Senstar, a provider of video management systems (VMS) and perimeter intrusion detection systems (PIDS), is pleased to announce its products were recently selected to protect five airports in various locations around the world. These sites join the list of hundreds of civilian and military airports currently using Senstar products. “Airport infrastructure and assets represent a vital economic engine for many cities and countries making them prime targets for vandals, thieves and terrorists...
Security video wall and visual display solutions experts Ultimate Visual Solutions (UVS) works on projects in 15 countries around the world since its launch nine months ago. UVS changed its name from eyevis UK last September following the acquisition of eyevis GmbH by the Leyard group. Providing turnkey solutions The rebranding has allowed the company to offer an expanded range of products and services The rebranding has allowed the company to offer an expanded range of products and services...
Mobile security provider Trustonic announces a partnership with Rubean AG, an established mobile security-focused fintech, and CCV, an European payment solution provider, to develop an mPOS solution that accepts higher value transactions by enabling hardware-protected PIN entry on a range of commercial off-the-shelf (COTS) smartphones. Using a smartphone as a mobile point of sale (mPOS) solution enables traders, small retailers and SMBs to save money on costly payment acceptance hardware, impro...
Percepto, the provider of autonomous industrial drone solutions, launches the next generation of its AI-powered autonomous industrial Drone-in-a-Box (DIB). Available now, the solution includes a highly portable, smaller, lighter-weight and extreme weather resistant base station. Adding field-proven 5G compatibility, the new DIB also features seamless integration of 2D mapping and 3D modelling, highly customised reporting, comprehensive compliance and enhanced safety functions. The award-winning...
Synectics commences the roll-out of Synergy 3 2019, the latest release of its command and control platform for demanding surveillance and security environments. Introducing enhanced customisable mapping, camera management, and third-party integration capabilities, the feature-rich platform is the most customer-centric iteration of the software to date and aims to make the Synergy 3 experience more user-friendly. The new release will be available across Synectics’ key markets, spanning tra...
Honeywell announces the launch of new category of software, Enterprise Performance Management for Operations Technology, that will improve the way a variety of companies collect, analyse and act on data from their operations. The software solution, called Honeywell Forge, will leverage the company's more than 100 years of expertise in asset and process control technology and will transform the way work gets done by owners and operators of buildings, airlines, industrial facilities and other crit...
Vaion, a Ubon Partners company, is emerging from stealth mode to disrupt the physical security market by embedding the power of artificial intelligence (AI) into its complete video surveillance solution. Vaion's product line, which includes high-quality security cameras, a video management system and other intelligent solutions, premieres at IFSEC International, an event that takes place between June 18-June 20 in London, U.K. As a global company with offices in New York, London, and Oslo, Vaion is changing the traditional video security landscape with AI capabilities that make it easier for businesses and organisations to monitor their assets proactively. Detecting threats in earliest stages Vaion offers an end-to-end surveillance solution that will help companies detect threats in their earliest stagesWith embedded video and audio analytics powered by machine learning algorithms, focussed interfaces, intuitive installation processes and a range of smart cameras, Vaion offers an end-to-end surveillance solution that will help companies detect threats in their earliest stages and perform fast, effective investigations with fewer resources. At the same time, Vaion vastly improves investigations by implementing the fastest, most accurate forensic searches using similarities and intelligent timelines. Initial product portfolio includes: Security cameras (Vaion vcam) with integrated directional audio analytics VMS (Vaion vcore) with embedded video analytics Security appliances (Vaion vserver) Hybrid cloud service (Vaion vcloud) Their first major premiering event will be IFSEC International, the leading security event for Europe and the U.K. There, Vaion representatives will provide an up-close look at how machine learning and integrated analytics offer a significant improvement on security deployments. Easy tracking of people and objects Businesses get instant alerts about suspicious activity and can easily track people and objects as they move through perimetersBusinesses get instant alerts about suspicious activity and can easily track people and objects as they move through perimeters. And exceptional video quality feeds from Vaion vcam Dome and Pano means that there's always a clear picture, no matter the lighting or environmental conditions. Analytics are performed pervasively, at scale and in real-time, from all the cameras in a deployment (even third-party cameras) and are embedded into the VMS (vcore). Vaion’s hybrid cloud approach makes possible the reality of remote configuration and access, instant firmware and software upgrades, and license pooling with great performance and network efficiencies. Sister company to cybersecurity innovator Jazz Networks, Vaion believes that a robust cybersecurity approach is necessary even in the physical security world. That is why its solution is secure by default with always-on encryption for recording and media transport. Vaion's products are designed in Norway, with software developed in the U.K. and cameras assembled in Taiwan. The portfolio will be available for customer trials and proofs of concept from July and generally available from Fall 2019. Operational and business intelligence We deliver a solution that allows customers to react to threats before they escalate rather than just help document the damage""We believe that it’s time to move from a mainly reactive to a proactive security model, and we founded Vaion to help our customers achieve this goal. We believe that the next generation solutions will be based on smarter sensors, software, and services that, instead of record what they see, actually understand the environment they operate in to help businesses act on these insights on time. “We deliver a solution that allows our customers to react to threats before they escalate rather than just help them document the damage. It enables them to find what they are looking for in seconds instead of days and provides them with much better operational and business-relevant intelligence," said Tormod Ree, Vaion CEO. Learn more about Vaion's innovative new security products online and by visiting with Vaion representatives at IFSEC International. Interested security professionals will be able to see Vaion's game-changing security technology in action and find out why AI is the secret to better, more comprehensive protection.
