OnSolve, the global provider of mass notification and critical communication solutions for enterprise, small business, and government organisations, announced the acquisition of Stabilitas, a situational awareness provider that leverages artificial intelligence and machine learning to identify adverse events, analyse the risks posed by those events, and provide stakeholders with actionable threat intelligence. Critical event information Stabilitas’ AI solution constantly ingests more tha...
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that a patent infringement lawsuit initiated by a non-practicing entity (NPE) was withdrawn by the NPE, at an early stage of the proceedings. “We don’t negotiate payment with patent trolls,” said Pierre Racz, President of Genetec Inc. In a rare result, the NPE paid an undisclosed sum to Genetec Inc. In patent litigation in th...
Pivot3, the provider of intelligent infrastructure solutions for mission critical video, announces it is the first hyperconverged infrastructure (HCI) platform to be certified with BVMS – the video management system from Bosch. This certification enables organisations using BVMS to realise additional improvements in economics, simplicity and agility in their physical security environments that only Pivot3’s video-optimised infrastructure can offer. Pivot3’s HCI surveillance so...
Globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has launched a new solution for the PC market. Following several successful integrations in Chromebooks, biometric authentication is in increased demand as a more convenient and secure authentication method for both consumer and enterprise PCs. Growing application of biometrics Fingerprints’ new solution is tailored for use across a growing number of different form factors and use cases, including notebooks, 2-in-1...
The ETSI Quantum-Safe Cryptography (QSC) working group is pleased to announce the release of Technical Report TR 103 619 defining migration strategies and recommendations for Quantum-Safe schemes, and enhancing cryptography awareness across all business sectors. The threat of quantum computing to asymmetric cryptography has been extensively reported in ETSI’s work and elsewhere, and has been recognised as an existential threat to the many business sectors that rely on asymmetric cryptogra...
Cozaint Corporation, manufacturer of ‘smart’ physical security platforms, has announced the launch of the BOBBY-W wall-mounted physical security kiosk. Available immediately, this ‘Video Surveillance as a Service’ (VSaaS) device has been designed to augment human security guard environments that need additional eyes and ears on their premises. BOBBY-W physical security kiosk BOBBY-W is based on a custom, Cozaint-built expandable platform that allows for the integration...
ProdataKey (PDK), the manufacturer of the cloud access control platform built for mobile, announces several updates to its ‘touch’ Bluetooth reader and mobile app that further distinguish the pdk io solution as the most convenient, seamless, access control experience on the market. Unlike other mobile access control solutions, which require users to unlock and present their phone in place of a fob, PDK’s touch reader automatically senses encrypted credentials on locked phones carried by users, even when they’re deep inside pockets, bags and purses. Mobile-first solution The reader’s new ‘touch-free’ feature, designed to support COVID-19 best-practices for workplace safety, allows credentialed users to simply wave their hand within 2-3 inches of the reader in order to indicate an intent to enter. The result is a touch-free, hassle-free ‘walk-through’ experience that requires no contact with phone nor reader. PDK’s ‘touch app’, a separate component of the pdk io mobile-first solution, allows users to unlock entrances remotely with the push of a button within the app interface. It, too, has also been updated to offer enhanced functionality and greater convenience. New multi-site support allows individuals to access more than one pdk io system from within the same app. Multi-site support The new multi-site support allows favourite entryways to be located at one or multiple locations For example, a person whose apartment complex and workplace are both secured with a pdk io system can control and open doors at both locations from a single log-in within the app. Or, if they have more than one job, they can access multiple work locations, with each site’s administrator retaining control over respective permissions for specific doors and times. Another new feature, ‘Favourites’, allows users to identify doors most frequented so that they can be accessed quickly from the first screen within the app. Again, the new multi-site support allows favourite entryways to be located at one or multiple locations. The features of the touch reader and touch app are just some of the many ways in which the pdk io platform has been engineered as a mobile-first solution, leveraging the superior flexibility, usability and ‘carry-it-with-you’ convenience that’s unique to smartphones. Decentralised system management In fact, pdk io administrators, managers, installers and technicians benefit from the identical user experience, whether they are logging into the platform through a computer, tablet or the mobile native app. This includes access to system installation and configuration tools, issuing of credentials, permissions management, user groups, monitoring dashboards, reporting and event-call up and many other features. Jeff Perri, President and COO or ProdataKey, says, “PDK has long espoused the benefits of a mobile-first approach to access control because it’s clearly what customers want; they prefer to use their phones for everything they can. However, the COVID-19 pandemic has made mobile-first even more relevant, both for its support of remote, decentralised system management and the touch-free benefits it offers to workers or tenants. Plus, our integration with many complementary security solutions from industry partners further expands the ways that security can be managed from the palm of your hand.”
