, the supply of the latest technology, such as an IP-based switch and an in-service maintenance and service provision. Communicate more securely The partners have also agreed to the possibility of progressively expanding the network with other base stations and to run these using the simulcast technology. Simulcast, also called Single Frequency Network, allows all base stations to transmit on the same frequency. This means that signals can be propagated very well over large areas. With the upgraded Tetrapol network, drivers and the control centre will be able to react more efficiently to all kinds of situations Since the network was rolled out in 2001, Airbus has partnered with BVG and, with its modern radio technology, it will make a further important contribution to the efficient running of Berlin's bus traffic. With the upgraded Tetrapol network, drivers and the control centre will be able to react more efficiently to all kinds of situations and to communicate more securely. Safe transport system The modernisation also implies an increase in the system’s capacity so that it can transmit even greater volumes of data. For approximately 2,100 radio users at the BVG, the Tetrapol network was made even more robust and user-friendly. A total of around 14,600 people work for the BVG and its subsidiaries to provide an environmentally friendly, reliable and safe transport system for more than a billion travellers each year. To coordinate the complex bus traffic in Berlin, the company built the Airbus Tetrapol network around nine base stations. Buses run on more than 150 lines over a catchment area of approximately 1000 km². The BVG also operates night buses on more than 60 lines, along with 22 tramway lines.
Maxxess, the innovative security management and communications solutions, partnered with the Santa Ana Unified School District (SAUSD) to deploy a powerful new security and operations solution that leverages the power of smart mobile devices to maintain comprehensive communications and emergency management operations. Maxxess Ambit, which provides private, two-way, managed messaging and intel on a more personal and intuitive level, received its first wide-scale test during the SAUSD’s annual earthquake preparedness drill called the Great Southern California ShakeOut. SAUSD used Maxxess Ambit as their primary communications solution during the Great Southern California ShakeOut drill “The 2018 Great Shakeout drill was more realistic than in years past,” said Camille Boden, Executive Director or Risk Management for the Santa Ana Unified School District. She further added, “With Maxxess Ambit, our Emergency Operation Center (EOC) was able to receive simulated eyewitness accounts and requests for assistance from multiple staff members at schools across the District. The information with GPS locations provided by Maxxess Ambit came into the EOC rapidly, providing first responders with the specific details they would need if we really had experienced a disaster. The drill tempo was accelerated and provided real-world insight as to what the District could possibly experience in the event of a massive earthquake.” Maxxess Ambit’s “see it, say it” SAUSD used Maxxess Ambit as their primary communications solution during the Great Southern California ShakeOut drill. Maxxess Ambit’s “see it, say it” application kept SAUSD’s EOC fully informed of missing people, dangerous situations, property damage and more during the emergency simulation. This allowed the EOC’s staff to instantly generate various reports and assign the appropriate personnel to respond. One report that came in during the drill was from a school needing to be evacuated, which was immediately assigned to SAUSD’s logistics personnel. Logistics then called the school transportation service and directed them to the correct pick-up spots. The EOC at SAUSD not only took action on reports that came in but was able to anticipate issues resulting from the information collected with Maxxess Ambit. All EOC’s actions were captured for reporting and future audits within Maxxess Ambit. Mass notification During an earthquake scenario, Maxxess Ambit can broadcast a mass notification that will be sent to all users of an organisation During an earthquake scenario, Maxxess Ambit can broadcast a mass notification that will be sent to all users of the organisation, by site, by department or even by selected user groups. This allows emergency personnel to quickly monitor staff status, communicate with staff members using an organised interface, and help first responders act efficiently. As end users respond to the mass alert broadcast, a geo-tag is placed on a map to correspond with each mobile user’s location. Unlike systems that handle only one aspect of communications like a mass texting tool, Maxxess Ambit also addresses longstanding security challenges by transforming the way organisations operate on a daily basis. In a school environment, for example, a staff member can activate a duress report via Maxxess Ambit in the event a meeting is becoming emotional or tense. Real-time chat session The report would appear on the mobile devices of the school’s security team, enabling a real-time chat session while continuously tracking the staff member’s location. This unique combination of features empowers total awareness by making administrators, teachers, staff and students an integral part of the security solution. Maxxess Ambit is a cloud-based solution that does not require a capital investment in any hardware or servers and is deployed like a mobile app with all information logged into the system for compliance and audit purposes.
