PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...
Adarma, an independent security services company, previously ECS Security, has successfully launched following a private management buyout led by David Calder and Nathan Dornbrook with capital from Livingbridge, one of the UK’s leading mid-market private equity investors, and debt from Bank of Scotland. With over 250 staff and experience spanning over two decades, Adarma provides a broad range of IT security consulting, solution and services with deep expertise in threat management includ...
SimonsVoss Technologies GmbH, part of the Allegion group - a pioneer in digital locking and physical access control systems - enters a technology partnership in Europe with Morphean. The new technology partnership, that will utilise SimonsVoss’ digital access control system SmartIntego, extends Morphean’s cloud-based capabilities beyond video surveillance and into the access control-as-a-service (ACaaS) market, forecast to reach US$2.8b by 2024. Integrated security system We are s...
Hikvision, the provider of innovative video surveillance products and solutions, launches the Technology Partner Program Portal (TPP Portal). This new web-based portal is designed to enhance the collaboration with technology partners and systems integrators, enable development of new and innovative solutions for customers across all markets, and further drive market growth. Technology partners can use the marketing capabilities of the portal to grow their businesses, taking full advantage of Hi...
Matrix aims at increasing the networking opportunities by explaining decision makers the application of latest telecom and security solutions at the International Police Expo. The event organised on 19th and 20th July’19 gathers high level professionals of defence forces and gives them an overview of technologically advanced solutions. From telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for...
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announces it will display its flagship security platform, Security Centre 5.8, and its comprehensive suite of new features whilst exhibiting at IFSEC International 2019. This will be the first time the new functionality will have been displayed in Europe, taking place at ExCeL London from 18-20 June (Stand IF710). The unified platform has undergone a significant update recently, providi...
Pulse Secure, the provider of software-defined secure access solutions, is pleased to announce new partnerships with Westcon EMEA, Nuvias Group and Spectrum Networks, to deliver Pulse Secure authorised training courses to its reseller partners and customers across EMEA. Following on from the successful North American launch of the authorised education training course curriculum earlier in the year, the Pulse Secure training and certification programme has authorised new partnerships to prepare customers and reseller partners for the Pulse Secure certified technical expert certification exams in the following countries: United Kingdom, France, Sweden, Germany, Belgium, Netherlands, Italy, Spain, Portugal, United Arab Emirates and Saudi Arabia. Secure access solutions Pulse Secure has always made its training towards certification available virtually" “Pulse Secure has always made its training towards certification available virtually,” said Sudhakar Ramakrishna, CEO of Pulse Secure. “Now by expanding our authorised education partnership base of providers, we can fulfill our business objective of delivering secure access solutions for people, devices, things and services by offering instructor-led, in-person, hands-on training in local languages.” “As a technology training organisation, we have always focused on imparting the right skills needed for the successful implementation of products and solutions in the vendor, partner, customer ecosystem. We are excited to collaborate with Pulse Secure to add value in this space,” added Sanjeev Singh, MD of Spectrum Networks DMCC. Training and education “Now is a great time for partners to join the Pulse Secure access now partner programme, and we’re delighted to be selected as an ATC partner. This will help our partners gain extra knowledge, helping them differentiate in the marketplace and grow their business. Now is a great time for partners to join the Pulse Secure access now partner programme" "Adding training services to our deep knowledge of Pulse Secure solutions means partners can invest in a relationship that will pay dividends in the long-term. As with all our training and education, our goal is to increase partner profitability and the value they bring to their customers – all from a single, trusted source,” said Sam Paris, VP EMEA of Services and Renewals Westcon at Comstor. Implementation consultants The Pulse Secure training and certification programme includes training courses designed to help network engineers, enterprise system architects, technical support specialists and implementation consultants to successfully deploy and maintain Pulse Secure products and services. After completing the training course, participants are prepared to take the Pulse Secure certified technical expert exams. Local classes will begin in June 2019 and will include training for: Pulse Policy Secure (PPS) - deployment, implementation and configuration; Pulse Connect Secure (PCS) - administration and configuration; and Pulse Secure vADC - administration and configuration.