Intelligent Insights is a new software tool that brings together every element from scene to screen, from intelligent cameras enabling video data capture and interpretation, to the visualisation and reporting of data in one simple overview. Using data to improve security, safety, and business decisions has become increasingly important to the market and continues to grow. Intelligent Insights Now, Bosch has introduced an affordable software solution, called Intelligent Insights that enables customers to use data in new ways. It completes the data journey from scene to screen and helps users quickly understand the context of various situations, enabling them to make informed decisions. When, for example, the maximum number of people allowed to be in the area is reached, Intelligent Insights can immediately inform users. Intelligent Insights can be used standalone or seamlessly integrated with other systems to enhance situational awareness further. Integrates with Bosch cameras’ video analytics Intelligent Insights uses Bosch cameras’ built-in intelligence (Video Analytics) to interpret video images Intelligent Insights uses Bosch cameras’ built-in intelligence (video analytics) to interpret video images and captures camera metadata from situations involving moving objects, people counting, and crowd detection. The software tool then collects, aggregates, and displays this information using a series of pre-defined widgets, enabling users to visualise and evaluate a complete scene from a simple overview screen. Based on this, users can react faster and more efficiently, making better-informed decisions and improving overall security and safety. Usable data delivered in two ways Usable data can be visualised in two ways: As a widget and as a report. All widgets are displayed in a simple, easy-to-read dashboard that allows users to select and display only the widgets that they need at any given time. The report functions as a more detailed post-analysis so as to help users adjust and alter actions in the future. Intelligent Insights comes with a series of widgets, all of which contribute to specific safety and security needs. Area Fill Level, Occupancy Counting, and Crowd Detection offer the ability to monitor and detect crowds accurately, and count individuals and objects. The user can specify the desired occupancy rate of an area by determining the maximum number of people allowed to be in that area within a given time. Area Fill Level and Occupancy Counting capabilities In particular, Area Fill Level and Occupancy Counting are becoming increasingly applicable as they can activate and trigger an external output device when the threshold is reached. This could be a simple alert, a message displayed on a monitor at the entrance to inform visitors if they are allowed to enter, or a public announcement. This is very helpful when considering public health issues like the rapid spread of viruses such as COVID-19, in locations that can attract large numbers of people. Intelligent Insights also offers Object Counting and People Counting functions. Object Counting enables users to accurately count the number of vehicles or customer-defined objects within the field of view of one or more cameras. It is ideal in situations with fast-moving objects, such as roads or crossroads, where traffic frequency rates must be tracked to determine data such as peak or low traffic periods. People Counting and Object Positioning widget People Counting is used to count individuals, for example, the people entering or leaving a building People Counting is used to count individuals, for example, the people entering or leaving a building. This widget can aggregate the counting information from multiple cameras to provide users with an early warning when a sudden increase of people is detected, indicating a potential security issue. Intelligent Insights uses only anonymous data from cameras, ensuring people’s privacy is protected at all times. With the Object Positioning widget, users can get a real-time overview of all objects moving in a certain area. This is especially helpful for applications, such as perimeter protection. Based on their GPS position, which can be determined by cameras that feature built-in video analytics, the objects are plotted onto a map and classified with icons. Future-proof solution Intelligent Insights initiates with a basic licence, which includes all widgets and one dashboard, displaying 16 widgets. When needed, dashboards and widgets can be added according to customer needs and requirements. Furthermore, when customers use Bosch Intelligent Video Analytics, output and data from the Camera Trainer technology (included in Intelligent Video Analytics) like counting statistics of customer-specific objects can be visualised and reported. All this, combined with new widgets and functionalities incorporated in forthcoming updates and versions, makes Intelligent Insights a future-proof solution. Integration with BVMS Intelligent Insights is not only a powerful standalone software package but also designed for seamless integration Intelligent Insights is not only a powerful standalone software package but also designed for seamless integration. When integrated with the video management system of Bosch (BVMS), users can manage their live and recorded video streams and Intelligent Insights data within one unified graphical user interface (GUI). This integration eliminates the need to switch between multiple applications to get a complete picture of the situation. Another advantage of the integration with BVMS is that customers can enhance their video security solution to an integrated security solution that covers intrusion detection with B and G Series and access control management with the Access Management System 3.0. New insights to security industry With the launch of Intelligent Insights, Bosch has introduced a new software solution that brings new insights to the security and safety industry, one that already adds value but will also undoubtedly add more in the future.
Ignition Technology announces the launch of Catalyst Insights, the UK’s first ‘Cyber-Security-as-a-Service’ aggregation platform designed exclusively for the channel. Catalyst Insights currently supports 15 vendors spanning endpoint assessment, breach data reporting, MFA, EDR, IT Service Desk and Contact Centre, delivered within an integrated management and reporting service. Developed over the last 12 months, Catalyst Insights provides a single pane of glass deployment, management and reporting function offered as a white label platform to Ignition’s 870 strong partner community to streamline MSSP and SoC delivery for the channel. Creating highly configurable solutions At launch, Catalyst Insights integrates with 15 security and infrastructure management products with built-in breach data reporting and Microsoft Active Directory support to allow channel partners to create highly configurable solutions for both single clients and as part of a MSSP / SoC offering. “Several security vendors offer ‘Cyber-Security-as-a-Service’ solutions, but these are only designed for their own products and each requires a separate administrative layer which is impractical for channel partners’ supporting growing client bases,” explains Paul Risk, CTO for Ignition, “In some cases, these products were never designed for MSSP usage and as such offer limited multi-tenant support, service provider reporting or integration with IT service desk tools.” Cyber security solutions Catalyst Insights has been developed over the last year based on feedback from our partners" “Catalyst Insights has been developed over the last year based on feedback from our partners to offer a better way of using multiple best-of-breed cyber security solutions within an integrated process to handle moves, adds and changes as well as monthly billing and reporting,” adds Risk. Catalyst Insights launches with built-in breach data reporting to allow channel partners to show clients which corporate email addresses, passwords and personal data is on the dark web, and where these have been connected to known breaches. Other noteworthy features include Global Cloud Health Status showing all the data centres and component status’ of AWS, GCP and Azure/O365 in a simple view plus Active Directory to Endpoint AV cross-referencing to show which endpoints don’t have AV installed, or what machines have AV that aren’t in Active Directory. Offering significant benefits The platform includes integration capabilities that spans both the Ignition vendor portfolio and third party solutions including: Blackberry Cylance: An endpoint assessment scanner. Cybereason: Endpoint Protection, Detection, and Response. C3M: Cloud security posture management and compliance assurance. Okta: Multi Factor Authentication and Single Sign On. SolarWinds: IT Service Desk platform. Duo Security: Multi Factor Authentication and Single Sign On. Five9: Cloud Contact Centre software. IT Glue: A SOC 2-compliant documentation management platform. LogicMonitor: A fully automated, cloud-based infrastructure monitoring platform. Microsoft Active Directory support for management and reporting. Fortinet: Next-Generation Firewall and Secure SD-WAN. Microsoft Office365 productivity suite. Qualys: Auditing, compliance and cyber protection. MalwareBytes: Anti-malware software. Gerhard Conradie, CEO of ENHALO Limited, an advanced cyber defence group says, “This concept of aggregating security SaaS is long overdue and offers significant benefits in terms of streamlining the management of multiple solutions under a common platform.” “Individual security vendors have a vested interest in making it harder for channel partners to swap out their solutions or mix and match different point products. It is logical and highly beneficial that a distributor like Ignition should take on this role which will make not only selling cyber security SaaS easier, but also reduce the day-to-day management and reporting burden,” Conradie adds. SaaS based application Carl Shallow, Pre-Sales Director at Orange Cyberdefense, the expert cybersecurity business unit of the Orange Group says, “We talk to customers of all sizes and industries and the common requirement they have is a dashboard or management tool that gives the visibility of their deployed security estate.” “To be able to converge this into a SaaS based application that gives additional benefits will always help improve the relationship between the customer, reseller and distribution company. We can only see this type of requirement growing along with the automation that becomes possible running it as SaaS solution.” Cost effective cloud-based software We have a common goal in that every day we help Software Vendors find their ideal customers" “Having witnessed the recent security attacks on Covid-19 vaccine research companies, everyone understands how critical it is that businesses make the right cybersecurity software choices”, comments Julian Painter, CEO at Yappady Apps. “We have a common goal in that every day we help Software Vendors find their ideal customers. As one of the UK’s most popular advisors to SME on choosing the most cost effective cloud-based software, at Yappady.com we are proud to be a founder partner with Ignition and highly commend their Catalyst Cybersecurity-as-a-Service initiative to our clients.” “At a technical level, Catalyst Insights uses direct calls to the underlying API’s of each vendor solution and this framework approach makes it easier to add additional products, bespoke platforms and scripts as we onboard more vendors or if channel partners express a need,” says Risk. Managed security services market Ignition is currently developing additional Catalyst Insights ‘connectors’ to add integration support for Chronicle, BeyondTrust and IRONSCALES. Partner feedback has been positive with a recent Ignition channel survey highlighting beneficial Catalyst Insights use cases including ‘Upselling product/services to existing customers’ (26%), ‘As a business development tool’ (25%), and ‘As an end customer resource’ (23%). According to MarketsandMarkets, the global Managed Security Services Market is projected to grow from USD 31.6 billion in 2020 to USD 46.4 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 8.0% during the forecast period.