After strategic analysis of the best options to accelerate growth at TDSi and augment the launch of the new GARDiS ONVIF Profile A and C compatible hardware and software platforms and the journey to offering Access Control as a Service capability to our customers and the market TDSi is pleased to announce that it has agreed to be acquired by VITAPROTECH Group, one of the European providers in access control and security systems and technologies for critical sites. This acquisition continues Vitaprotech’s dynamic and steady growth strategy which has included several acquisitions in the market over the last 2 years. Access control portfolio The acquisition of TDSi aligns perfectly with VITAPROTECH Group's and TDSi’s growth strategy to develop export sales of technological security solutions for sites all around the world. This acquisition will enable VITAPROTECH to expand its access control portfolio For over 35 years, TDSi has been offering a vast range of readers, controllers and software systems through its customer network primarily in the United Kingdom, France, Asia Pacific and the Middle East. This acquisition will enable VITAPROTECH to expand its access control portfolio, to strengthen the Group's export presence and to access international distribution networks in the sector. Perimeter intrusion detection For TDSi, this merger will allow it to speed up the finalisation of its new range of GARDiS products including the launch of Access Control as a Service through the GARDiS ONVIF Compatible Open Source software platform and to benefit from the additional resources that the Vitaprotech Group brings to strengthen its market penetration in markets it currently doesn’t service through the use of Vitaprotech Group business development and sales teams across the world. For Vitaprotech Group's perimeter intrusion detection business, TDSi will become the logistics and technical support base in the United Kingdom, delivering better service for the UK market.
German manufacturer Dallmeier announces a development partnership with AnyVision, a pioneer in AI-based facial, body, and object recognition. The aim of the cooperation is to integrate AnyVision’s facial recognition technology into the Dallmeier ‘HEMISPHERE’. The HEMISPHERE software platform offers customers from various industries a wide variety of modular solutions for security applications and business process optimisation. From the optimisation of marketing activities to forensic evaluations – the use of facial recognition technologies is becoming increasingly important for customers of video technology solutions. The integration of AnyVision’s technology will enable Dallmeier customers to utilise facial recognition data within various modules of the Dallmeier HEMISPHERE software platform. Facial recognition solution This allows customers of the Dallmeier HEMISPHERE software platform to access and leverage the data In this way, security and business processes can be optimised, e.g. through blacklist/whitelist procedures, marketing optimisation through VIP-customer recognition, forensic evaluations in law enforcement procedures or the automation of access controls in office or manufacturing environments. This allows customers of the Dallmeier HEMISPHERE software platform to access and leverage the data within various solution suites. Specifically, AnyVision’s facial recognition solution will be integrated into the Dallmeier HEMISPHERE SeMSy® Video and Security Management Suite, as well as in other solution suites of the HEMISPHERE platform, such as the Situational Awareness / Incident Management or Data and Security Information Management. Video security technology “In today’s increasingly complex world, customers need solutions that can integrate powerful components from leading manufacturers within a single platform strategy. Partnerships like this with AnyVision ensure that our customers always have the optimal combination of leading technologies at their disposal,” said Dieter Dallmeier, Founder & CEO, Dallmeier. “Dallmeier’s solutions in sectors such as safe city, stadiums, airports, logistics, casinos but also in the processing industry cover more and more topics that go far beyond classic video security technology. This makes it all the more important to work together with the right partners for complementary technologies which, when combined, offer decisive added value.” The German manufacturer Dallmeier electronic has been manufacturing solutions for security applications and process optimisation for 35 years. The portfolio includes cameras, recording systems and software. Security and surveillance AnyVision currently develops technology for security and surveillance Dallmeier’s solutions are used worldwide by customers in areas such as safe city, stadiums, airports, logistics, casinos but also in the processing industry. The partnership is also part of AnyVision’s mission to make its innovative AI-powered technology available to more businesses and environments across the globe. Unlike other software solutions in the market, AnyVision’s software is plug-and-play for new and existing systems, and able to overcome challenges such as occlusions, different angles of view, and poor lighting conditions. AnyVision currently develops technology for security and surveillance, mobile authentication, access control, and real-world analytics. Boris Gokhman, Vice President of Strategic Partnerships at AnyVision, commented: "Facial, body, and object recognition have real-world benefits right now. Collaborating with best-of-breed technology partners to help more organisations ‒ working across diverse sectors ‒ harness new capabilities and achieve those benefits is hugely important to us. We are delighted to be working with Dallmeier on this and look forward to expanding this partnership in the future.”
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing the benefits of their KeyWatcher Touch and AssetWatcher key and asset management solutions at IFSEC International 2019 (stand no. IF620) in London, from June 18-20. The company is also introducing KeyWatcher Fleet, a key control system specifically for fleet management, to IFSEC attendees. “We’re thrilled to once again showcase the exciting features of our AssetWatcher and KeyWatcher Touch solutions,” said Fernando Pires, CEO at Morse Watchmans. “This year, IFSEC attendees can get a demo of our KeyWatcher Fleet, which is purpose-built for fleet managers. We are looking forward to sharing all three key and asset control products with IFSEC 2019 attendees.” Tools to optimise vehicle usage Morse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usageMorse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usage while reducing many operational costs. Managers can create user role-based ‘Pools’, or groups of vehicles, to automatically assign each vehicle accordingly. Flexible booking workflows enable customisation to balance usage, ensure vehicle availability and more. A range of service features makes it possible to report problems and automatically initiate new or scheduled work on each vehicle. System alerts notify management to specific issues such as an unauthorised booking attempt or expiring driver’s license, and the system generates a number of useful reports with actionable insights. A convenient dashboard displays real-time status, bookings summary, vehicle use and many other data points to provide the pulse of the fleet in an instant. KeyWatcher Touch key management system The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker systemMorse Watchmans’ KeyWatcher Touch key management system utilises a 7” touchscreen for an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enrol fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile devices and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three usage modes for flexible usage. AssetWatcher’s RFID technology allows you to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Proven features of KeyWatcher, including email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher.