This year from the 16th – 17th of April, the Landmark Centre in Lagos, Nigeria hosted the ninth edition of Securex West Africa. Over two bustling days of business, more than 2,300 professionals from across the Security, Fire and Safety industry crossed the threshold to witness key technology advancements, market trends and do business. Among the dignitaries to open the exhibition and conference this year was ACP Gbolahan Odugbemi, Assistant Commissioner of Police for Lagos State representing the Commissioner of Police, Major General J.I Unuigbe, Representing the Chief of Army Staff for the Nigerian Army and John Bray, Consulate General for the US Government in Nigeria. Each esteemed keynote speaker addressed the vital importance of sharing information and cutting-edge technology within the Security, Fire and Safety industry to further progress opportunities in the region, especially in transformative times globally. They praised Securex West Africa 2019 as an excellent opportunity to achieve these goals and bring together the West African security industry. Solutions from various sectors on display With over 761sqm of technology, equipment and services on display from more than 100 leading brands, attendees at this year’s Securex West Africa were privy to cutting-edge solutions across varying subsectors within commercial, cyber, perimeter and homeland security in addition to fire and safety. A truly international exhibition, this year the show attracted industry professionals from 21 countries including Benin, Ghana, Nigeria, South Africa and the United Arab Emirates. An overall increase in visitor numbers of 56% since 2016 demonstrates that Securex West Africa is growing from strength to strength. Attendees at Securex West Africa were privy to solutions across varying subsectors within commercial, cyber, perimeter and homeland security George Pearson, Regional Director at Afrocet Montgomery, the organisers behind Securex West Africa had this to say on this year’s edition: “In reality, we’re all living in relatively uncertain times from a security perspective, whether we’re discussing political turbulence, cyber-attacks or terror threats, our exhibition growth year on year, both in visitor figures and show size is indicative of why shows like Securex are so important to progress our understanding of how to protect against and prevent security and safety breaches.” One of the best events in West Africa 28% of visitors in 2019 were dedicated to Commercial Security, whilst 33% to Information SecurityThis year, visitors came in their thousands to the exhibition from varying sectors, the top five of which were Systems Installers, Information Telecommunications, Engineering, Safety & Security Consultancies and Oil and Gas. 28% of visitors in 2019 were dedicated to Commercial Security, whilst 33% to Information Security, which reflects the rapid growth taking place in the cyber market. A further 14% were dedicated to Fire & Safety, 11% to Homeland Security and 13% to Perimeter Security. Mr Adewale Muriziq Salisu, a Security and Safety Consultant from Fourthman Security Services gave the following testimonial about this year’s event: "Securex West Africa is one of the best security conferences and exhibitions in West Africa if not the best. It involves all aspects of security, safety, cyber and fire protection which all organisations and individuals can use. Securex brings the best in security and safety exhibition and conference and if you miss it, you miss a lot." Alongside the exhibition each year, organisers put together a compelling selection of daily Conference sessions for both exhibitors and visitors alike to attend. Hosted by esteemed industry experts, these carefully put together sessions are designed to inspire and inform industry members. This year, 70% of visitors attended at least one of these sessions. 21st century security solutions On the first day, the most popular session was a Panel Discussion centred around ‘21st Century Security Strategies and Solutions’ and included representatives from SBM Intelligence, Suncast Security, Airtel Networks, Beacon Consulting and Academy Halogen in addition to the Former Police Chief in Nigeria and Special Adviser to the Lagos State Governor on overseas affairs and investments. The most popular session was a Panel Discussion centred around ‘21st Century Security Strategies and Solutions’ Meanwhile, Day 2 of the Securex Conference shifted its focus onto Fire and Safety technical sessions. Delegates at these sessions had the opportunity to hear from expert representatives from key fire and safety brands including Bristol Fire Engineering, Mobiak S.A., Surveillant Fire, Afrisec, Afritech Solutions and Hancock Security Nigeria. Topics discussed included the importance in choice of firefighting equipment, product showcases, tall building fire and safety management, safe cities and OEM demonstrations. The second day of Securex West Africa also gave way to the co-located cyber-focussed security conference: WACSS (West African Cyber Security Conference). An invitation-only event organised in conjunction with KPMG and sponsored by the Nigerian Communications Commission, this year WACSS welcomed 129 esteemed cybersecurity delegates. Now in its third edition, WACSS has grown to be recognised in the region as the leading high-level cyber-focussed security conference and attracts a great deal of senior industry stakeholders. Achieving business objectives In a post-show survey for Securex West Africa, 98% of visitors achieved all or most of their business objectives in attending the eventFor the second year running, Securex West Africa hosted the OSPAs (Outstanding Security Performance Awards 2019). This year, the event took on a new format in the shape of a Gala evening of dinner, drinks, award-giving and valuable networking amongst the finest performing business and professionals in the Nigerian Security industry. In a post-show survey for Securex West Africa, 98% of visitors achieved all or most of their business objectives in attending Securex West Africa. Furthermore 84% of those visitors had purchasing power within their business, contributing to a collective visitor spending budget for security, fire and safety solutions totalling more than US$ 150 million. These results, coupled with overall exceptional feedback from exhibitors, further emphasises the quantity and quality of business opportunities available to both local and international businesses in West Africa. Exhibitors say on the event Speaking to a couple of exhibitors who took part this year, here’s what they had to say on Securex West Africa 2019: "It's been really good; with the sales we’ve made we can justify the business case to be here next year! Looking at everything, I've made personal connections with my competitors and the brand awareness has been great for us." Bukky Bademosi, Business Development Manager, Pilgrims Africa Ltd. "For my region, it is the most important show. We want to present our manufacturers with a platform where they can come and see that Nigeria is a place where we can make money. We've had many good leads and we'll be here next year!" Edward Van Trotsenburg, Managing Director, AFRISEC.
Redrock Biometrics, a provider of palm-based biometrics for authentication and identification, announces the official launch of their breakthrough identification solution – PalmID-X at the exclusive invitation-only Finovate Spring 2019. PalmID-X expands the applicability of biometric identification to large groups of people, creating a basis for seamless services and transactions without physical tokens. “Identification is much more challenging task than authentication. Most biometric modalities do not have sufficient accuracy for identifying a person in a group larger than a thousand,” says Redrock Biometrics’ co-founder Lenny Kontsevich. “Palm biometrics is different. It allows to raise the limit more than tenfold: from a thousand to tens of thousands.” Match palm signatures Using standard RGB camera and/or infrared camera, PalmID-X captures palm prints and/or subdermal veins to produce a highly unique palm signature. Proprietary PalmID® algorithms match palm signatures for wide range of palm positions, orientations, and illumination conditions. The SaaS component of PalmID-X is capable to perform matching of a newly captured palm signature with tens of thousands of signatures stored in its database in a fraction of a second. PalmID-X is capable to make these fobs obsolete once and forever by checking me using my palm" “A dramatic expansion of the group size, provided by PalmID-X service, opens new exciting applications for identification. Every day I carry two RFID fobs: one for a large public garage and another for an office building. PalmID-X is capable to make these fobs obsolete once and forever by checking me using my palm,” says the company CEO and co-founder Hua Yang. Face biometrics “Or, for example, frequent shoppers of a supermarket will be able to pay at checkout by mere showing palm to a payment terminal. There is no more need to carry credit cards or cash. Once you register your palm in the system, you hold your identity literally in the palm of your hand.” PalmID-X matching algorithms transcend palm matching; they can combine face biometrics, location, and text metadata to narrow down the search. Biometric data are securely stored in the cloud in scrambled and anonymised form. Biometric matching can be performed without the need to ever decrypt the data. There is no way for a hacker to steal user records or to recover palm images.