CertiPath, an innovator and renowned company in high-assurance identity, credential and access management services for highly regulated environments, has announced the appointment of industry veteran, Jack L. Johnson, Jr. as Advisor to CertiPath’s Board of Directors, effective immediately. Johnson has over 30 years of industry experience that includes executive positions with Guidehouse Consulting and its legacy firm, PricewaterhouseCoopers, the Department of Homeland Security as its first Chief Security Officer, and has also served with the United States Secret Service for over 20 years. Security assessments expert Johnson is currently the Chief Executive Officer (CEO) and Managing Partner of Jack Johnson and Associates, a strategic consulting firm that specialises in security assessments, providing business and risk consulting domestically and internationally. “As part of Jack’s role, he will offer guidance and direction with regard to our growth initiatives and ongoing business strategies, identifying opportunities that align with CertiPath’s mission,” states Jeff Nigriny, President and Founder of CertiPath. High-assurance credentials provider I have known and worked with CertiPath’s rock-solid, principled leadership team members for decades" Jeff adds, “Because our primary focus is to develop and provide unparalleled, groundbreaking technologies and services that enable high-assurance credentials in the federal government and commercial spaces, we look forward to enhancing the ever-changing landscape with Jack helping to take us to the next level.” Jack Johnson stated, “I have known and worked with CertiPath’s rock-solid, principled leadership team members for decades. They are a well-regarded company that has been filling an essential niche in the identity management space.” Jack adds, “I’m excited to work alongside these great professionals, as the company is on the cusp of expanding significantly and I look forward to being a part of their success.” Protective and intelligence-related duties veteran Johnson’s career spans a full range of investigative, protective and intelligence-related duties, as well as assignments with various Presidents, Vice Presidents, Presidential candidates and foreign heads of state. Johnson received his Bachelor of Science degree from the University of Maryland, a Master’s degree in Forensic Science from George Washington University, and as a veteran of the United States Army, he is involved in the Code of Support Foundation.
Aiphone, the globally renowned manufacturer of intercom and security communication products, has announced the release of its IX Series PC Master Station Software. The new IX-SOFT is capable of transforming any computer into a feature-rich intercom, with an easy-to-use and intuitive interface. IX-SOFT PC Master Station Software The IX-SOFT PC Master Station Software is a PC-based intercom solution, which is ideal for any customer type, as it fits into everyday scenarios with ease. Whether the need is for the management of intercom solutions in small to mid-sized educational facilities and offices, or the more complex needs of an enterprise-level facility, this solution can be managed remotely by facility managers, or by a security operations centre. The new IX Series software offers users the ability to easily add IP-based intercom locations" “The new IX Series software offers users the ability to easily add IP-based intercom locations where they originally didn’t have space for a physical master station,” said Bradley Kamcheff, Marketing Manager of Aiphone, adding “This easy, compact solution offers customers the feature-rich benefits of an intercom system, accessible from any PC, in a versatile package.” Features and benefits of the IX Series PC Master Station Software include: An interactive map that is a visually efficient way of selecting stations Device Check and Line Supervision ensure the system will operate as expected Video conversations can be easily recorded Computer screen offers larger viewing platform Better utilisation of monitoring station space Interactive map feature The interactive map offers a visual layout that allows operators to immediately detect where a call originated and efficiently dispatch security personnel. For those with limited space to deploy a security master station, this solution is ideal for deploying an enterprise-level system in a compact package. The IX Series will also eliminate the need for operators to perform manual audits, as the process will now be done with the software, ensuring all products are functioning properly and connected to the network.