SimonsVoss Technologies GmbH, part of the Allegion group - a pioneer in digital locking and physical access control systems - enters a technology partnership in Europe with Morphean. The new technology partnership, that will utilise SimonsVoss’ digital access control system SmartIntego, extends Morphean’s cloud-based capabilities beyond video surveillance and into the access control-as-a-service (ACaaS) market, forecast to reach US$2.8b by 2024. Integrated security system We are seeing considerable growth in demand for wireless locks" The secure Morphean platform informs decision making and drives efficiencies for organisations by generating unique and actionable insights from a multitude of data sources. The combination of an integrated security system hosted in the cloud that now combines video surveillance and access control promises not only greater security with two factor authentication but also a wealth of rich data. This will help businesses optimise operations and processes, such as by gaining greater insight into customer and employee behaviours or how office space is utilised. Martyn Ryder, VP Sales & Marketing at Morphean says, “We are seeing considerable growth in demand for wireless locks so we welcome this timely agreement to partner with SimonsVoss. This will allow us to extend our current access control offering and meet growing market and customer demand for both wired and wireless locking solutions via our cloud managed access control solution. The powerful combination of video security and access control as-a-service will bring many operational and business benefits for our customers across Europe and beyond.” Access control data The advance of smart cities, a more stringent regulatory environment and rising crime rates are some of the factors behind the appeal of ACaaS and outsourcing access control functions to guarantee accurate maintenance of key cards. Digital access control systems are valued highly in security technology for buildings" With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments and shifting the onus of cybersecurity and firmware updates to the vendor. “Digital access control systems are valued highly in security technology for buildings,” commented Evert te Pas, International Sales Manager at SimonsVoss. Snap-in installation “SmartIntego by SimonsVoss is a state-of-the-art digital access control solution that is easy and simple to deploy into existing physical and digital infrastructure such as doors and IT networks. The cable free and snap-in installation means it is compatible with most doors with no drilling of holes, so is scalable and flexible without limitation.” Morphean’s ACaaS system utilises door controllers from Axis Communications, namely the AXIS A1001 and the AXIS A1601, that serve as the interface between the cloud and the SimonsVoss’ SmartIntego system. Stephanie Hensler, Director Business Development at Axis Communications, said, “Axis is totally committed to this market and creating innovative solutions based on its open standards that allow partners to integrate different types of software and hardware for a fully scalable, flexible and future proof solution. We look forward to working even more closely with Morphean.” Morphean will be attending IFSEC 2019, 18-20 June, ExCel, London (Axis stand IF920).
Hikvision, the provider of innovative video surveillance products and solutions, launches the Technology Partner Program Portal (TPP Portal). This new web-based portal is designed to enhance the collaboration with technology partners and systems integrators, enable development of new and innovative solutions for customers across all markets, and further drive market growth. Technology partners can use the marketing capabilities of the portal to grow their businesses, taking full advantage of Hikvision’s global reach. Equally, systems integrators can use the portal to learn more about Hikvision technology, to build new relationships with Hikvision’s technology partners. Cost-effective way Jens Berthelsen, Global Partner Alliance Manager at Hikvision, says, “Hikvision has a long-term strategy of working closely with technology partners and systems integrators to build the best possible offerings for customers. The Technology Partner Program Portal will be a driving force in enabling this.” “The portal will help our technology partners capitalise on their investment in working with Hikvision, and to scale up their businesses in a very cost-effective way. We are very proud of launching our new portal and invite our technology partners to join.” Key features and benefits Hikvision Technology Partner Program Portal’s key features and benefits are as follows: The TPP Portal is a comprehensive repository of technical documentation for systems integrationAn ever-growing partner platform - The portal will become a comprehensive partner database, and systems integrators will be able to use the TPP Portal to find the ideal partners for each project. The portal will feature a public listing of all technology partners and their locations, coupled with rich information about their solutions, making it the ideal platform for striking up new business relationships. Easy engagement with Hikvision integration support - The TPP Portal empowers technology partners to engage with the Hikvision integration department in a private and password-protected environment. Key modules within the portal include integration support, marketing events, integration project tracking and solution information management. Technical and commercial library - The TPP Portal is a comprehensive repository of technical documentation for systems integration. This includes SDK documentation, software tools and agreements. This area of the portal is only visible to technology partners, and selected sections are visible to individual partners only. Hikvision Embedded Open Program (HEOP) management - Technology partners that want to embed their technology into Hikvision cameras can manage the process here, including distribution-friendly license management.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture influences door solution decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organisation’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organisation and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training employees on door security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organisation or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate through the decision-making process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New security entrance installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule group meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure you monitor public areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organisation. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What is the ultimate success of the installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SourceSecurity.com. Q: What do you believe are the main physical threats to data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organisation, which are: Every organisation is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organisation is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What do you think influences employees to steal data from their own organisation? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many of us think of security threats coming from an outsider, do companies still face these type of threats? Yes. Unfortunately, organisations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether it be an insider threat or an outsider threat, what are ways these individuals can steal sensitive data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What is the difference between COTS and disguised devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With these types of discrete items, can security personnel still catch individuals in the act? For example, through security screenings? Poor or nonexistent screening is the most substantial security threat to any organisation when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s surprising that so many organisations would neglect physical security when protecting their data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So how can an organisation protect against these risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organisation, with little overlap or communication. Organisations now are realising that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How can companies and government agencies combine both physical data security and cybersecurity initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What type of technology can you use to protect physical data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How does FMDS work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What are the key takeaways for organisations looking to enhance data security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognising the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organisation’s data. Organisations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organisations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