With a mission to provide and maintain good quality homes for Blackpool Council’s tenants and leaseholders, BCH has won a number of awards and accreditations for housing, repairs, customer services and community projects. The safety and security of residents is a high priority for BCH, which is why it has used products from STANLEY Products & Solutions for many years. During this time the primary system was made up of a GDX5 door entry system, along with an Indigo 1000 access control system, which were fully integrated. “We have a policy of continual improvement in the service we provide,” explains Anthony Walker, Mechanical & Electrical Officer at BCH. “Although the previous configuration performed well, I was convinced that the business and operational benefits of remote monitoring and the cloud could be utilised by upgrading the Indigo 1000 with a PAC 512 access control system.” Innovative remote monitoring platform The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each doorAn upgraded system was specified for a BCH site comprising 80 blocks. It utilises the existing GDX5 front panels, which have been integrated with the PAC 512 controllers to create a highly innovative remote monitoring platform that can be accessed via a PC, tablet or smartphone. This is achieved using a general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. It provides an enhanced service over traditional mobile/landline telephone connections and makes administration of the system more flexible. The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each door. Each door also has a programmable auxiliary input that may be used for alarm system integration, and an auxiliary output that enables a buzzer or strobe to activate when security is breached or a door is left open. Email alerts during equipment failure In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored, while the system features an auto-dial or email alert program that, in the event of an equipment failure at one of the locations, sends a notification so that the issue can be quickly rectified. In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restoredExplaining the benefits of using PAC 512, Andrew Burton, area sales manager at STANLEY Products & Solutions, says, “The cloud revolution has had a dramatic effect on the physical security equipment industry. Its development into access control technology means that not only can a system be managed remotely, specific personnel can even be granted or denied access to certain areas at different times, making it not only good for security but also for health and safety. “Furthermore, in the event of a theft or antisocial behaviour, it is possible to pinpoint exactly who was where and initiate appropriate action, using the live events and reporting.” Remote diagnostics and servicing BCH can also access information via the PAC Residential Cloud – helping to further enhance its remote monitoring operation. Remote diagnostics, technical issues and servicing can be carried out, and it’s also possible to remotely view status, set and unset a system and access an event log. For instance, if someone loses a key fob, BCH can access their information, carry out an authorisation check, let them into their abode and, if necessary, deactivate the missing device. It also allows the incumbent installer to remotely access the system’s software to physically input any special information such as extended door release times for specific residents. Programming key fobs remotely BCH worked with STANLEY to generate reports which show when a key fob hasn't been used for a specific period of timeWith a number of vulnerable residents, BCH worked with STANLEY Products & Solutions to generate reports which show when a key fob hasn't been used for a specific period of time. Anthony Walker comments, “If the report indicates non-use of a fob, we can take measures to deactivate it, and/or can send someone over to check on the person concerned and, if necessary, notify next of kin or the relevant authorities. “In extreme circumstances, we can also remotely open doors to allow access to the emergency services. Having the ability to immediately and remotely program fobs has been particularly beneficial to our customers who previously would have had to travel to our offices for this to be completed - saving both time and money and making best use of our resources.” Seamless migration to cloud With a large number of residents, each with their own key fobs, Anthony Walker was keen to avoid any disruption during the upgrade and wanted to ensure that the process was achieved as seamlessly as possible. Configuring the physical hardware was helped by the installation team’s existing knowledge of STANLEY Products & Solutions’ technology. On-site training was also provided by experts from STANLEY Products & Solutions and, on the very rare occasion when there was a problem, a full support and advice package was available. The use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforwardInstalling a new access control system can often result in replacing existing key fobs with new ones – not only is this costly and inconvenient but there is also an administrative burden associated with transferring all the information to the new devices. However, all these issues were circumvented, as the use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforward – so much so that tenants didn't even realise any change had taken place. In addition, having access control data in the cloud means that it is always backed up. Enhanced safety and security BCH’s Anthony Walker considers the installation a total success and concludes, “I initiated this upgrade project because I firmly believed that it would improve tenant satisfaction and make our overall operation more efficient.” He further added, “I’m delighted that both of these objectives have been achieved and that STANLEY Products & Solutions’ access control technology has improved security, safety and protection across our estate.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras with built-in video analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control centre in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfils the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
One of East Scotland’s largest independent housing associations, Fife Housing, has teamed up with access control and door entry experts, Videx, to equip 84 flats in and around the Fife area with bespoke access control systems, that have been tailormade to meet the entry requirements of residents. Working with installer Caledonia Fire and Security, Videx has supplied audio intercom systems to 14 blocks of flats, which each carry key features that make them an ideal access control solution for housing association tenants and their various entry needs. The panels are also fitted with Videx’s standalone offline proximity system, MiAccess, which works as part of a multiple entrance system without the need to cable between devices. Robust access control solution Billy Paton, Scotland and Ireland Sales Manager at Videx, said: “The requirement was clear - Fife Housing needed a robust access control solution that was simple to use and navigate yet highly secure. The panels we made are to a bespoke size with many features to suit the specific needs of those who live there. For example, the panels included high visibility yellow ring bezel buttons that help the partially sighted.Videx has supplied audio intercom systems to 14 blocks of flats, which each carry key features that make them an ideal access control solution What’s more, the MiAccess proximity also means that the programming of fobs can be done remotely saving time, money and helping to reduce the carbon footprint because an engineer doesn’t need to go out to the developments each time a fob has been lost or damaged and needs replacing. Housing staff are also given a master card which allows access to each individual tenanted block.” All block panels are also engraved with appropriate numbers and addresses required, which is a key part of the bespoke service offered by Videx, that many housing associations find useful because it enables call buttons to be specifically named or labelled, helping the caller to speak to the right person when they visit or highlighting a concierge service/emergency number facility. Bespoke service for new access control Fife Housing are really pleased with the new system, with residents expressing great feedback on how easy to use they are while being a nice, modern design too. David Todd, Contract Officer at Fife Housing, said: “Security yet ease of access and a user-friendly system that could be specifically made to meet the entry needs of all different types of residents, including those with disabilities, was imperative and the Videx system has provided exactly that. "What’s more, the team have been really supportive and hands on throughout the entire installation, working closely and positively with our installer and providing technical and practical advice both pre, during and post installation. The panels are also fitted with Videx’s standalone offline proximity system, MiAccess"I also know that if I had any issues with the system, or need to modify it according to entry needs, this wouldn’t be a problem and Videx would be on hand to help us do this. It’s been a pleasure to work with Steve and the team - the system is doing a sterling job.” Seamless installation process Andrew Thomson, Director at Caledonia Fire and Security, added: “The access control system we installed into each of the 14 Fife Housing blocks are not only manufactured to a high quality but look the part too which is not always easy to find. The intercom systems, including the MiAccess integration, were absolutely perfect for this development and, from an installation point view, such a seamless process. "No cables, no fuss, no downtime. We install a lot of Videx systems across Scotland, and we’ve always found the products to be first class, as well as their bespoke approach and high level of technical support if we do need help when installing a system, either in the form of training pre-installation or onsite assistance during installation or just after. We couldn’t fault them.”