STANLEY Security, a global integrator of comprehensive security solutions and an electronic security company, has announced its investment in Evolv Technology, the globally renowned company in artificial intelligence (AI)-based touchless security screening. This investment, backed by STANLEY Ventures, the venture capital arm of Stanley Black & Decker, forms a strategic partnership between the two companies. Evolv Express Evolv Express, the company’s touchless security screening system, makes it possible for venues of all kinds to keep visitors safe from concealed weapons, pandemic health threats and intruders. Powered by the Evolv Cortex AI software platform, the system uses proprietary sensors and AI to differentiate weapons from personal items in real-time. Evolv Express keeps high-volume entrances flowing, by reliably detecting guns and other weapons, as people walk through naturally, without emptying their pockets, bags, backpacks or other belongings. The system can screen more than 3,600 people per hour, which is 10 times faster than metal detectors. Touchless security screening solutions Evolv’s innovative, touchless security screening solutions are an integral part of the security industry’s future" "We're committed to helping organisations create safer, healthier environments for their employees, customers, students and partners, and our investment in Evolv Technology helps us deliver on that commitment,” said STANLEY Security, Global President, Matthew (Matt) Kushner. He adds, “Evolv’s innovative, touchless security screening solutions are an integral part of the security industry’s future. When paired with data analytics and expertise from STANLEY Security, these solutions will deliver even more value to organisations as they adjust operations and enhance security measures to reopen and stay open safely.” Powerful additions to security programs Evolv Technology’s systems are powerful additions to security programs at K-12 schools, higher education institutions, hospitals, sports venues, office and federal buildings, outdoor recreation venues and more. To date, the systems have been used to screen more than 50 million individuals at venues and facilities across the globe. “We’re proud to partner with STANLEY Security and Stanley Black & Decker to add even more capabilities to our technology and deliver superior value to our customers,” said Evolv Technology’s Chief Executive Officer (CEO), Peter George. Strategic partnership He adds, “This strategic partnership leverages the resources, capabilities, industry expertise and market presence of both companies. The breadth of STANLEY Security’s solutions portfolio and reach of its global installed base, coupled with Evolv’s modern technology and commitment to transforming the security screening space, makes for a powerful partnership.”
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
A person infected with the Coronavirus (COVID-19) infects an average of 2.5 other people within five days. You do not need to be a mathematician to realise that early detection of infected people is key to successful pandemic containment. The aim of effective containment strategies is therefore not so much to reduce the number of absolute cases as it is to extend the time frame within which they occur. Without effective containment measures, the virus spreads rapidly and is beyond the capacity of the health care system. However, if infection rates can be minimised through early detection and rapid, targeted identification of further infections, cases will continue to occur over a longer period of time and remain within the capacity of the health care system. Identifying, testing and results For example, the goal of many countries is to carry out as many Corona tests as possible to quickly identify infected people. It is then necessary to identify and reach potentially-infected people and isolate them in quarantine. This is a tried and tested procedure. But this method also costs valuable time in the fight against the virus and has many unknowns. The determination of a concrete test result alone sometimes takes up to 48 hours due to limited laboratory capacity. Added to this is the imprecise and slow procedure for determining contact persons. Or do you still remember exactly who and where you shook hands with in the last ten days - and could you provide information on this? Security technology to the rescue When it comes to the time factor, security technology can be a great help. Thermal imaging cameras and temperature sensors, for example, can help to detect a person with elevated body temperatures. Fever can also be one of the symptoms in those infected with the Coronavirus. At neuralgic points such as airports and train stations, or at entrances to hospitals, thermal imaging cameras can quickly reveal which people have fever. Presumably infected people can be easily separated and asked about other symptoms. Physical security technology can make a great contribution here. Dr. Frank Gillert, a professor at the University of Applied Sciences in Wildau, Germany states, however, as one of the leading scientists for logistics-centric security research, he demands "rapid innovation in dealing with situations like COVID-19 should be a priority". He sees enormous potential in the possibilities of IT and artificial intelligence; "We should use the disruptive changes that are currently taking place and that are challenging global orders to strengthen the significance in IT infrastructure development and also in security technology development.“ The goal in a global crisis And he is right: In global crises such as the Corona pandemic, security-related deficits become apparent and space is created for technical innovations. The goal of governments and companies is to restore security and save human lives as quickly as possible. The German data analytics powerhouse G2K, for example, has developed a Corona Detection & Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. When developing the system, the focus was on two questions: How do I detect a suspected infected person in crowded environments and even more importantly, how do I quickly and comprehensively determine the person's contacts and previous whereabouts, and find correlations and patterns in this information? The data experts of the Berlin-based company found the answer in the combination of physical security technology and their existing data analytics platform. The G2K system The system is based on G2K's scalable IoT platform "Situational Awareness Builder" (SAB), which is already in use in several projects worldwide and sets standards in process automation and process optimisation, including security management. As soon as a person with fever is detected by the system, he or she can be immediately screened to avoid contact with other people and thus prevent possible new infections, i.e. to interrupt the chain of infection. For this purpose, stationary thermal imaging cameras or smartphones equipped with a temperature sensor accessory can be used. The potentially infected person must now be registered and referred to a doctor or hospital for further specific diagnostic measures. The entire process is covered by a mobile G2K application. A combination of security and medicine The platform can bring together available hospital capacity, infection reports, movement and contact profiles and provide an excellent picture of the source of infection. Thus, medically necessary isolations can be implemented quickly. At the same time, infected patients can use the app to document their recovery and become actively involved. All this data is centrally managed and analysed, using deep learning methods. This provides crisis managers with a single monitoring, control and resource management tool that enables immediate action to be taken to combat the spread of the virus and gives officials full transparency on the status of the pandemic. Karsten Neugebauer, founder and CEO of the company behind the solution, explains his commitment as follows "A few weeks ago we too were faced with increasing difficulties due to the Corona crisis. As we have a strong presence in Europe in particular, we had to struggle with postponed project starts and limited resources". But instead of burying their heads in the sand, G2K's dedicated team decided to declare war on the virus." "In our entrepreneurial duty, we, therefore, decided to use our available technology and equip it to fight COVID-19. Our team has been working day and night over the last few weeks to expand our software platform to enable us to contain the pandemic quickly and effectively. Politicians must now immediately push ahead with the unbureaucratic implementation of prevention and control measures such as our CDCS to ensure the stability of our public systems," demands Karsten Neugebauer. The pandemic continues As the COVID-19 pandemic spreads from continent to continent, researchers around the world are working to develop antidotes to the virus. As long as this has not been found, the spread of the virus must be slowed down internationally. Only by this can system-relevant infrastructure be held consistently. Combining modern physical security technology with platform technology and artificial intelligence provides an excellent possibility to slow down the current and for sure, future pandemics.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