Deploying security robots at a company is about more than providing and programming the hardware. There is also an element of “change management” involved in smoothing the way for robots to play a security role working side-by-side with human counterparts. Rising popularity of security robots As security robots increase in popularity, more companies are adapting to such cultural challenges "As security robots increase in popularity, more companies are adapting to such cultural challenges. Many Fortune 100, technology, finance and defense companies have begun using security robots, and some are asking to expand their implementation", says Travis Deyle, CEO and co-founder of Cobalt Robotics. "It is a complex solution that involves merging technology with people." “More people are looking at how they can deploy and test this technology, dipping their toes in the water,” says Deyle. “Financially the risk is low, but culturally it is pretty acute. It is a very visible piece of technology moving through your most sensitive spaces and interacting with employees.” Change management “Doing change management and addressing the cultural implications inside the company are the biggest challenges we face,” Deyle adds. “We have to make sure that people know what the robot is there for, what it does and how it helps them. There is a social contract between companies and employees about what information is being collected and how is it being used.” The technical onboarding of a robot is the easy part, says Deyle. “The robot goes in, maps out the space; it takes about an hour. The bigger part is the cultural onboarding.” The process involves working closely with the company’s communications team to manage how the use of robots is messaged throughout the company. Deyle suggests doing a Q&A event where employees can touch and feel the robot and get comfortable. “We tailor the interaction to the individual company,” he says. Importance of communication Communication with employees, tenants, clients, law enforcement, etc. is very important Communication with employees, tenants, clients, law enforcement, etc. is very important and, if done well, all goes smoothly, agrees William Santana Li, Knightscope Chairman and CEO. “Showing up with a 400-pound, 5-foot-tall autonomous robot, deploying it and not telling anyone what is happening is ill advised!” Knightscope also advises potential end users to identify clearly the areas of improvement needed in a security program to guide the deployment of robots. Beware of “Science Fiction Disease,” whose symptoms include unrealistic expectations or fears emanating from Hollywood depictions of robots over the years. Expectations should be spelled out: Keep ongoing and clear communications between the provider and the client, continuing to make improvements together. Future of robotics and AI Users should also think clearly through their source of funding, including the second and future years of an implementation. Communication is key, involving stakeholders from the CSO to facilities, purchasing to human resources, finance to the CEO. The future of robotics in corporate America is more than the development of the technology. Given advances in artificial intelligence (AI), sensors and software, the technology is the easy part. Thinking more broadly about how robotics can excel in the corporate environment – and make companies safer – is the next big obstacle on the path to effectively using the powerful technology.
Managed services provided through the cloud offer multiple advantages for system integrators. These include: Increased recurring monthly revenue: Managed services are a new business model that generates more stable and predictable income streams for integrators. Stickier customers: Managed services foster a more involved relationship between integrators and their customers, which can help boost customer retention. The cloud enables integrators to serve more sites without hiring additional technicians High gross profit margins: Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. They are easier to provide: The cloud enables integrators to serve more sites without hiring additional technicians. Problems can be fixed proactively: When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue - possibly before the customer even notices a disruption in service. Increased valuation of business: According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Importance of cloud-based solutions The cloud also challenges integrators to educate customers on the value of the new approach The cloud also challenges integrators to educate customers on the value of the new approach. For example, the cloud changes the expense model of security systems. It allows customers to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into the service, you don’t need a large capital outlay up front - you simply pay a predictable expense every month. Leveraging this difference opens new sales opportunities for integrators. The benefits of cloud services on how physical security equipment and software services can be monitored and maintained through a connected service is a particular benefit to integrators. Data monitoring and security “By having data describing the health of the system shared on the cloud, system integrators can observe data on demand and create proactive maintenance plans in coordination with the end user,” says Stuart Rawling, Director of Business Development, Pelco by Schneider Electric, and one of our Expert Panelists. A daily challenge for end users is balancing human resources used in the operation of a system “Such plans should result in increased system reliability and less downtime. If system performance data is aggregated and anonymised, it could also be used by manufacturers to analyse and form conclusions about maintenance schedules and system lifespan.” A benefit is happier customers. “A daily challenge for end users is balancing human resources used in the operation of a system and daily maintenance, with maintenance having shared responsibility with the system integrator,” says Rawling. The cloud software as a service The SaaS model gives companies the resources to improve the deep learning model" The cloud also can help to make cutting edge technologies more affordable. Economies of scale provided by the Cloud (Software as a Service, or SaaS) are making the sophisticated capabilities of deep learning affordable to a wider audience. Meanwhile, deep learning augments cloud systems with capabilities that may not be available (or affordable) in on-premise systems, thus accelerating the broader move to cloud systems. “Having a SaaS model gives companies the resources to improve the deep learning model,” says Shawn Guan, CEO and co-founder of Umbo Computer Vision, a provider of deep learning video analytics. "We can make more accurate systems that scale better and faster. SaaS enables vendors to do something great with deep learning. You don’t have to redo it for everybody. One customer benefit from another customer and all the knowledge is aggregated together.”