Hikvision, the provider of security products and solutions, releases the first version of its product security white paper, introducing the security challenges of IoT products and sharing Hikvision’s practices to continuously improve the security throughout the whole product lifecycle. The product security white paper outlines Hikvision’s comprehensive approach to product security covering device security, data security, application security, network security, privacy protection, and security compliance, which can greatly enhance the product security and the risk resistance in various application scenarios. Current security threats Interconnection of IoT devices is becoming much more common today" “Interconnection of IoT devices is becoming much more common today, while the consequent risks are fast growing. Product security remains among our top priorities on multiple dimensions such as R&D, production, and delivery. We also hope to raise the awareness of security issues and establish trust and cooperation with all the stakeholders by sharing our insights”, said Dr. Wang Bin, Vice President, Director of Network and Information Security Laboratory of Hikvision. In addition to the newly released product security white paper, Hikvision also released an updated cybersecurity white paper, which comprehensively illustrates the current security threats for IoT and relevant challenges for the whole security industry, and it shares Hikvision’s ongoing efforts to improve its cybersecurity system. Supply chain management According to the updated cybersecurity white paper, the existing security research and development process of Hikvision has been enhanced with more advanced technical means and tools, which meets higher standards in terms of design, development, verification, risk mitigation, and configuration management. Meanwhile, the company has optimised the operation mechanism and the professional qualifications of its security teams. The white paper also highlights the security issues related to supply chain management. The company has adopted effective technical and management systems to ensure supply chain security with reference to the international standards, extending the protection scope of cybersecurity systems and building a security ecosystem together with supply chain partners.
Advancis is a pioneer in the PSIM industry and helps protect critical infrastructure and high security sites around the globe with its leading-edge control room solution. This year at IFSEC, Southwest Microwave and TKH Security will be exhibiting in partnership with Advancis on its stand as part of the Advancis community of technology partners. For security system buyers and decision makers IFSEC International in London is an important event in the calendar with over 27,000 international visitors from more than 113 countries expected to attend on 18-20 June 2019. Excellent technology integration Advancis works very closely with its technology partners in a community approach to ensure that end clients experience excellent technology integration and seamless unification of disparate systems into the WinGuard PSIM software. Our mission is to offer the most stable and innovative PSIM solution on the market that provides the benefits of open architecture, cost efficiency and scalability as well as to provide high levels of support throughout a project’s life cycle. This unique and innovative community demonstration at IFSEC will be located at stand IF 2414, close to a main entrance and is expected to generate a great deal of interest amongst buyers who will be able to see an integrated security control room with the latest WinGuard X4 features with live integration of perimeter protection systems from Southwest Microwave as well as access control, security and video management from TKH Security.
Manchester-based security tech scale-up, Broadstone, is celebrating unprecedented growth as it reports a 300% increase in revenue in the past five months and a 700% increase in its user community in the past six months (up from 2,500 users in October 2018 to 20,000 users this month). They predict that transactions via their platform (people looking for temporary work) will be in excess of £1m per month by 2020. As a result, the high growth firm is looking to expand its headcount by 50% over the next three months, as it enters a period of major fundraising and active investment. To support its rapid growth and enable further scalability, Broadstone is also moving to new, state-of-the-art premises at The Garages in Allied London’s XYZ building in Spinningfields, Manchester. Accelerate growth strategy Moving to The Garages in the XYZ building will ensure we are well positioned to continue to grow at pace" Tom Pickersgill, founder and CEO, said: “Since we launched just over 12 months ago, we’ve experienced incredible success, from securing contracts with some of the UK’s major corporations to growing month-on-month in every aspect of our business. And our future plans are even more ambitious, as we look to undertake a Series A fundraise later in the year to accelerate our growth strategy both here in the UK.” “Moving to The Garages in the XYZ building will ensure we are well positioned to continue to grow at pace, while providing a high spec environment for our valued team. Being part of the Allied London portfolio provides the flexibility we need as a high growth scale up, and means we are able to double or even triple headcount without any major disruption to our office space.” Highly streamlined process Launched in January 2018 by founders Tom Pickersgill, James Doyle and Nick Groves, Broadstone is successfully challenging the archaic temporary staffing market within the regulated services industry, currently focused on the security sector. Tom says “The worker landscape has changed dramatically over the past decade. More people are looking for work that fits around their life, yet traditional recruiters and bricks and mortar staffing agencies have not adapted to this and tech giants like Uber and Deliveroo are reaping the rewards of engaging with these labour pools as a result.” Our unique labour-as-a-service approach is democratising recruitment" “Our unique labour-as-a-service approach is democratising recruitment; providing companies with much needed instant access to a pool of verified and vetted workers, and providing candidates with access to fair and flexible temporary work, resulting in a fast and highly streamlined process.” Vast user community Broadstone launched their InstantPay feature late last year – which enables workers to instantly draw down on their pay. They have seen a 55% increase in uptake in the past three months, reinforcing the firm’s belief that handing increased control and flexibility to the employee is the future of the workforce. In the next 12 months, Broadstone predicts its transactions to be in excess of £1m per month with a vast user community of 40,000 people looking for temporary work via their platform.