Kurt Takahashi, the new CEO of Pelco, says he will provide collaborative leadership to help build the Pelco team, work together hand-in-hand with team members, remove barriers and lead the company forward. He brings industry experience and relationships to the new post that will translate into new opportunities. Takahashi joins Pelco from AMAG Technology, where he served as President for the last couple of years. Earlier, he had stints at ADT, Tyco and Quantum Secure, where he was Global Vice President of Sales and Marketing. “This was an opportunity to join a brand that has deep, rich and far-reaching history,” says Takahashi. “I couldn’t resist the opportunity to come into a company such as Pelco and be able to make a difference.” Improving the fundamentals Takahashi acknowledges that Pelco has slipped in the last 10 years from its position as a market-leading brand. To address the situation going forward, the company must “improve fundamental things,” he says. Those fundamentals include keeping the customer first, putting the right people in the right roles, and executing technical support well. Keeping the customer first, putting the right people in the right roles, and executing technical support well “We have to provide customer service from when we receive an order, to acknowledging it, to processing it and shipping the order,” says Takahashi. “Another piece is to deliver revisions to a product in a faster time period and introduce new products to the market in a timely way. In terms of market presence, we learn that people haven’t really heard from Pelco in a while. We have to get in front of integrators and consultants more aggressively than we have in the past.” “It’s up to us to prove that we belong and can sustain and support customers moving forward,” he adds. “We will get new opportunities, but we will need to execute them. If we do that, we will grow.” Brand optimism Takahashi sees more reasons for optimism. “In spite of the problems, we are a big company with thousands of customers, a massive footprint, 10 offices around the world and people in over 40 countries. We are a strong, known brand around the world. These are a great foundation to grow from; we just have to execute better.” These are a great foundation to grow from; we just have to execute better Pelco’s new parent company, Transcom Capital Group, was another reason Takahashi was attracted to the position. He says Transom is led by “amazing professionals” that specialise in “transformational culture and how to diffuse best practices in an organisation.” At Pelco, Transom has already led surveys, workshops and focus groups throughout the organisation to create a vision, mission and values covering how the company wants to present itself in the market. From those values will emanate new process and policy improvements to move the company in the right direction. New visions and missions The company’s new, collectively developed vision is “to make the world safer.” The mission is “to deliver distinctive video solutions and world-class customer experiences.” The company’s new, collectively developed vision is “to make the world safer.” The company’s culture is built on six values: innovation and excellence, customer focus, integrity, respect and recognition, collaboration, and ownership. “We believe this is what will help drive our culture moving forward, and it’s the mindset of all of us as one team with one goal that will give us something to be proud of,” says Takahashi. “As we move into the new era of Pelco, you will see excitement internally and externally,” he adds “Everybody’s really eager to see Pelco come back and be a significant player.” Three horizons to success The idea is to look inward and improve on the current, successful product lines Takahashi sees three horizons that summarise the company’s path to future success. The first horizon is to focus on the fundamentals of what the company does today. The idea is to look inward and improve on the current, successful product lines, such as the VideoXpert video system and on-board video analytics. The second horizon will be to look at ways to advance the current feature set, whether “to build, partner or buy.” Building partnerships will be part of that success, such as the partnerships they are already building with Briefcam and Anyvision. The third horizon will be to expand their innovation, based on feedback from end users, dealers and consultants. “I want to get very deeply connected with our customer base,” says Takahashi. “Are we on the right path? Should we explore other partner relationships? We need to bring those minds together to expand our vision.” The focus should be on solving three business problems – mitigating risk, ensuring compliance and saving money. Looking ahead to ISC West in the spring, Takahashi expects Pelco to emerge as a more proactive company that is eager to engage. “We have a lot of stories to communicate, and we have not been as active as we should,” he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Generally, the Less Than Load (LTL) industry is always looking to increase the amount of product shipped per truck. A lesser amount of product on a truck equates to a lower amount of billable product per trip. Raw Load Average (RLA) Raw Load Average (RLA) is the percentage of product on a truck – 100% is a completely full trailer. As the name implies, LTL averages less than 100%. In the fast- paced world of logistics, delivering millions of packages per day, than how do companies maximise the RLA? Most shipping managers are responsible for inspecting each trailer, before it leaves for several additional items. They make sure that the packages are secure and then evaluate whether the truck can handle any more inventory. There might be 200+ dock doors in a 400,000 sq. ft. facility and dozens of trucks waiting to leave and get on with their trips. At peak times, inspections will require several individuals running all over the facility. Less Than Load (LTL) Industry experts estimate that only about 80% of trucks are actually inspected Industry experts estimate that only about 80% of trucks are actually inspected. The missed trucks are now at risk for unsecured packages arriving damaged. More importantly, they are leaving 74% full. If the truck had waited another 30 minutes for inspection, they could have added another one skid of products to increase the load to 75%. That 1% difference does not sound like much. However, considering the volume of shipments that the top 10 LTL companies deliver, the 1% will amount to somewhere between US$ 6 million and US$ 12 million per year, which goes directly to the bottom line. Role of video security systems So, what is the role of security video systems here? Well most people say that security video does not have a real Return on Investment (ROI) in its traditional role. It’s hard to disagree. One exception might be when security companies have used video systems to reduce the number of guards. Using video, one guard can see as much as 3 or 4 guards could see in the past, without ever having to leave their post. This certainly reduces cost, but at the end of the day, guarding is still an overall cost to the bottom line. This case study will highlight how a couple of Salient’s very resourceful customers have transformed video into cash generating systems. Operational efficiency with video In the guarding scenario, video can put one person in several places at once. This operational efficiency can also be applied to how many people are needed to inspect trailers. But the ROI doesn’t come from removing a couple of salaries from the payroll. The real money comes into play because now inspecting 100% of the trailers leaving the dock are possible versus 80% and get that RLA up by 2 or 3%. Then, it’s about the big bucks. And that’s just the tip of the iceberg, when looking at the overall operational efficiencies available by utilising video. Using video for misclassified products or shipment validation In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified when shipped. All products being shipped have a classification, and each classification has a specific associated cost. These per-pound costs fluctuate based on the value of the product, required insurance, risk and other factors. An example would be a sporting goods manufacturer shipping ammunition and firearms, under the code for clothing. In this example, a 200-pound load would be billed at about US$ 100, when it should be billed at closer to US$ 300. Multiply this by hundreds of packages a day and the total of the missed revenue is astronomical. So how would a video surveillance system correct this problem? Certainly, security cameras cannot see though a box, but one would expect a box with 200 pounds of clothes to be a fairly large box. But if the box were full of firearms or ammunition, the video would reveal a much smaller box. This anomaly when noticed would prompt an operator to investigate the contents of the box and contact the manufacturer to rectify the billed amount. This process might seem a bit hypothetical, but already a current customer