Virtualisation offers multiple benefits to video surveillance systems, but the technology has been slow to adapt to the needs of video. However, the tide is turning. At ISC West, BCDVideo introduced a hyperconverged infrastructure tailored to video surveillance (HCI-VS) that answers the demand for higher and more efficient operating performance while also lowering the total cost of ownership for the integrator and end user. Hyperconverged infrastructure solution “ISC West attendees were able to get their hands on our hyperconverged solution and immediately see how easy it is to use and the benefit of adding virtual machines,” says BCDVideo’s Chief Technology Officer Tom Larson. Security integrators were impressed that BCDVideo continues to adapt technologies" Virtualisation was just one of the innovations in BCDVideo’s demo room. Many integrators and end users found their way to the conference room, located not far from the exhibition hall, and BCDVideo was also featured at partners’ booths on the show floor. “Security integrators were impressed that BCDVideo continues to adapt technologies to the video surveillance space,” says Larson. “BCDVideo ‘gets’ them, but often IT does not. The HCI solution is purpose-built for video, and it works.” Server, storage and networking BCDVideo’s HCI-VS is a virtualised, video-optimised and highly available infrastructure. It combines the server, storage and networking into one platform. Powered by Scale Computing’s HC3 software, BCDVideo’s HCI is a scalable, node/cluster-based infrastructure that enables integrators to virtualise their physical security appliances and software, meaning fewer devices need to be deployed and maintained. Physical security integrators can create an infrastructure that provides high availability to the VMS" “More importantly, our HCI makes it easier than ever before both to quickly create and deploy virtual machines, and to manage video surveillance infrastructure,” says Larson. Some of the unique needs that HCI-VS serves are those of multi-faceted projects involving video recording, access control, building management, etc. With HCI-VS, separate appliances are not needed for each of these tasks, which enables better use of hardware, reduces overall rack space and power/cooling costs. Essentially, this solution eliminates the “pizza box” model and serves the need in the marketplace where always-on video and high availability are necessary, and especially in situations where loss of video data cannot be tolerated, says Larson. Simplified graphical user interface (GUI) makes it easy for integrators to implement systems that use hyperconverged technology Tolerant to hardware failure “By leveraging the concepts of hyperconvergence, physical security integrators can create an infrastructure that provides high availability to the video management system,” he says. “When components within a video management system are tolerant to hardware failure, it results in less loss of data and continual access to the data from the failed component. You always have access to the video data even if the hard drive fails.” Defining virtualisation Virtualisation is the act of creating virtual copies of physical resources, including, but not limited to, compute, memory, storage, and network resources. This is achieved by employing software to manage all physical resources, known as a hypervisor. As servers become more powerful, the discrepancy between software and hardware capabilities result in inefficient use of resources. “By partitioning the hardware resources into smaller virtual environments, we can create multiple virtualised servers that share a common set of resources,” says Larson. “By sharing this common set of resources, the virtualised servers utilise the resources more efficiently with less waste.” Integrators and end users flocked to BCDVideo's demo room at ISC West to try out the new hyperconverged solution Education and physical security Learning about the benefits of why to virtualise and applications will be a first step” A challenge to greater adoption of virtualisation in the physical security industry is education. “Some security integrators will need to step out of their comfort zone,” says Larson. “Virtualisation for video has been slow to adapt, and other solutions are complicated. IT technology applications traditionally have not worked in the space either. Learning about the benefits of why to virtualise and applications will be a first step.” HCI-VS in new verticals While HCI-VS is vertical-market-agnostic, the solution is suitable for school districts looking to consolidate their hardware, for hospitals and the healthcare industry in general, for the rapidly growing cannabis industry, any mass transit system, as well as for Fortune 1000 companies, to name a few. “Our virtualised solution especially appeals to these verticals because of the number of cameras, the need for 24/7/365 video recording and extensive data retention requirements, and where loss of video data cannot be afforded,” says Larson. Purpose-built solutions BCDVideo’s HCI-VS is the latest example of products BCDVideo is creating for the physical security industry. “We purpose-build and engineer our solutions specifically for video surveillance with the ability to scale-out as needed,” says Kelly Kellen, BCDVideo’s Director of Marketing. “We engineer new products to address problems in the marketplace. Our CTO is really looking at the market and studying the security integrator’s pain points. Then we engineer solutions to best serve them.”