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling increased energy demand. But like nearly every other market today, the oil and gas market is on the brink of a sea change. According to Deloitte’s 2018 outlook on oil and gas, “the digital revolution is here.” The sheer volume of information and data generated by digital devices, such as those associated with the Internet of Things, will allow producers to leverage rich data and combine it to deliver smart, efficient solutions. The rise of digital technologies is unleashing new ideas across the oil and gas industry and even though we are in the beginning stage of being able to harness the power of these types of technologies, innovative ideas are emerging — all designed to support the core business, reduce internal investments, deliver products faster, boost efficiencies, and enhance safety. Maximised operations and increased ROI This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand This is welcome news because there are a number of challenges facing the oil and gas industry, from improving reserve replacement and ensuring workplace safety to reducing operating costs and limiting downtime. All of these objectives must be achieved while maximising operations and increasing overall return on investment. Never has it been more crucial for critical infrastructure organisations to demonstrate a focus on safety, security, and collaboration. Here's why: Growth and demand According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand. As energy-centric organisations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success. Compliance Continuous demand is only one challenge; compliance with industry and government regulations is another significant hurdle that must be maintained or there is risk of production shutdowns. For example, the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS) impose comprehensive federal regulations for high-risk chemical facilities, requiring organisations to conduct vulnerability assessments. This is just one of many regulatory procedures sites must follow to conform to environmental protections, safety precautions, and safe handling of hazardous materials. As energy-centric organisations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success Threat protection, mitigation, and collaboration In addition to meeting the requirements of regulatory procedures, mitigating risk in this industry propels leaders to develop stringent strategies to ensure robust protection of people, property, and assets, effective and efficient response to incidents when they occur, and procedures and protocols to ensure business continuity in emergency situations. Energy providers require comprehensive safety planning and technology systems that can augment the capabilities of on-site and remote personnel. In recent years, video solutions have become the standard for monitoring facilities, assets, and employees, and now these organisations require enterprise-class solutions that can help gather intelligent data that allows for enhanced security and safety efforts but also focus on processes that enhance operational efficiencies. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market IT security is also a concern. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market. An IT breach can cause operational havoc, risk to the public, and damage to an organisation’s brand. Adopting a continuous improvement approach to a security strategy safeguards and helps protect valuable company information and reduces the likelihood of an incident. Also, collaboration between IT and physical security leaders and the correlation of both departments' data makes it much easier to identify a potential breach before havoc ensues. The digital age With the rise of the digital revolution and the demand for data to improve insight, oil and gas producers and businesses need to find new ways to capture data, correlate it as needed, and then leverage it to make the most informed decisions. Software platforms are being used in a wide variety of applications to provide a single pane-of-glass view that allows operators to gain critical insight into operations. By collecting intelligence from digital sensors, such as video surveillance cameras, open-source Web intelligence, building systems, crowdsourcing, weather sensors, mobile devices, and more, operators can detect potential risks and manage and respond to situations more efficiently. Furthermore, information can be shared easily with multiple agencies, employees, citizens, and first responders — especially valuable in the event of a safety incident where rapid response is paramount. By creating a single enterprise-wide view across disparate systems and technologies, organisations experience improved response times, lowered operational costs, and increased employee safety. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically Traditional command centers Intelligent solutions, such as those derived from the idea of artificial intelligence, help organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies within the oil and gas industry, fusing critical data input from emergency calls and responder activity to enhance situational awareness. With traditional command centers relying mostly on call and radio updates, visibility can be limited, but new digital platforms enable operators to oversee a situation and engage with and direct the response force. Overall, these types of automated functions deliver a simplified and modernised operating environment. The future is the Intelligent SOC Oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets All of these digital solutions are designed to take center stage within the Intelligent Security Operations Center (ISOC). To combat advanced, multi-stage threats, oil and gas facilities are transforming the traditional SOC into the next-generation unified ISOC with an integrated platform for detection, investigation, communication, and response. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically. Energy providers operate in challenging, fast-moving environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. As the idea of the digital age continues to transform this market, new technologies will be more widely used to improve business operations from exploration and extraction to transportation and distribution. With the right technology, strategic partnerships, and enhanced situational awareness, oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets, while continuing to focus on achieving business goals that will sustain supply and demand for years to come.