of Salient Systems is capturing over US$ 40 million a year with the right system components. Using video to reduce OSHA violations and false claims The logistics industry requires a tremendous amount of labour in order to operate. The more labour hours, the greater the propensity for on-the-job injuries, OSHA violations, insurance payouts, lawsuits and business interruption. False claims are also a consideration. Let’s look at some real-world examples of using video to reduce or eliminate these issues: OSHA reports that 5,250 workers died on the job in 2018 (3.5 per 100,000 full-time equivalent workers), on average, more than 100 a week or more than 14 deaths every day. The loss of an employee is one of the most emotionally devastating situations a business can encounter. There are several benefits of video that can increase safety. One result of a fatality is typically an OSHA investigation. An action item that could result from this investigation would be to increase security guards. This is a perpetual cost that could continue for several months to years. Video systems enhance guards’ efficiency Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas at the same time. The systems can be coupled with the use of video analytics to alert guards to specific situations such as motion in areas that should be unoccupied or traffic proceeding in an unauthorised direction. In these ways, video systems can reduce the quantity of physical guards, thereby reducing the cost. One of Salient’s customers is saving almost US$ 20,000 per month with the reduction of two guards and it has OSHA’s approval. The end result is that the safety of the employees has been increased and operational cost is lowered by implementing technology. Inadvertently, this same type deployment at another facility helped mitigate a US$ 900,000 slip-and-fall lawsuit, which could have also been a possible cause for an OSHA investigation. Validation of safety policy Validation of safety policy can also be a drain on resources. Auditing seatbelt use for forklift drivers, pedestrians using appropriate marked walking paths, and proper social distancing in work spaces are a few examples among many. Assigning an individual to monitor this activity is costly and people typically obey the rules only when that individual is present. However, video can capture this information all the time without huge labour cost. This information can then be audited and used for education processes. OSHA statistics indicate that there are roughly 85 forklift fatalities and 34,900 serious injuries each year, with 42 percent of the forklift fatalities from the operator's being crushed by a tipping vehicle. The safest place for the driver to be is strapped. A facility that used video to audit seatbelt usage showed a 65% compliance rate. After the information was presented to the manager and employees, the next audit resulted in a jump to 87% compliance rate. In the event of an injury, this type of verifiable data can go a long way to prove that the employer is serious about employee safety and investing in ways to improve the safety culture within the company. Using video to increase sales LTL is a very competitive business and it is viewed primarily as a commodity type operation LTL is a very competitive business and it is viewed primarily as a commodity type operation. A few pennies per pound can typically sway a decision-maker. Already some great operational efficiencies and benefits from video to lower cost and to making LTL more competitive has been discussed. But these ideas still don’t move LTL out of the ‘dog-eat-dog race to the bottom on price’ world. Now, let’s look at how to use the implementation of these same video systems to provide value propositions and competitive advantages for customers. Many LTL customers have sensitive merchandise for which the safety and security of its delivery might outweigh cost differences. An example is freight regulated by government agencies, such as Drug Enforcement Agency (DEA), Alcohol, Tobacco and Firearms Agency (ATF), and Dept. of Energy (DOE). For example, the DEA reported ‘The overall trend of incidents of Controlled Prescription Drugs lost in transit increased in 2018 with the highest number since 2010.’ Extra layer of security And the ATF’s Interstate Theft Program states that ‘Under the program, hundreds of reports of thefts and losses from interstate shipments are received each year’. With statistics like these, customers in these categories have a heightened sense of vulnerability. Offering systems such as surveillance video can add that extra layer of security and added confidence. This is a marketable differentiator to help LTL companies set themselves apart from the traditional companies that only offer a lower cost. This, bundled with some of the other cost-saving measures outlined above, could be the icing on the cake needed for security departments to convince C-Level executives in their organisation to invest in video.
Commenced in 2016, the large business club was built with smart infrastructure and modern amenities, in the futuristic town of Kolkata, to provide leisure-cum-business conducive atmosphere to their members and visitors. The contemporary building of business club is spread over 10 acres area and serves as a cultural, commercial, and business hub in the region. Having a beautiful landscape, it attained tremendous popularity due to its high-end specifications, green landscape, wedding lawn, tennis court, cafeteria, business centre to name a few. Missing real-time video surveillance With a consistently large volume of patrons visiting the business club for various events, security is the vital component of the successful operations at the site. The customer has been relying heavily on analogue video surveillance to secure its facilities and workforce. Due to its limited scalability, there was no way to do real-time surveillance throughout the premises. Moreover, every incident recorded by the video cameras required time-consuming manual investigation, therefore, causing delay in decision-making. Aiming to advancing the surveillance solution, the customer wanted to make an investment to maintain a watchful eye, manage threats/incidents proactively along with integrate existing and new system into the unified interface. Videonetics Unified Video Computing Platform Intelligent Video Analytics (IVA) is helping operators detect vehicles wrongly parked in ‘restricted’ or ‘no parking’ zones After a thorough evaluation of various solution offered by various companies, it was Videonetics that came out on top. Thanks to Videonetics Unified Video Computing Platform (UVCP™) that blends Intelligent Video Management Software (VMS), Intelligent Video Analytics and seamless integration of existing analogue system into one user-friendly solution, able to grow effortlessly with customers’ need over time. Incident response management Videonetics Intelligent VMS is managing 100+ cameras including PTZ network camera, dome cameras, fixed cameras, and bullet cameras, installed throughout the interior as well as exterior of the premises. In addition, 32 legacy analogue cameras are also integrated into the unified solution, eventually providing centralised control of the cameras to the security operators. The in-built failover and redundancy features of Intelligent VMS ensure the operators to always have access to live and recorded video. This means if any incident occurs, they can always have evidence of it. Zero Blind Spot at Entrance The Intelligent Video Analytics (IVA) is helping operators to detect vehicles which are wrongly parked in ‘restricted’ or ‘no parking’ zones, at the outside of premise. For the perimeter security at entry & exit gates, the PTZ camera tracking helps in detecting unusual behaviour of the person and provides alert to security operators for faster action. At the entrance, face capture has been installed to detect a person in the scene and locates his/her face, which is saved in the database, indexed and time stamped. In addition, vehicle capture is deployed to track and record license plates of vehicles along with time and date, entering the premise. Zone monitoring Operators will be notified if a person stays beyond a certain duration in a user-marked zone The business club needed a solution that could help it identify theft, intrusion and trespassing throughout its facilities. In the first phase of the project, Videonetics along with stakeholders of business club and system integrator identified sensitive areas, that requiring immediate security system. To monitor suspicious activities, zone monitoring has been enabled at the fence of tennis court, lawn, emergency gates and open field area. Operators will be notified if a person stays beyond a certain duration in a user-marked zone. To combat unauthorised entry in generator room, operators gets alert if any intrusion happens in a marked area. Similarly, unusual activities are also being monitored in this area through loitering detection. Trespassing detection Operators can handle alarms and manage events, reducing manual checks of cases and helping to expedite investigations At the peripheries of the business club, trespassing detection has been deployed to detect if any