King Chulalongkorn Memorial Hospital (KCMH) is a public medical facility in Bangkok, Thailand. The hospital is operated by the Thai Red Cross Society and functions as the teaching/training medical center for Chulalongkorn University’s Faculty of Medicine as well as the Thai Red Cross College of Nursing. With 1,479 in-patient beds, it is one of the largest hospitals in Thailand. Bhumi Siri Mangalanusorn Building (BSMB) is the largest Centre for Medical Excellence in Thailand. The building has 34 floors and total area of 225,000m. Gallagher security solution benefits Can integrate with other systems, such as Symphony video management software, building automation, parking and fire alarm systems Has a user-friendly Graphical User Interface (GUI) Is highly reliable and scalable, to meet future security needs Can meet increasing compliance requirements Supported IT industry standards for integration, XML, SQL, OPC, BACnet, etc Gallagher and AES Group Ltd, the local Gallagher system integrator, worked closely with the designer to ensure that the proposed system met the tender requirements of securing the hospital and protecting staff, patients and assets. The system is fully integrated, scalable and expandable, digital-based, user-friendly and crucially, a combination of enhanced operational efficiency and cost saving. Gallagher Command Centre Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems, including fire alarm, video management system, building automation and parking, and feed the information into Command Centre. KCMH Security Manager, Adul Karutbumrung, says having one central monitoring platform ensures operational staff quickly identify, locate and respond to any risks on site. “The Gallagher system provides us with a higher level of validated access control in critical areas”. Centralised operation platform Gallagher’s system streamlines operations for KCMH to lower total cost of operation through its centralised operation platform. The user-friendly GUI also delivers the best value to reduce training time. In addition to meeting KCMH’s requirements for security, privacy and compliance, Gallagher provides additional benefits and features not available in other systems. Its scalability ensures that future expansion requirements can be addressed in a cost effective manner.
Two years ago, LABS opened up its new co-working facilities in Camden Market and has a number of locations centered around this iconic area of London. LABS isn’t just popping up in random locations but creating a co-working ecosystem of interconnected buildings and communities. Many companies who hire space are high tech, therefore they expect the facilities they work in to include the latest technology. The challenge LABS faced when developing a co-working environment was to offer a safe and secure working environment that is easy to use by both the clients and staff and uses the latest technology features and provides flexibility and future proofing. Gallagher Command Centre The Gallagher solution was specified for the project because of the central hub it provides The Gallagher solution was specified for the project because of the central hub it provides as well as its ability to integrate with a number of products, such as visitor management software (VMS) and CCTV. The Gallagher Channel Partner was able to offer a tailored security package that ensured LABS premises are safely monitored, guaranteeing smooth day-to-day operation. The buildings are managed by Community Managers, whose role is to understand all the companies and people who work within the LABS buildings. With this understanding the managers can bring the community together and help create beneficial relationships. Community Manager at Camden, Fran, is able to use Gallagher Command Centre for a number of tasks such as monitoring who enters the building including visitors, checking which meeting rooms are reserved, what hospitality is required etc. Bluepoint Real-Time Access Management LABS also use Bluepoint Real-Time Access Management (RAM), which integrates with the Gallagher Visitor Management system to create and modify cardholders and groups. Commands sent from the integration provide muster functionality and enables Community Managers, like Fran, full visitor and staff journey awareness. In order to attract new clients, the building runs open events and also allows people to book a tour. Guests will receive a QR code on their mobile phone so they can enter the building. Fran will receive a notification to say her guest has arrived so she can meet them and show them round. People within the building can also use the same functionality for visitors. Mobile access control Leases can be short, medium or long term and range from the occupation of offices to desks Everyone who works within a LABS building has access to an app so they can book meeting rooms seamlessly, find talent, swap skills, and engage with the community. This is the customer facing tool which links to Command Centre to ensure when someone books a room the relevant people are notified, and the system is updated. Leases can be short, medium or long term and range from the occupation of offices to desks. This means there are lots of leases starting and ending at different times making it difficult to keep track. By integrating with Command Centre access can be instantly revoked should a lease lapse, saving Community Managers time by not having to manually deny access.
Siklu, the pioneer in 5G mmWave wireless network solutions, announced that its radios have been deployed in the City of Cambridge, located roughly 100km West of Toronto in Ontario, to provide outdoor video security and support potential public Wi-Fi network services. The city has fibre connections connecting several municipal buildings and continues to deploy more where it makes economic sense. Fibre is used to connect fire stations to City Hall, for example. However, this particular application, outdoor video security, was one that needed more flexibility to accommodate the necessary camera locations. Most parking lots, Intersections and pedestrian walkways do not have a fibre POP (‘point of presence’) nearby. This meant the answer would almost certainly have to be a wireless solution. Need of flexible video security solution The wireless network would need to be able to backhaul gigabit per second public Wi-Fi APs with no additional truck rollsThe solution to be chosen had several additional requirements. It needed to be flexible when it came to expanding the video security coverage, it had to be secure and it also had to have enough capacity that it could support additional high bandwidth applications, such as the deployment of Public Wi-Fi. The wireless network would then need to be able to backhaul gigabit per second public Wi-Fi APs (‘access points’) with no additional truck rolls. The successful bidder on the project was Alliance Security Systems. Alliance investigated 5 GHz solutions as well as 60 GHz and determined that only 60 GHz products could meet current and future requirements. The ‘EtherHaul 600’ point-to-point 60 GHz solution from Siklu features plenty of capacity (from 100Mbps up to 1Gbps, software upgradeable), flexible deployment options (up to 1km “link” range), small size (mountable on street light poles) and immunity to radio interference (e.g., 5 GHz systems are subject to the ever increasing Wi-Fi noise floor). Deployment of P3717 multi-lens cameras Phase 1 of the program supported ten multi-lens camera deployments, and the network design had six 1-Gbps Siklu V-Band radios collocated at the city Clock Tower. This dense colocation was a result of the very narrow 60GHz radio beams and the abundant spectrum (14GHz) available. Deployment of the Siklu radios was accomplished within a week and incorporated an Axis Communications P3717 multi-lens cameras managed by a Genetec Security Center unified security platform. Since the installation of the video security network, a car theft ring was apprehended and there has been a reduction in crimeTom Hackett, Alliance Security Systems stated: “By utilising the point to point technology in such a way where we co-locate the head end, we end up approaching a cumulative speed of over 10Gbps per second once Phase 2 is commissioned. That’s just an astounding wireless speed in today’s world. The network has been such a success that beyond expansion plans with Cambridge, we are in discussions with other municipalities.” Reduction in crimes The City also operates the Phase 1 network to provide access to police as requested for specific incidents or investigations. Since the installation of the video security network, a car theft ring was apprehended and there has been a noticeable reduction in crime. Beginning in June 2019 or as soon as light poles become available, Phase 2 will add seven new cameras and will be supported by Siklu’s V-Band ‘EtherHaul 600’ radios. The EtherHaul 600 units feature 1 Gbits of capacity and can accommodate future expansions of the system. “The network was installed and is delivering in all aspects – high up time and excellent video quality,” said Trevor McWilliams, Manager of Business Development for the City of Cambridge Ontario Economic Development. “We are confident that the network deployed will operate for many years and be able to support new applications as needed.”