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduction in error rates since 2013 is due to wholesale replacement of the old algorithms with new ones based on deep convolutional neural networks — completely revolutionising the technology. Optimal recognition results SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds One entrant in the newly energised market is RealNetworks, whose SAFR for Security is an AI-based facial recognition solution for live video that integrates video management system (VMS) solutions. With 24/7 monitoring, SAFR detects and matches millions of faces accurately in real time, enabling teams to manage a watchlist across any number of video feeds. SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds, even in real-world conditions where faces are in motion, at different angles, under poor lighting, or partially obscured. SAFR builds on RealNetworks’ 23-year history in video technologies. Launched in July 2018, SAFR — secure, accurate facial recognition — is enabling new applications for security, convenience, and analytics. Create security responses “We seek to be the world’s most trusted facial recognition platform and are delighted to partner with customers in the security industry and elsewhere to shape a more secure, convenient future worldwide,” says Dan Grimm, Vice President of Computer Vision and General Manager of SAFR at RealNetworks. “Security professionals are asked to keep us safe 24/7, monitoring a burgeoning number of cameras, and we help make them more effective.” SAFR targets facial recognition for live video, identifying camera-unaware faces moving in real-world conditions. In the April 2019 NIST results, SAFR tested as the fastest and most compact solution among algorithms with less than 0.022 False Non-Match Rate — 62 percent faster than the average speed, according to the company. SAFR now provides capabilities such as live video overlays alerting security professionals to events in real time, automatic bookmarks with rich metadata for investigative work, and alerts that can be customised to create security responses. SAFR uses one-sixth the compute power of competing facial recognition solutions Facial recognition algorithms Five years ago, facial recognition algorithms would struggle to match forward-facing people from still images, let alone camera-unaware moving faces from live video with variations in rotation and tilt. SAFR says they have achieved a balance of accuracy and performance for live video. A contributor to this accuracy is consistency across a range of skin tones. The algorithm was trained on a highly diverse global set of over 10 million non-simulated real-world faces. SAFR was optimised for speed and can sample a face multiple times during the same period of time as other algorithms, subsequently increasing its accuracy. SAFR achieves the performance through edge processing. Distributed architecture enables efficient bandwidth consumption, reducing the roundtrip latency of facial recognition speed to under 100 milliseconds. The savings lower total cost of ownership (TCO): SAFR uses one-sixth the compute power of competing facial recognition solutions, equating to $500,000 or so in savings on a 250-camera deployment. Integrated experience SAFR also uses off-the-shelf hardware and is optimised to leverage inexpensive GPUs SAFR also uses off-the-shelf hardware and is optimised to leverage inexpensive GPUs. SAFR can be deployed on premises or in the cloud, and supports Windows, Linux, macOS, iOS, and Android. When SAFR is paired with a VMS, such as Milestone XProtect or Genetec Security Center, the integrated experience includes 24/7 monitoring to detect and match faces in real-time. Features include live video overlays within the VMS to identify strangers, threats, concerns, unrecognised persons, VIPs, employees, or other tagged individuals in live video. Real-time alerts can be customised for when persons of interest appear on a video camera feed. Additionally, automatic bookmarks with rich metadata make for easier investigative review of security footage. Facial recognition technology is increasingly in demand to improve safety across various industry verticals. Better customer experience Large enterprises with high-visitor flows and heightened security — such as transportation hubs, stadiums, universities, and hospitals — need to know in real time when persons of interest or those on watchlists appear on camera. Sports stadiums could apply facial recognition to deny entry to banned patrons, locate lost children, or recognise VIPs to deliver a better customer experience. Hospitals need access control to restricted areas and pharmaceutical storage closets Hospitals need access control to restricted areas and pharmaceutical storage closets. Airports and transit centres value traffic flows, demographic composition, and dwell times to help improve scheduling. SAFR for Security is available worldwide, and the company partners with VMS providers such as Milestone, Genetec, Digifort, and IPConfigure by Paliton Networks. They are actively working to support additional VMS solutions and have sales teams located in major metropolitan cities around the world. Security professionals “The job of the security professional is critical in today’s world,” says Grimm. “SAFR for Security helps mitigate the challenges of the important work security professionals do to keep us all safe.” In designing and developing SAFR, RealNetworks considered diversity and the uniqueness of each person; Grimm says their massive global training data set is a competitive advantage. SAFR is designed with privacy in mind. All facial images and signatures are AES-256 encrypted in transit or at rest. “SAFR is powerful enterprise-grade software that is continuously improving through innovation and many years of expertise,” says Grimm.
Managed services provided through the cloud offer multiple advantages for system integrators. These include: Increased recurring monthly revenue: Managed services are a new business model that generates more stable and predictable income streams for integrators. Stickier customers: Managed services foster a more involved relationship between integrators and their customers, which can help boost customer retention. The cloud enables integrators to serve more sites without hiring additional technicians High gross profit margins: Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. They are easier to provide: The cloud enables integrators to serve more sites without hiring additional technicians. Problems can be fixed proactively: When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue - possibly before the customer even notices a disruption in service. Increased valuation of business: According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Importance of cloud-based solutions The cloud also challenges integrators to educate customers on the value of the new approach The cloud also challenges integrators to educate customers on the value of the new approach. For example, the cloud changes the expense model of security systems. It allows customers to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into the service, you don’t need a large capital outlay up front - you simply pay a predictable expense every month. Leveraging this difference opens new sales opportunities for integrators. The benefits of cloud services on how physical security equipment and software services can be monitored and maintained through a connected service is a particular benefit to integrators. Data monitoring and security “By having data describing the health of the system shared on the cloud, system integrators can observe data on demand and create proactive maintenance plans in coordination with the end user,” says Stuart Rawling, Director of Business Development, Pelco by Schneider Electric, and one of our Expert Panelists. A daily challenge for end users is balancing human resources used in the operation of a system “Such plans should result in increased system reliability and less downtime. If system performance data is aggregated and anonymised, it could also be used by manufacturers to analyse and form conclusions about maintenance schedules and system lifespan.” A benefit is happier customers. “A daily challenge for end users is balancing human resources used in the operation of a system and daily maintenance, with maintenance having shared responsibility with the system integrator,” says Rawling. The cloud software as a service The SaaS model gives companies the resources to improve the deep learning model" The cloud also can help to make cutting edge technologies more affordable. Economies of scale provided by the Cloud (Software as a Service, or SaaS) are making the sophisticated capabilities of deep learning affordable to a wider audience. Meanwhile, deep learning augments cloud systems with capabilities that may not be available (or affordable) in on-premise systems, thus accelerating the broader move to cloud systems. “Having a SaaS model gives companies the resources to improve the deep learning model,” says Shawn Guan, CEO and co-founder of Umbo Computer Vision, a provider of deep learning video analytics. "We can make more accurate systems that scale better and faster. SaaS enables vendors to do something great with deep learning. You don’t have to redo it for everybody. One customer benefit from another customer and all the knowledge is aggregated together.”
