When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which securi...
Paxton’s combined video management and access control platform, Paxton10, now allows administrators to manage multiple sites, spanning cities, countries and even continents. Paxton10 Paxton10 is the newest and most powerful system, developed by the international security manufacturer, Paxton Access Limited (Paxton). The new system is critically acclaimed among industry experts, as well as a favorite for Paxton installers. One Paxton installer and the Managing Director of Seen Ser...
Zicam Integrated Security, a surveillance and security specialist company, has signed another one-year full maintenance package with Sunseeker International, the British luxury performance motor yacht brand. Zicam Integrated Security will also be installing a brand new state-of-the-art CCTV system, in late 2021, at Sunseeker International's extensive manufacturing facility in Portland, Dorset. CCTV system installed The continued relationship between the two brands is explained by Sunseeker Int...
Fugue, the company transforming cloud security to help organisations innovate faster, announces it has added support for Google cloud to its multi-cloud security platform. With Fugue, cloud engineering and security teams can secure their entire cloud development lifecycle (CDLC)—from infrastructure as code to production—across their Amazon Web Services (AWS), Microsoft Azure, and now Google cloud environments using the same Cloud Security Posture Management (CSPM) solution. Multipl...
Group337, a team of experts focused on the business of the security, access control, and IoT industries, announces the hire of yet another hi-profile executive to their quickly expanding roster. On the heels of their recent hire of Hilary Gallagher, Group337 now welcomes Jonathon Harris as their new Vice President of The Index, the data and analytics arm of Group337's solutions for the market. In his new role, Harris will lead Group337’s efforts in security industry metrics, data, analyst...
ONVIF, the renowned global standardisation initiative for IP-based physical security products, has announced that more than 20,000 security products are now conformant to its various profiles. This new milestone underscores the strong market demand for interoperability of hardware and software offerings and the relevance of ONVIF as a recognised driver of open standards within physical security. Conformant security products “The mission of ONVIF is simple – To provide and promote...
Heald, a globally renowned innovator in the field of perimeter security technology and the manufacturer of quality security equipment in the United Kingdom, has announced a partnership with Sweden-based access control solutions firm, Intergate, following a recent installation of their Matador products in Stockholm, Sweden. Intergate is the renowned distributor in Sweden for access control solutions. The firm, which celebrated its 25th anniversary in 2020, is a subsidiary of Indutrade, which has a turnover of £1.6 billion and strength of 7,000 employees. Heald – Intergate distributor agreement Following the distributor agreement, the City of Stockholm ordered a number of Heald products through the new distribution partnership with Intergate, including the Matador, the first installation project of Heald products in the city. The purpose of the installation was to stop unauthorised vehicles from accessing a shopping centre area The purpose of the installation was to stop unauthorised vehicles from accessing a shopping centre area, located in the suburb of Skärholmen in Stockholm, but still, allow access to delivery and emergency response vehicles. The challenge facing the installation was the need for an effective and accessible solution that addressed the need for an ultra-shallow excavation, due to a parking garage located underneath. Matador sliding bollard The Matador bollard was chosen due to its unique design and its ability to be installed on the surface or with very minimal excavation, therefore, not interfering with underground infrastructure. The project included the fitting of six electro-mechanical sliding bollards and 26 fixed bollards. All of them were shallow mounted. The Matador is the world’s only sliding bollard that was developed specifically to address issues around underground infrastructure, while still providing access for permitted vehicles. Available in a range of operations, the patent-protected product is available as both shallow mount and surface mount and can be used as either a permanent or temporary security solution. Patent-protected access control products Intergate’s Chief Executive Officer (CEO), Fredrik Vedin said “The support from Heald has been outstanding through the whole installation process. Since this was our first time with this kind of product (sliding bollards), we needed extra attention and support from the technicians, sales support agents and engineers of Heald and we received everything we needed from them.” He adds, “We feel very confident with Heald as our supplier and we look forward to our next project together.” With innovation at the core of Heald, the company continues to offer unique, patent-protected products, including bollards and road blockers, to the market. Shallow or surface mount solutions Heald Ltd's bespoke designs are made to fit individual site requirements Heald Ltd's bespoke designs are made to fit individual site requirements and meet the increasingly demanding needs of organisations, which require high-security solutions against the threat of vehicular attacks, in particular locations that require shallow or surface mount solutions. Debbie Heald MBE, Managing Director at Heald Ltd, commented “We chose Intergate as our Swedish distribution partners, as they are leaders in their field with bollard installations, so the partnership seemed the perfect fit for our unique products.” High-security products and services Debbie adds, “Intergate has the same attention to detail, care for the customer and share the same values regarding providing and installing only the best in high-security products and services. There simply was no other choice for Heald in this region.” The partnership with Intergate follows on from recent announcements that Heald has partnered with Germany-based security firm, truckBlok and Singapore-based company, ESCO Pte Ltd to bring Heald products to the major cities around the world.