person intrudes into a premise. The system is well capable to trace trajectory of the trespasser and prevent incident before it occurs. The authorities wanted to have alert in case any mob formation happens at the field area, known as forbidden region, of the club. Crowd formation detection has been deployed that estimates density of people in a scene and generated an alert as soon as the density in any defined area crosses a certain limit. Empowering with mobile application The ease of use of Videonetics unified solution has been instrumental to the business club. The operators and senior authorities are efficiently accessing videos anytime and anywhere, thru an intuitive interface of IVMS web and mobile applications. At the time of incidents, operators can handle alarms and manage events, therefore, reducing manual checks of cases and helping to expedite investigations. After various phases of implementation, installation, and testing, the Videonetics unified solution went into live operation. Since upgrading to Videonetics unified solution, the business club has been able to better handle incidents of thefts/intrusion and apprehend suspects. Therefore, the level of security has been lifted by allowing the early detection of incidents and monitoring the premises round-the-clock, even in the harsh environmental condition. Furthermore, the added layer of security has been significant in business club’s efforts to attract more members and sustain business relations with existing members. Detecting patterns Now the operators use the information being collected in the unified interface to better understand the environment. They are successfully detecting patterns on how visitors/members access and move through the club. Thus, using these insights to develop strategies that maximise the use of space and keeps everyone safe. The open architecture of Videonetics unified solution allows customer to integrate with third-party systems such as access control, emergency system and much more. “To go from conventional to a professional and scalable surveillance system was a huge improvement for our client. It has enhanced our client’s reputation for providing safe and secure environment to visitors, employees, and members. Commendation to Videonetics for providing their unified video computing platform that empowered security operators by improving their efficiency in monitoring the premise and handling threats swiftly. I deeply appreciate their dedication and untiring efforts for making it a reality”, said Gaurav Das, Director, Webdesk Technologies Private Limited.
Staff safety and customer service will be boosted across Sydney’s rail network with the deployment of SafeZone®, the safety, security and emergency management solution from CriticalArc. The ground-breaking technology will enable Sydney Trains to manage a wide range of situations, including mitigating risks to staff and customers and strengthening the capacity to respond to incidents and emergencies across the network. For example, SafeZone will put up to 2,500 of Sydney Trains’ front-line staff directly in touch with security control room teams, letting them summon immediate assistance at the touch of a button. High safety standards The investment in SafeZone will cover over 175 stations across the greater Sydney area and is the latest step in a modernisation drive to transform Sydney Trains’ operations, with more than a million customer journeys taken on the network every weekday. SafeZone enables staff to call for assistance and receive optimised response at the touch of a button, via their assigned smartphone. This capability is as valuable on crowded city platforms at rush-hour as it is on more remote suburban stations where staff may be working alone late at night. “Sydney Trains is committed to fulfilling our duty of care to all of our staff and enhancing our high safety standards in order to maintain and enrich customer service levels on station platforms,” explains Mark Edmonds, Manager of Security Capability, Network Operations. Real-time situational awareness Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events “Employing proven technology such as SafeZone will help us solve day-to-day challenges, further improving the safety of our staff and helping them work more effectively to continue to deliver world-class service.” Across its transportation network, Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events. This makes possible a wide range of security management functions, such as sending targeted alerts to specific individuals and groups. It enables control room operators to pinpoint the location of individuals needing help so they can initiate the most efficient and rapid emergency response. Primary safety concern “This visionary deployment by Sydney Trains will have a significant impact on the safety and wellbeing of staff and thus will produce dividends with regards to customer service and satisfaction, and the potential for streamlined operations moving forward,” says Glenn Farrant, CEO, CriticalArc. “With staff safety a primary concern for all rail operators internationally, implementation of this technology by Sydney Trains represents a significant step forward for the sector and will be the blueprint for many implementations to follow.”
On an average, approximately 400,000 tons of cargo passes through Malpensa Airport every year, located in Milan, Italy. The Alha Group is the major cargo handling agent at the 25,000-square-meter site, which houses 32 airlines, with 34 large cargo aircrafts. Handling cargo at Malpensa Airport In 2012, Malpensa Cargo became a certified competence and administration centre for air cargo and road transport, especially for premium-quality small goods, such as smartphones, tablets, designer clothing and accessories. The Alha Group chose a system from MOBOTIX AG, a renowned manufacturer of cameras in Germany Since then, passenger transport in Malpensa has increased exponentially, which has driven the Alha Group to procure a video surveillance system that offers the very highest level of protection. The Alha Group chose a system from MOBOTIX AG, which has been manufacturing cameras in Germany for over 20 years. MOBOTIX thermal imaging cameras "We have installed nine MOBOTIX thermal imaging cameras at our sites in Malpensa, Rome Fiumicino, Segrate, Pioltello, Verona and Prato to strategically cover the key traffic areas," said Marco Alesi, Security Manager at the Alha Group. The MOBOTIX thermal systems were installed by Alha's business partner, Trium at the beginning of March 2020, in response to the COVID-19 pandemic. Alha can now reliably control access to its offices and warehouses. Virtual security cage The project also saw the construction of a ‘Virtual security cage’ that Alha uses to protect the valuable goods of its customers that are being transshipped against theft. An infrared alarm system delineates a defined area and the video-based system triggers an alarm, as soon as an intruder enters this area. With the help of live images from the camera, the uninvited guest can be identified and stopped immediately. The Alha Group has consequently replaced an expensive conventional locking system with an advanced digital video solution and sped up routine work processes at the same time. The MOBOTIX cameras are integrated into the burglar alarm system, which is controlled using security badges. A detailed log is kept to track when the system is deactivated. Integrated thermal imaging solution "We were, and still are, extremely satisfied with the MOBOTIX cameras we installed previously," emphasizes Marco Alesi, adding "Not only because of their high quality and durability, but also because of the numerous integration and development options we've been able to make use of over time. This is a huge advantage, and one that applies to our most recent installation too." The timesheet system has an integrated thermal imaging camera that is activated, every time an employee signs in The timesheet system has an integrated thermal imaging camera that is activated, every time an employee in the warehouse and office access area signs in. A recorded message asks the employee to look into the camera and remove any glasses or head coverings that they may be wearing for proper identification. If the camera measures their body temperature as being 37.5 degrees Celsius or less, a green LED on the camera flashes to allow access to the cargo bay. If the temperature measured is higher than 37.5 degrees Celsius, a flashing red light and another recorded message informs the employee to wait for a specialist member of staff to take their temperature using a clinical thermometer. VoIP intercom system At the same time, the system sends an email with a dated camera screenshot, stored personnel data and the measured temperature. The VoIP intercom system integrated into the camera enables Alha security staff to immediately communicate with employees who were temporarily stopped when entering the company building. "The extra checks are making us all safer during this crisis. We see the ability to contact someone immediately after they receive negative results for a preliminary test as an intrinsic part of our duty of care toward our employees," explains Alesi.