Video Surveillance as a Service (VSaaS), simply stated, is a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending on the features of the plan (i.e. number of cameras, amount of storage, software features, etc.), and customers pay a monthly subscription price to use it. Internet Protocol (IP) cameras are installed at site locations, and the video is captured and streamed to a service provider’s data centre via an internet connection. The video management software (VMS) runs on backend infrastructure provided by the service provider’s cloud. All video processing is done in the cloud, and all that is required to view the footage is an internet-connected device and a web browser. Implementation of AI and deep learning The cloud facilitates implementation of artificial intelligence and deep learning in the video surveillance marketThe cloud also facilitates implementation of artificial intelligence (AI) and deep learning in the video surveillance market. One of the major challenges with developing deep learning-based applications is access to real-word data and the ability to train the applications to work in any environment. Companies need access to relevant datasets that need to iterate their solutions quickly. Cloud-based solutions are of significant advantage in this case, as they allow for continuous updates and easy collection of vast amounts of data. “We will see the continued adoption of cloud-based intelligent video solutions that aggregate business data through video and artificial intelligence,” says Andreas Pettersson, CEO of Arcules, one of our Expert Panelists. Leveraging AI and IoT technologies with video data is becoming more common as organisations strive to optimise business operations while also boosting security across their facilities. Actionable intelligence gathering “The possibilities for this level of actionable intelligence gathering is endless, as markets such as hospitality, manufacturing, retail and SMEs that have multiple locations to manage, look to make sense of video in intuitive, streamlined ways,” says Pettersson. “The ability for technology to aggregate and analyse video surveillance and connected sensor data, identify trends in that data, and apply predictive analysis in businesses will have a huge impact in the coming year.” Cloud systems can solve more problems than ever using artificial intelligence and machine learning Cloud systems can solve more problems than ever using artificial intelligence and machine learning, and the capabilities expand way beyond video analytics to include analytics in general, crunching a variety of data provided by Internet of Things (IoT) sensors. Another area of interest related to video in the cloud is the development of ‘smart codecs’ that security camera manufacturers are developing and marketing as a solution that goes beyond H.264 and H.265. Maximising video storage Customers are realising that cloud implementations are more cost-effective, easier to deploy and maintainThe ongoing need to better manage network bandwidth usage and to maximise video storage is further turning the emphasis toward smart codecs, which lend themselves to cloud applications. Extremely high-resolution video can now be moved around in a fraction of the time and solves the issue of transporting many cameras over constrained WAN connections. With the elastic computing power available in the cloud, one can now envision a time where cloud computing costs could be low enough for the masses of video security solution use cases to be solved. Customers are realising that cloud implementations are more cost-effective, easier to deploy and maintain, and in many cases, even more secure than traditional on-premise deployments. In partnership with the leading cloud providers, the security industry can carry this message to the customers and will gradually see a shift in the acceptance of cloud-based solutions in the traditional security markets.
Ports of Jersey operate the island’s busy harbours and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harbouring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totalling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doors To drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
After a period of decline, the number of pupils being expelled from mainstream schools is increasing, placing more pressure on the need for Pupil Referral Units and the security at these premises, which is vital for managing student and staff safety. ASSA ABLOY High Security & Safety Group offers a range of locks and doors suited to the sensitive needs of Pupil Referral Units and pupils in care. Fire resistance integrity All doorsets in the Secure Education range are independently tested and certified The breadth of doorset solutions means the High Security & Safety Group can specify products for every area and need of a secure education environment. From classroom doors and personnel doors to circulation doors and high-performance doors. All doorsets in the Secure Education range are independently tested and certified to achieve 60minute fire resistance integrity and insulation to BS EN 1634 from both sides of the door. In addition, all doors within the offering are tested in line with the Department of Health’s environmental design guide attack test for secure services, as well as meeting with DD171 & BS EN 1192 severe duty performance and strength, and are tested to PAS 24 enhanced security performance requirements. Secure educational facilities This guaranteed and certified level of performance gives building owners and users the peace of mind that all doorsets are fit for purpose, as well as providing the added level of security and safety often needed in secure educational facilities. Mike Dunn, Commercial Director for ASSA ABLOY High Security & Safety Group, said: “A recent report by the think tank IPPR, found the total number of children being taught in ‘alternative provision’ for excluded children is far higher than the total number of reported exclusions. This will inevitably mean increasing pressure on facilities, such as Pupil Referral Units, and the safety of staff and pupils within those buildings.” Added level of security Pupil Referral Units are first and foremost a place of education" “Pupil Referral Units are first and foremost a place of education and therefore doors and locks must allow for this, grant access, as well as restricting permissions. However, an added level of security and safety must be considered and handled sensitively within these premises.” “Our experience and wide product range means we can advise on and supply doors and locks for every aspect of a secure education environment, mitigating any risk and ensuring a smooth specification process.” Doors within the Secure Education range come in a variety of materials and finishes, giving specifiers improved design flexibility.