In modern crowded cities, effective traffic management is critical for reducing congestion and preventing accidents. With the Hikvision Traffic Visualization Dashboard, traffic managers can view historical and real-time traffic information, helping them make the best decisions and improve outcomes for road users and residents. Traffic management challenge in cities Cities around the world are experiencing major traffic management challenges related to congestion, air pollution, slow journey times, and increased road accidents. With 68% of people expected to live in cities by 2050 (compared to 55% currently) and tough demands for sustainability and lower emissions, the challenges are set to increase exponentially. In an attempt to keep traffic flowing and to maximise road safety, many cities are investing in roadside infrastructure to monitor traffic conditions, including cameras and sensors at key junctions. However, with no way to convert vast quantities of traffic data into actionable insights, this kind of infrastructure can rarely support effective strategic and real-time traffic responses. Traffic Visualization Dashboard To help authorities overcome their immediate and longer-term traffic management challenges, Hikvision has created the Traffic Visualization Dashboard. This dashboard integrates data from roadside cameras and sensors, and displays it to traffic management teams, via an immersive and map-based interface. Converting traffic data into actionable insights This Hikvision solution gives traffic managers fast and easy access to the information that they need With options to overlay historical and real-time traffic data on either a 2D or 3D map, this Hikvision solution gives traffic managers fast and easy access to the information that they need. The dashboard can also be customised quickly and easily, allowing teams to focus on the traffic information that is most important to them, from vehicle counting and congestion information to traffic incidents and violations, such as drivers who break the speed limit, drive without their seat belts fastened, or run red lights. Key benefits of the Traffic Visualization Dashboard: Optimised traffic management decisions - The Hikvision Traffic Visualization Dashboard solution combines historical and real-time traffic data, to help managers understand key traffic trends, thereby enabling them to make better planning decisions. In particular, the Traffic Visualization Dashboard can support better decisions on which kinds of traffic management policies and solutions to implement, from signal optimisation to access management solutions, and congestion charging schemes. Real-time incident responses and traffic violation management By helping traffic managers to make better long-term planning decisions, the Traffic Visualization Dashboard can help to tackle traffic issues, such as traffic congestion and other negative impacts of excessive traffic. As well as helping to inform long-term traffic planning, the Hikvision solution helps teams to identify and respond to traffic incidents, and violations in near real-time. This helps to keep key corridors on the road network as clear as possible, helping to speed up journey times for road users. Actionable traffic insights ‘at a glance’ The solution provides 2D and 3D map options that model junctions and traffic corridors accurately The solution provides 2D and 3D map options that model junctions and traffic corridors accurately, and to scale. The map-based interface provides a fully immersive experience that allows traffic and incident managers to quickly spot congestion and to detect traffic incidents, and violations in different areas of the city, all in a matter of seconds. With no need to generate reports to understand real-time traffic conditions and ongoing traffic trends, managers can also make faster, better informed decisions, in order to help optimise traffic flow and public safety. Key features of the Hikvision Traffic Visualization Dashboard: Immersive 2D or 3D map-based interface for traffic insights ‘at a glance’ Simple configuration for specific use cases, including congestion management and traffic violation management
The Croatian defender and UEFA Cup winner Darijo Srna will become the brand ambassador of the Ukrainian security systems manufacturer Ajax Systems in Croatia. The slogan of the campaign is “Ajax. My defence tactics.” “Darijo is a world football legend and a real superstar in Croatia. His brand ambassador status will bring further momentum to the Ajax promotion in the Adriatic market,” Ajax Systems CMO, Valentine Hrytsenko. “I have a smart Ajax security system at home, and now even when I am at training camps or on long trips I can rest assured that my home and my loved ones are well-protected. It’s convenient that the system is controlled with an app on my smartphone — this allows me to manage the household security from anywhere in the world,” Darijo Srna. Darijo’s recommendations As part of the campaign launch, a series of digital activities was scheduled as well as exclusive merchandise and materials were prepared for Ajax B2B partners. The main campaign goal is to enhance and consolidate the company’s standing in the Adriatic region. In addition to being an Ajax user himself, in the past Darijo also recommended the system to his former teammate Paulo Fonseca, the ex-coach of Shakhtar, whose home was robbed. After the incident, an Ajax system was sent to Fonseca to Italy as a gift: it was installed in his home for protection against any possible accidents. The Adriatic market Ajax Systems entered the Adriatic market in 2017. One of the most important achievements of the company on the market is its partnership with Alarm Automatika, the largest distributor of security equipment in the region. The global goal of Ajax is to become the #1 brand in its segment. To make professional security comfortable for users and give installers the opportunity to work with user-friendly, innovative equipment that has no compromises on reliability.