Wellington is the southernmost capital city in the world and is the centre of New Zealand government. With the second highest population in the country, Wellington is a large coastal city with a diverse range of facilities and attractions. A large portion of those facilities and attractions are the responsibility of the Wellington City Council (WCC) – a local body government organisation employing around 1,800 staff. As with all councils that manage a large number of facilities on behalf of their city, the WCC has a broad range of security needs and an accountability to the rate-paying citizens of Wellington. Since 2001, WCC has met those security needs with Gallagher’s integrated security solutions. Central management platform WCC developed a five year plan to migrate all 150 sites on to the Gallagher system With 1,800 employees and 150 sites located across Wellington, the council has a large number of people and assets to secure. With sites including libraries, swimming pool complexes, community and recreation centres, housing blocks, a city zoo, event facilities, and a multi-story central office building, the security requirements vary considerably. “We’re responsible for securing and monitoring all 150 sites around the clock” said Chetan Prasad, Security Manager for Wellington City Council. “It’s imperative we have a reliable system that provides us with a complete view of activity at all sites”. In order to deliver this, WCC uses Gallagher’s Command Centre central management platform to manage security across numerous sites. Utilising a single security platform has been a long-term objective of the council. Initially operating six different systems, WCC developed a five year plan to migrate all 150 sites on to the Gallagher system. Chetan links the Council’s growth with their need to become smarter about how security is managed. Primary security solution “Gallagher’s system has enabled us to standardise our infrastructure and bring all elements including alarm management, fire systems, vehicle bollards, video surveillance, facility and carpark access, reporting, visitor management, and more, on to one platform. That was a key factor in why we chose Gallagher initially, and why we will continue with them as our primary security solution.” Visibility is critical when you have 150 independent sites to secure. An integration between Command Centre and over 400 cameras located throughout the WCC’s facilities provides live video footage to the security team. “Our camera integration with Command Centre means that in addition to being able to continuously observe critical areas, any site alarm that is triggered will immediately bring up a live video feed for the security staff in our control room. This visibility is invaluable for us in activating appropriate responses and, in the event of a crime, being able to provide crucial evidence to police” said Prasad. Electronic access control WCC is utilising Gallagher security technology to ensure staff are protected In addition to securing facilities and assets, WCC secures and protects staff working at each of its sites. From initiatives like integrating building elevators with access control to prohibit unauthorised entry, to the integration of panic buttons at each site, WCC is utilising Gallagher security technology to ensure staff are protected and that in the event of an incident, a rapid security response is initiated. According to Prasad, the Gallagher system is delivering cost savings to the Council in several key areas. The first area relates to the shift from traditional key systems to smart card technology. “With such a large staff base and so many sites, we inevitably faced challenges with traditional keys being lost or not returned by staff or contractors” said Prasad. Rekeying a site cost the Council approximately $4,000 each time – an expense that has now been eliminated by the replacement of traditional lock and key systems with electronic access control. Visitor management solution “Now if a card is lost or not returned, we simply deactivate it in our system. Not only is it a solution that saves us money” said Prasad, “it is also a solution that can be applied instantly.” Similarly, the ability for security personnel to assess a site and reprogram an alarm remotely, also saves the council considerable costs associated with dispatching guards to site. The second area where cost savings are apparent relates to intelligent automation. An integration with WCC’s HR system means that as staff leave employment, their cardholder profiles are automatically disabled in the system. The use of Gallagher’s Visitor Management solution, means that appropriate staff are automatically notified if a guest or contractor fails to sign out or return a key. These two automations alone, save the WCC security team approximately 4-5 days of cardholder administration each year. Software maintenance contract WCC elected to take a 10 year Software Maintenance agreement with Gallagher In 2014, following 13 years as a Gallagher customer, WCC elected to take a 10 year Software Maintenance agreement with Gallagher. The Software Maintenance contract ensures the Council have access to the latest developments as soon as they are released, keeping WCC at the forefront of security technology. “Software Maintenance makes good business sense” says Prasad. “It gives us access to a comprehensive range of licensable features and benefits, and ensures our upgrade costs are effectively distributed.” Prasad describes the Council’s confidence in Gallagher as another significant factor in the 10 year agreement. “We have found Gallagher’s security solution to be a reliable and versatile, highly secure, modern system. It has supported our significant growth to date, and we are committed to using Gallagher systems for the Wellington City Council’s future.”