Evelina has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardised system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilises a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. User-friendly features Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires with aesthetically pleasing profiles and user-friendly features and functionality the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
Each of Denmark’s 550 individual Free Schools shares a common ethos: parents and students participate together in activities outside school hours, including weekends. It’s excellent for building a school community. Not so easy for managing security, when issuing and tracking keys becomes a 7-day task every week. The Vejle Friskole turned to SMARTair® wireless access control for a solution. Previously, key management ate up “a very long time, approximately 5 hours a week,” explains Henrik Kækel, Technical Service Officer at Vejle Friskole. Individual access permissions Vejle Friskole’s mechanical keys have been replaced by a SMARTair access control system Secure wireless electronic locks, already proven in schools across Europe, were the answer. Vejle Friskole’s mechanical keys have been replaced by a SMARTair® access control system. Over 80 doors and cabinets around the school are secured with SMARTair® wireless devices. Even at a historic property like Vejle Friskole, battery-powered SMARTair® devices are easy and unobtrusive to retrofit. Now approximately 250 students, teachers and parents each carry their own key fob, programmed with individual access permissions. Because the SMARTair® system portfolio has locking devices tailored to different kinds of openings, everyone at the Friskole opens the right doors and cabinets with a single fob. There’s no more need for the school to distribute separate keys for student or staff lockers, for example. Issuing fobs “It was really bad because we had big problems with keys that were lost,” says Henrik Kækel. “There was a lot of work in key administration.” SMARTair® is easy for the school to manage. Today, Vejle Friskole staff spend around 5 minutes a week managing their access system. It's incredibly easy to figure out... it takes 1 minute to code a student" “It's incredibly easy to figure out... it takes 1 minute to code a student,” he adds. Even managing the leasing of school buildings for non-school events is simple and secure. School facilities staff issue fobs for the duration of the event, then cancel them immediately afterwards – with no concerns someone may have copied a physical key. Saving staff time In addition to making everyday life easier and saving staff time and admin costs, SMARTair® has increased security. Using the intuitive SMARTair® software, they always have an overview of who has been at the school, and when. Audit trails are generated and monitored in real time using their SMARTair® system. And it's no disaster if a credential gets lost. Henrik adds: “Then we cancel the credential and issue a new one.” Vejle Friskole’s SMARTair® system is easy, fast and cost-effective to extend to new doors, cabinets and users — at the beginning of a new school year, or any time they choose.
Decades of experience, innovative ideas, a strong commitment to quality, and a full range of first-class offset printing services: Mohn Media Mohndruck GmbH, a company of the Bertelsmann Printing Group, is one of Europe’s providers of printing and media services. At its facility in Gütersloh, Germany, some 2,000 employees are involved in professionally creating and executing tailored solutions for customers across a variety of industries. To avoid endangering staff and production, the company also has extremely high standards where the plant’s safety and security are concerned. And Bosch has supported the print specialists with advanced technology and services through multiple system generations. Cutting-edge solution The latest new project involved implementing a networked solution to improve fire safety “Again and again, we’ve been impressed by the innovative solutions that Bosch comes up with for us,” says Jörg Naumann, who heads the company’s fire brigade. “Bertelsmann has been partnering with Bosch for over 35 years, and for good reason.” The latest new project involved implementing a networked solution to improve fire safety in the eight-meter-high waste paper warehouses. On average, around 300 tons of paper are stored there at any given time. Problems in waste paper removal would directly impact production. To enable prompt responses to any fire events in these sensitive areas, the Bosch experts planned and implemented a cutting-edge solution. Fire detection system AVIOTEC, the first video-based fire detection system to be certified by VdS Schadenverhütung GmbH (the VdS is an independent, renowned institution for enterprise safety and security, and harmonised body for international safety standards) plays a key role in it. Intelligent algorithms directly integrated in cameras reliably detect the first signs of any smoke or flame. This technology detects fires at their source much more reliably than conventional detectors Particularly in challenging large-volume buildings, this technology detects fires at their source much more reliably than conventional detectors, which are not triggered until smoke reaches them. The data generated by the new fire protection solution come together in the Bosch Video Management System. If AVIOTEC identifies a potentially dangerous situation in any of the waste paper warehouses, it immediately alerts the continuously staffed emergency service desk of the plant fire brigade. Building integration system The situation can then be checked on a video screen and appropriate steps will be initiated. The use of this innovative technology permits very early detection of any fires. This prevents major damage and resulting production downtimes, thus saving the company a great deal of time and money. To additionally enhance security and efficiency, all of the integrated on-site systems for fire protection and video security are managed by the Building Integration System from Bosch. As required, the security systems can be centrally or locally monitored and controlled by staff as appropriate. Not only Mohn Media benefits from this, but also all of the other companies of the Bertelsmann Printing Group operating at the same site.