In support of Carrier’s Healthy Buildings program and the safe return to work, LenelS2 introduced a COVID-19 Contact Notification subscription-based service for businesses and other organisations using LenelS2’s OnGuard® or NetBox™ access control security systems along with LenelS2’s BlueDiamond™ mobile credential app. LenelS2, a front-runner in advanced security systems and services, is a part of Carrier Global Corporation, the foremost global provider of healthy, safe and sustainable building and cold chain solutions. This new service complements LenelS2’s touchless building access solutions by providing BlueDiamond-credentialed users with the ability to assess their health symptoms, receive real-time social distancing reminders and anonymised notifications if they have recently come into contact with a user that self-assessed as being positive for COVID-19. The combination of BlueDiamond mobile-enabled readers with the BlueDiamond mobile app credentials and the new Contact Notification service, forms an advanced solution being offered through Carrier's Healthy Buildings Program. Safe return to work “The global pandemic has changed expectations for health and safety in the workplace,” said Jeff Stanek, President, LenelS2. “The BlueDiamond Contact Notification service empowers our customers with the tools they need to help address today’s challenges and provide greater confidence in a safe return to work.” Contact Notification service Includes daily self-assessments for employees to report any symptoms or self-report their positive COVID-19 status The Contact Notification service in the BlueDiamond mobile app identifies and communicates anonymised real-time COVID-19 risks and provides employees with a safer building experience while empowering building administrators with the data they need to monitor and manage potential exposure risks in the workplace. Contact Notification includes daily self-assessments for employees to report any symptoms or self-report their positive COVID-19 status. Based on the results from the daily assessment, employee mobile credentials can be automatically restricted for a configurable quarantine period from within the app as pre-defined by the administrator or company policy. Features The BlueDiamond Contact Notification service utilises mobile-to-mobile Bluetooth® technology to help enforce social distancing in the workplace and provides real-time app notifications to employees who violate distancing guidelines. Leveraging an administration console, building administrators can configure Contact Notification parameters and proactively monitor trends in the workplace. Beyond initial provisioning requirements, Contact Notification is hardware independent and can be quickly implemented by LenelS2 customers. Additional benefits The latest BlueDiamond app version also includes a variety of non-subscription-based updates to improve access control and user experience. Two-factor authentication leveraging Touch ID, Face ID or a smartphone passcode can now be used as a method for validating a BlueDiamond mobile credential user. In-app tutorials provide users with an easy way to use other currently available app features.
Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd., a pioneering provider of cyber security solutions globally, has published its latest Global Threat Index for March 2021. Researchers report that the IcedID banking trojan has entered the Index for the first time, taking second place, while the established Dridex trojan was the most prevalent malware during March, up from seventh in February. First seen in 2017, IcedID has been spreading rapidly in March via several spam campaigns, affecting 11% of organisations globally. One widespread campaign used a COVID-19 theme to entice new victims into opening malicious email attachments; the majority of these attachments are Microsoft Word documents with a malicious macro used to insert an installer for IcedID. Once installed, the trojan then attempts to steal account details, payment credentials, and other sensitive information from users’ PCs. IcedID also uses other malware to proliferate and has been used as the initial infection stage in ransomware operations. Evasive trojan “IcedID has been around for a few years now but has recently been used widely, showing that cyber-criminals are continuing to adapt their techniques to exploit organisations, using the pandemic as a guise,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. “IcedID is a particularly evasive trojan that uses a range of techniques to steal financial data, so organisations must ensure they have robust security systems in place to prevent their networks being compromised and minimise risks. Comprehensive training for all employees is crucial, so they are equipped with the skills needed to identify the types of malicious emails that spread IcedID and other malware.” CPR also warns that “HTTP Headers Remote Code Execution (CVE-2020-13756)” is the most common exploited vulnerability, impacting 45% of organisations globally, followed by “MVPower DVR Remote Code Execution” which impact 44% of organisations worldwide. “Dasan GPON Router Authentication Bypass (CVE-2018-10561)” is on third place in the top exploited vulnerabilities list, with a global impact of 44%. Top malware families *The arrows relate to the change in rank compared to the previous month. Recently, Dridex is the most popular malware with a global impact of 16% of organisations, followed by IcedID and Lokibot affecting 11% and 9% of organisations worldwide respectively. ↑ Dridex - Dridex is a Trojan that targets the Windows platform and is reportedly downloaded via a spam email attachment. Dridex contacts a remote server and sends information about the infected system. It can also download and execute arbitrary modules received from the remote server. ↑ IcedID - IcedID is a banking Trojan spread by email spam campaigns and uses evasive techniques such as process injection and steganography to steal user financial data. ↑ Lokibot - Lokibot is an Info Stealer distributed mainly by phishing emails and is used to steal various data such as email credentials, as well as passwords to CryptoCoin wallets and FTP servers. Top exploited vulnerabilities Currently, “HTTP Headers Remote Code Execution (CVE-2020-13756)” is the most commonly exploited vulnerability, impacting 45% of organisations globally, followed by “MVPower DVR Remote Code Execution” which impacts 44% of organisations worldwide. “Dasan GPON Router Authentication Bypass (CVE-2018-10561)” is in third place with a global impact of 44%. ↑ HTTP Headers Remote Code Execution (CVE-2020-13756) - HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine. ↑ MVPower DVR Remote Code Execution - remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request. ↑ Dasan GPON Router Authentication Bypass (CVE-2018-10561) - authentication bypass vulnerability exists in Dasan GPON routers. Successful exploitation of this vulnerability would allow remote attackers to obtain sensitive information and gain unauthorised access into the affected system. Top mobile malwares Hiddad took first place in the most prevalent mobile malware index, followed by xHelper and FurBall. Hiddad - Hiddad is an Android malware, which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS. xHelper - A malicious application seen in the wild since March 2019, used for downloading other malicious apps and display ads. The application is capable of hiding itself from the user, and can even reinstall itself after being uninstalled. FurBall - FurBall is an Android MRAT (Mobile Remote Access Trojan) which is deployed by APT-C-50, an Iranian APT group connected to the Iranian government. This malware was used in multiple campaigns dating back to 2017 and is still active today. Among FurBall’s capabilities are; stealing SMS messages and mobile call logs, recording calls and surroundings, collecting media files, tracking locations, and more. Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 3 billion websites and 600 million files daily and identifies more than 250 million malware activities every day.