Located in the South East of England, Basingstoke and Deane is a local government district and borough in the county of Hampshire. With Basingstoke as its largest town, the area is known for family-friendly living and is home to over 175,000 people. Basingstoke and Deane Borough Council consists of 60 elected members who discuss local politics, municipal budgets and taxes at regular meetings. For full transparency with the members of their constituency, the council streams live video of all its meetings, including public votes, on their YouTube channel. Automatic camera control To ensure a high level of video production, the Borough Council decided to upgrade their conference system. After discussing their requirements with Andover-based system integrator VP Bastion, a fully IP-based DICENTIS Conference System from Bosch was installed. The system meets the council’s key priorities by offering the highest audio quality, full integration of live voting, built-in automatic camera control and direct streaming with speaker-name indication. Council members wanted the freedom to sit anywhere in the council chamber during council sessions Additionally, council members wanted the freedom to sit anywhere in the council chamber during council sessions – while still being automatically identifiable on camera – and the installation needed to accommodate for the limited desk space and cabling voids. The system includes 63 DICENTIS Discussion devices with touchscreens (to support the required voting and identification capabilities for council members), nine DICENTIS discussion-only devices for guest speakers, and automatic camera control software. High directive microphones All the discussion devices are mounted on raised brackets to maximise desk space and are equipped with high directive microphones to deliver crystal-clear audio. Council members have the freedom to sit at any seat in the meeting room, as the system automatically registers their presence at a specific location thanks to the NFC (Near Field Communication) card registration on the discussion devices. When a speaker activates its microphone, the system’s automatic camera control points the camera towards their location, zooming in and displaying their image on the big screen. Additional features were added to the installation thanks to DICENTIS’ compatibility with third-party software. Two companies – Arbor Media, European market leader in conference recording and streaming services, and MVI Engineering, expert in creating conference software solutions – worked together to create a webcasting and conference control software package that was integrated with the DICENTIS system. Integrated conference system The new DICENTIS system has supported a seamless and transparent democratic process This solution helped to fulfil all the Borough Council’s requirements, including report generation via live image feed and identification by name and party affiliation on the council’s YouTube channel. In addition to displaying the DICENTIS-enabled voting results on the council chamber’s big screen, it is now possible to share the voting results on the YouTube Live feed. Since the installation, the new DICENTIS system has supported a seamless and transparent democratic process at Basingstoke and Deane Borough Council. “Having a fully integrated conference system with audio-video feeds from meetings automatically streamed to the council’s YouTube channel was a must,” says Iain Steele, Director of VP Bastion. Behind the scenes, via the third-party MVI Engineering application, the system automatically upgrades to the latest software versions. These centralised updates save time and operating costs. With the potential to increase the system’s functionality and size in the upcoming years, the council has a future-proof and expandable conference solution from Bosch, which already supplies around 50 percent of councils in the United Kingdom and Ireland.
The London Clinic has installed bespoke Traka solutions to ensure accountable authorised access and instant audit control capability for keys across its state-of-the-art hospital facilities. Harley Street’s globally renowned London Clinic is one of the UK’s largest private hospitals, dedicated to providing the best, personalised healthcare with a breadth of surgical and medical expertise. With hundreds of keys and access points in operation across the hospital, the Security and Operations team was reliant on a manual logging in and out system, which was proving inefficient and risked time delays to patient care. In sourcing a more innovative way to keep track of authorised access, especially to drugs cabinets and the Clinic’s 10 specialist theatre areas, Traka was installed and networked across the site. The benefits of instant audit control capability and additionally being able to set curfews for different staff rotas has already made a significant difference in the efficient running of the Clinic. Ensuring safety of staff and patients Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location"“The vision and values of the Clinic have been developed through working with our Trustees, management teams and staff. As part of this process, we pride ourselves on being ‘pioneering’ not only in our attention to medical care but also in establishing better and more efficient ways of working,” says Lee Humphries, General Manager Security Operations at The London Clinic. “This is across every aspect of The Clinic, right down to daily operations. Security and key management are integral not only to the efficient running of the Clinic but also to ensure the safety of our staff, patients and guests. Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location; allowing our staff to focus on delivering high-quality service.” In total, Traka has installed four networked key cabinets, which utilise its flagship Traka32 technology to provide all the administration tools needed for the Clinic to effectively manage operations from its server and still provide extensive real-time data capture. Enhancing the hospital functionality Within the system, the Security team has now set curfews so that keys not returned will automatically trigger a notificationWithin the system, the Security team has now set curfews so that keys not returned will automatically trigger a notification, sent via email and text. There is also an opportunity for authorised personnel to pre-book keys in advance, so they are reserved, which has proven especially useful to manage contractor access and work programmes. Ben Farrar, Traka Marketing Development Manager added: “Providing key management solutions for a hospital environment, such as The London Clinic, involves more than a choice of high-quality products and services – it encompasses best practices and an integrated approach to ensure the safety and security of staff, patients and visitors. “We worked in partnership with the Security and Operations team, right from the initial design process to create a bespoke Traka solution that could instantly enhance the smooth running of the hospital, without compromising on ease of use in emergency situations. And by adding Traka32 software, we achieved the requirements with the flexibility to create own central control over authorised access to critical keys.”
Round table discussion
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?