Samson Security has adopted SmartTask to support the rapid growth of the business, which has seen the company treble in size in less than a year. The workforce management software is initially being used for electronic proof of attendance, across more than 400 security officers and engineers that deliver a wide range of services, including manned guarding, mobile patrol, alarm response and FM services. Advanced guarding management and monitoring “We needed an advanced guarding management, monitoring and reporting solution that could adapt and expand to our changing requirements as we grow,” explains John Richards, Operations Director at Samson Security Ltd. John adds, “Our mobile and manned services now span the North West, the Midlands and North Wales, so SmartTask will give us the visibility and control needed to coordinate and protect our team, while maintaining our excellent service standards.” SmartTask workforce management software Samson Security selected SmartTask because of the simplicity and flexibility of the system SmartTask will replace a previous time and attendance solution, which no longer met the needs of the business. Having undertaken a review of the marketplace, Samson Security selected SmartTask because of the simplicity and flexibility of the system. The app-based nature of the system means that employees can use the software via a personal or work smartphone, while providing the opportunity to use additional functionality such as patrol monitoring and electronic forms. Security guards are using either a SmartTask-enabled smartphone or an onsite landline to accurately record the start and end times, as well as any required check calls. The app captures a timestamp and GPS location for accurate customer reporting and SLA monitoring for alarm responses. Controlled access Samson Security also uses the control room dashboard at its National Command Centre to gain complete visibility of any exceptions, while mobile and office managers have controlled access for their individual areas of responsibility. John adds, “We are already exploring other ways of using SmartTask, which will enable us to consolidate much of our employee scheduling and workforce management requirements into a single system. We have set up bespoke smart forms, so will shortly be rolling out electronic incident reporting to our team, replacing our existing paper-based process.” Scalable, flexible solution He further said, “The scalable and flexible nature of SmartTask means we can take a phased approach, avoiding operational disruption and not overburdening our internal resources.” Paul Ridden, Chief Executive Officer of SmartTask commented, “We have developed our software to meet the precise needs of security and FM companies now and in the future. Possessing high levels of configurability and scalability, backed by first-rate service and support, SmartTask can support the long-term success of our customers in-line with their business and operational priorities.”
HID Global, a worldwide in trusted identity solutions, announced that the University of Connecticut (UConn) has selected its Seos® smart cards and HID® FARGO® Connect secure issuance solution to optimise student services and strengthen security across its five-campus network. The HID FARGO Connect cloud-based platform enables UConn to decentralise ID issuance and eliminate student wait times, while Seos technology eliminates the vulnerabilities of its legacy system. Identification provided to students for access The university’s One Card office partnered with identification solutions supplier, ColorID, to upgrade its Husky One cards - which provide access to student essentials such as dorms, dining halls and printing services - with Seos credential technology to combat card duplication and fraud. “The biggest challenge for UConn was it needed to re-card its campus to bolster security,” said Cassie Bunner, Higher Education Account Manager at ColorID. “We wanted to present the university with a technology we knew and had confidence in. HID was exactly that.” Previously, the university’s card solution utilised proximity and magstripe technologies, which can easily be cloned. UConn’s 40,000 new Husky One cards retained magstripe and proximity technology to minimise disruption to campus life, while adding Seos technology for a phased university-wide transition to iCLASS readers. Once complete, UConn plans to remove proximity technology, further reducing card issuance costs. Campus security credentials “HID Global is leading the way in providing universities with trusted identity solutions so they can revolutionise processes that are vital for student success,” said Craig Sandness, Vice President and Managing Director, Secure Issuance with HID Global. “With our HID FARGO Connect solution and Seos smart cards, UConn leverages best-in-class credential technology to secure its campus and simultaneously consolidates and streamlines its student ID issuance process.” In the future, the One Card office will manage its high-volume credential requirements and expedite student delivery using HID FARGO Connect and HDP5600 printers. UConn administrators plan to encode, print and issue about 18,000 credentials annually from any device on campus with a web interface. “Setting up our university with HID FARGO Connect will allow regional campuses to print cards directly for students - no wait, no temporary card,” said Stephanie Kernozicky, Director of UConn’s One Card Office. “The mobility of being able to take pictures and print wherever we need was a big factor in selecting FARGO Connect solutions.”
Round table discussion
Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analysing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Security management: Manufacturers & Suppliers
- Dahua Technology Security management
- Vicon Security management
- Seagate Security management
- Bosch Security management
- CEM Security management
- IFS Security management
- VIVOTEK Security management
- Vanderbilt Security management
- Hikvision Security management
- Parabit Security management
- BCDVideo Security management
- Pelco Security management
- ComNet Security management
- Arecont Vision Security management
- TESA Security management
- Hanwha Techwin Security management
- DSC Security management
- Messoa Security management
- OPTEX Security management
- FLIR Systems Security management