The Security Industry Association (SIA) has announced the agenda and speaker lineup for Part 1 of the 2021 SIA GovSummit, its annual public policy and government security technology conference. SIA GovSummit 2021 will be held as a three-part virtual conference, with sessions held on April 28, June 9 and Sept 21, 2021. SIA GovSummit 2021 Each year, SIA GovSummit brings together government security leaders with private industry technologists for top-quality information sharing and education on security topics affecting federal, state and local agencies. The 2021 virtual conference will examine emerging policy trends, the government’s technology needs and changes in the risk environment that shape the development of products and advanced systems integration. Government use of security technology SIA GovSummit delivers high-quality insights and information on how government uses security technology" “SIA GovSummit delivers high-quality insights and information on how government uses security technology to meet evolving challenges and succeed across a wide spectrum of missions,” said Jake Parker, Senior Director of Government Relations at SIA. Jake adds, “With this new three-part virtual format in 2021, we look forward to offering the program to a wide spectrum of interested attendees and delving even deeper into the most important issues for federal, state and local government security practitioners.” Full-day virtual conference program Part 1 of the 2021 virtual conference will be held as a full-day program on Wednesday, April 28, kicking off at 10 a.m. EDT, with a keynote presentation from U.S. Rep. John Katko (R-N.Y.), ranking member of the House Committee on Homeland Security. Katko will share insights on security challenges and how we can address them as a nation. Additional session topics will include: The American Rescue Plan’s impact on deployment of safety and security technologies What the DOD Cyber security Maturity Model Certification means for contractors and security suppliers The role of the SAFETY Act under the Biden administration Protecting public buildings against violent civil unrest Lessons learned from the Christmas Day bombing in Nashville, Tennessee Facility safety, COVID-19 and identity and facility management technologies Audio security technology’s use in government facility applications Speakers for the virtual event include: William Braniff, Director, National Consortium for the Study of Terrorism and Responses to Terrorism Daryle Hernandez, Chief, Interagency Security Committee, Cyber security and Infrastructure Security Agency, U.S. Department of Homeland Security David Kelly, Deputy Director, Security Management Group, Centers for Medicare and Medicaid Anna Mansueti, Director of Diversity and Gender Equity, Platinum East Gabriel Russell, Regional Director, Federal Protective Service Free event for all government staff This event is free for all government employees, including U.S. and international federal, state, county and municipal-level staff, plus all military, law enforcement and public safety personnel. SIA GovSummit is considered a ‘widely attended gathering’ and complies with all relevant event guidelines. Each industry attendee can choose to register for the April 28 session only or purchase an All Access Pass to unlock all three GovSummit events for a discounted rate.
The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organisation’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organisations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practised in most modern office spaces, with it recognised as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organisation leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behaviour represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behaviour represent a true security risk to organisations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.
While COVID-19 caused widespread disruption and many challenges for businesses, its sudden arrival prompted some very quick decision-making around how to maintain operations. For some businesses, cloud-based video conferencing solutions provided a welcome alternative to meeting face-to-face. A year on and it seems that this sudden and mass adoption of cloud has accelerated a digital transformation process in other departments. Physical security too is increasingly moving to the cloud in the form of hosted solutions, where Video Surveillance as-a-Service (VSaaS) is providing comprehensive protection across a range of industries and sectors. To better understand the impact of this migration to the cloud, hosted security provider Morphean commissioned a survey of 1000 senior decision-makers across the UK, Germany and Sweden, working in HR, facilities management, IT and security. As well as ascertaining purchasing intent around hosted security applications among a broad spectrum of buyers, the results would provide key indications around the abilities of cloud to benefit organisations in regard to both security and business operations. An increasing urgency around VSaaS and ACaaS adoption Low costs, flexible scalability, demand for real-time and remote access to security data are key to the adoption of hosted solutions Survey results revealed that 51% of senior decision-makers are currently using cloud-based video surveillance (VSaaS) and/or a door entry/access control system (ACaaS). This represents a 3% increase in comparison to responses from a 2019 survey (48%), and broadly reflects projected growth in the physical security market from USD $93.5b in 2020 to USD $120.3b by 2025 at a CAGR of 5.2%. Low costs, flexible scalability and demand for real-time and remote access to security data are key to the accelerated adoption of hosted solutions in the current climate. A significant 70% of respondents agreed that the pandemic had actually increased the necessity/urgency for businesses to adopt VSaaS and ACaaS, with IT Services revealed as the sector with most respondents strongly or somewhat agreeing (82%), followed by Security (73%). Results highlight a hosted physical security market which is in a strong position for 2021. Physical security utilising the cloud can unlock many security and business benefits for the modern organisation as it faces many new challenges. Business optimisation and operational insights The benefits of VSaaS and ACaaS prompted Morphean to examine what areas of the business were optimised, or in need of improvement. 