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorised personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorised staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the video are helping the bank make more strategic decisions about staffing, customer service and even future branch design. Business intelligence Our March Networks surveillance platform is providing us with some significant business and non-security-related uses" “Our March Networks surveillance platform is providing us with some significant business and non-security-related uses,” Ishikawa explained. Bank of Hawaii, which operates 69 branches and 373 ATMs across Hawaii, American Samoa and the West Pacific, is currently using March Networks Searchlight for Banking software to gather business intelligence at its branches. Searchlight’s mix of surveillance video, teller/ATM transaction data and analytics delivers valuable insights into the bank’s operations, as well as helping to enhance security and uncover fraud. “Our branch division folks look at the data to get ideas on how we should do our branch operations or staffing differently,” he said. People counting data — collected by FLIR Brickstream3D sensors integrated with the Searchlight software — tells them which entrances and exits are most used so they can place marketing materials in high-traffic areas. Video surveillance products The information is also being used to help determine future branch layouts. Queue length and dwell time data, meanwhile, help them understand their busiest time of day, and day of the week, so they can staff branches appropriately. “It’s a huge plus for us,” said Ishikawa. “Our executive management team can see the benefits of the video solution, and the future possibilities for this data.” A forward-thinking bank that’s keen to try new technology, Bank of Hawaii began exploring Searchlight after its success with March Networks’ other video surveillance products. The bank first started using March Networks systems in 2015, when it was time to upgrade its legacy DVRs. At the time, Bank of Hawaii was relying on two different video platforms, and it wasn’t happy with their performance. After enlisting the help of a consultant, and doing his own research at security tradeshows, Ishikawa says the decision to go with March Networks was clear. Network video recorders 'March Networks’ products are really engineered for the banking environment" “I remember asking some of my banking counterparts, ‘Hey what are you guys using?’ And they strongly recommended March Networks,” he recalled. The consultant came to a similar conclusion. He said, "March Networks’ products are really engineered for the banking environment,’ so that helped us make the decision.” Bank of Hawaii is currently using March Networks 8000 Series Hybrid Network Video Recorders (NVRs) in about half of its banking branches. The Linux-based devices provide reliable video surveillance recording and management, and are also easy to service, which is a huge bonus for Ishikawa and his team. In addition, the 8000 Series rack mount units feature an innovative ‘dock and lock’ station that allows technicians to easily remove and service the recorder while leaving all rear connections clean and organised in place. Existing analogue cameras “With other companies, you have to power down the recorder for several minutes to service it, and that means unplugging and re-plugging all the inputs. You miss a number of minutes of recording during that time. With March Networks, we’re able to just pull out the hard drive and pop in another one without taking the NVR offline,” he said. “That’s huge for us.” According to Ishikawa, Bank of Hawaii also appreciates the 8000 Series’ hybrid support, which allowed the bank to continue using its existing analogue cameras, and the motion histograms in March Networks Command video management software, which show Ishikawa and his team where motion occurred and helps them rapidly locate video evidence. “Command’s modern interface is really user-friendly, and it’s very easy to find video,” said Ishikawa. Dynamic range technology Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs “When someone is telling you, ‘Hey we had a problem at this branch this morning, I don’t know what happened, but it must have been around this time’, we’re able to find that video much more quickly on a March Networks platform.” The bank’s high resolution cameras also make it easy to discern important details. In its newer branches, Bank of Hawaii is using March Networks ME4 Series IP cameras, which capture 4MP images and feature high dynamic range technology to optimise image quality in both low and bright light. The bank is also using Oncam 360° cameras for high-resolution panoramic views. For security at its bank machines, Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs. Video is integrated with the bank’s ATM transaction data in the Searchlight software for rapid investigations into customer complaints and potential fraud. More comprehensive oversight “It’s so easy to search,” said Ishikawa. “It takes us exactly to that transaction and the associated video so we can figure out what transpired.” The bank is also integrating its teller transaction data with video in Searchlight for more comprehensive oversight of its branches. The combination of video, transactions and analytics helps it get a more holistic view of its services. “Transaction data is not always indicative of how busy a branch is,” Ishikawa said, noting that lengthier conversations at the teller counter often create value because the customer returns later to access another bank product or service. Having video and analytics is an added layer of information. Being able to remotely access video also helps Ishikawa’s security team conduct virtual patrols. This saves them both time and money. Uniformed security member Capturing video of the incident helped underscore the serious nature of the situation “In the past, whenever there was an issue, we had a uniformed security member head out and physically check the branch. But with virtual patrols, we can do fewer physical visits and, when we do visit, it’s a more meaningful visit.” The security team, for example, can keep an eye on issues with vagrancy and loitering by simply logging into the Command software. March Networks video has helped the bank successfully address some of these issues. In one case, a person was routinely visiting a branch and causing disruptions by yelling and throwing deposit slips on the floor. “We don’t always know the situation, but if a person is yelling or displaying erratic behaviour, they pose a risk,” said Ishikawa. Capturing video of the incident helped underscore the serious nature of the situation. Investigating a fraud “We were able to show police that this was not a minor disruptive party. It was a very concerning issue for us. And it wasn’t just our bank, it was occurring in other banks, too.” Going forward, Bank of Hawaii is planning to migrate its remaining retail branches to March Networks. Given the widespread benefits of intelligent video, Ishikawa predicts that, like him, more bank security managers will receive requests to share their video surveillance securely with other departments. “In the future, it won’t just be security that’s asking for a video upgrade,” he said. “It’s going to be other parts of the business saying, ‘We want a piece of the pie too.’ Because surveillance is more than just investigating a fraud or robbery incident. Now, video surveillance is a lot more than that.”
Round table discussion
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?