43% of those surveyed stated that data/information security was the most optimised aspect of their company. The total number of respondents who indicated that physical security was already optimised had risen by 4% since our 2019 survey, to 27%. It was those working in IT who saw the greatest disparity in security-related optimisation, with far fewer recognising that physical security was optimised (28%) compared with data/IT security (55%). This may point to an opportunity to increase physical security optimisation to be on par with data/IT security. 95% of those surveyed agreed that if an existing security system could deliver insights beyond security to assist decision making it would influence adoption. It is clear that the growth in connected digital devices through the IoT is resulting in a growing appetite for physical security, such as network cameras, to enhance existing IT systems and assist business intelligence gathering. As an example, consider an office environment where access control and video data can be used to determine an employee’s movements in the event of a positive COVID-19 result and alert others who may have made physical contact with that individual. A future proof business model Decision-makers surveyed that use of cloud technologies to increase in the future as a result of COVID-19 78% of the 1000 senior decision-makers surveyed anticipate their organisations’ use of cloud technologies to increase in the future as a result of COVID-19. Rather than being tied to fixed IT infrastructure on-premises, businesses are able to customise and scale quickly to meet ongoing challenges without the need for large upfront capital investment. The convenience of as-a-service can be paid for out of operational expenditure as a monthly cost. This is the proven business model of the cloud. Yet the security industry has been slow to adopt it. One key challenge is the way in which the prevalent business models in the sector operate. Transitioning to sales cycles based on monthly licences rather than up-front purchases won’t be easy, but the security channel must learn how if it is to remain competitive and drive new business opportunities. This recurring revenue model will be interesting for the physical security industry who will have witnessed uncertainty and, in some cases, a downturn in revenues as decisions around capital expenditure were put on hold during the crisis. Full support and extensive functionality From a customer perspective, 28% of respondents highlighted cost benefits as a key factor in the move towards VSaaS/ACaaS and 19% indicated that they would expect to see all-inclusive updates/upgrades and support. VSaaS and ACaaS are supported by the latest software updates and firmware upgrades, so are always up to date. Additionally, functionality such as remote management allows operations to be monitored offsite via mobile device. Access from any location (32%), remote maintenance (31%), and the ability to monitor empty sites (29%) were all identified as key benefits of introducing VSaaS and ACaaS, alongside better security (40%) and better functionality (33%). The revelation that such technology is employed by over half of organisations across a wide range of industries is a comforting validation of its benefits, and evidence that hosted physical security is in great demand. 30% of those surveyed indicated that they did not currently use such solutions, but were considering their implementation. Cloud’s resilience and ability to connect the world during the COVID-19 pandemic has clearly proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. VSaaS and ACaaS provide flexibility in a security and business solution that meets the demands of a rapidly evolving industry.
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data centre world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
When 150,000 video surveillance cameras get hacked, it’s big news. Even if the main reason for the hack was to make a point. Even if the major consequence is bad publicity for a video company (and, by extension, the entire video surveillance industry). The target of the hack was Silicon Valley startup Verkada, which has collected a massive trove of security-camera data from its 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. Previously, Verkada has been known for an aggressive sales approach and its intent to disrupt the traditional video market. The data breach was accomplished by an international hacker collective and was first reported by Bloomberg. The reported reasons for the hack were “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism – and it’s also just too much fun not to do it,” according to Bloomberg. Tesla amongst those impacted The “fun” included access to a video showing the inside of a Florida hospital, where eight hospital staffers tackled a man and pinned him to the bed. Inside a Massachusetts police station, officers are seen questioning a man in handcuffsA view inside a Tesla warehouse in Shanghai, China, showed workers on an assembly line. Inside a Massachusetts police station, officers are seen questioning a man in handcuffs. There are even views from Verkada security cameras inside Sandy Hook Elementary School in Connecticut, where a gunman killed more than 20 people in 2012. In a “security update” statement, Verkada reports: “Our internal security experts are actively investigating the matter. Out of an abundance of caution, we have implemented additional security measures to restrict account access and further protect our customers.” Hacking was possible due to built-in feature The hacker group was able to obtain “root” access on the cameras, meaning they could use the cameras to execute their own code, reports Bloomberg. Obtaining this degree of access to the camera did not require any additional hackingUsing that access, they could pivot and obtain access to the broader corporate network of Verkada’s customers or hijack the cameras and use them as a platform to launch future hacks, the hackers told Bloomberg. Obtaining this degree of access to the camera did not require any additional hacking, as it was a built-in feature. Elisa Costante, VP of research for cybersecurity firm Forescout, calls the Verkada security camera hack "shocking." "Connected cameras are supposed to provide an additional layer of security to organisations that install them,” she says. “Yet, as the Verkada security camera breach has shown, the exact opposite is often true. [It is worrisome that] the attack wasn't even very sophisticated and didn't involve exploiting a known or unknown vulnerability. The bad actors simply used valid credentials to access the data stored on a cloud server.” Super Admin account had access to all cameras Hackers gained access to Verkada through a “Super Admin” account, allowing them to peer into the cameras of all of its customers. They found a username and password for an administrator account publicly exposed on the internet, according to Bloomberg. The hackers lost access to the video feeds and archives after Bloomberg contacted Verkada.Hackers lost access to the video feeds and archives after Bloomberg contacted Verkada The results could have been worse, says Costante. "In this case, the bad actors have seemingly only resorted to viewing the footage these cameras have captured. But they are likely able to cause a lot more damage if they choose to do so, as our own research team has discovered. We were able to intercept, record and replace real-time footage from smart cameras by exploiting unencrypted video streaming protocols and performing a man-in-the-middle attack. This effectively gives criminals a virtual invisibility cloak to physically access premises and wreak havoc in the real world.” Impact on broader video surveillance industry The impact of a well-publicised cyber-attack on the broader video surveillance industry is also a concern. “As an industry, and as manufacturers in physical security, we cannot take these hacks lightly,” says Christian Morin, CSO & Vice-President of Integrations & Cloud Services, Genetec. “The potential broad-reaching impact of these hacks on physical security systems, including providing a beachhead to facilitate lateral movement onto networks, resulting in data and privacy breaches or access to critical assets and infrastructure, cannot be overstated. It is our responsibility and duty to users of our technology to prioritise data privacy and cybersecurity in the development, distribution, and deployment of video surveillance systems.” Widespread government and healthcare use The Verkada cameras are in widespread use within government and healthcare, which are by far the company’s most dominant verticals. Lesser verticals for them are manufacturing, financial and retail.The Verkada website pledges to take privacy seriously Verkada’s line of hybrid cloud security cameras combines edge-based processing with the capabilities of cloud computing. Cameras analyse events in real-time, while simultaneously leveraging computer vision technology for insights that bring speed and efficiency to incidents and investigations. Command, Verakda’s centralised web-based platform, provides users with access to footage they need. Motion detection, people analytics, and vehicle analytics enable searches across an organisation to find relevant footage. The Verkada website pledges to take privacy seriously: “We are passionate about developing products that enhance the security and privacy of organisations and individuals. We believe that well-built, user-friendly systems make it easier to manage and secure physical environments in ways that respect the privacy of individuals while simultaneously keeping them safe.”
A result of the COVID-19 pandemic has been fewer crowds gathering for outdoor events. However, sooner or later, crowded events will surge, as will the danger of injury or death from vehicle attacks. The threats of vehicular violence are still present even though collisions have become less frequent and traffic, in general, is at a significant low. Preparing for such instances remains a high priority, and institutions are seeking to take a preemptive stance to prevent major incidents before they happen. Vehicle security barriers Even amid the pandemic, manufacturers of vehicle barriers have not seen a major impact on their sales. “Half of the battle against aggressors perpetrating a vehicle attack is pre-planning,” says Greg Hamm, Vice President of Sales and Marketing, Delta Scientific. He says Delta is fortunate to have long-standing trust relationships with many agencies, built over the last 46 years. “We're happy to see that demand for vehicle security barriers has not changed much – customers are preparing for the future when crowds will be present again, and probably larger than ever,” adds Stuart Glen, National Sales Manager of Jackson’s Fencing. “Lots of councils are using the downtime to install or upgrade security around town and city centers, which is promising.” Physical structures such as bollards, barriers, and barricades can stop a vehicle from entering a high-foot-traffic area. Temporary venues can deploy portable barriers. "We're happy to see that demand for vehicle security barriers has not changed much" Fully automated system The first consideration is the level of security required for a particular location. A parking garage for a foreign embassy or federal courthouse will require far more serious security measures than a parking lot for a mall. Other primary factors to consider include the frequency of vehicles moving in and out and whether there will be vehicle inspections performed or a fully automated system at the entrance. “A key challenge when protecting people from vehicle attacks is trying to ensure that the public are kept safe, but do not feel worried or overly aware of any risks,” says Glen. “People should feel protected and be able to move freely. Discreet measures such as bollards are ideal as they don't restrict pedestrian flow but are very effective in the case of a hostile vehicle attack.” Sparking future assaults The use of vehicles as tools of destruction has become one of the top concerns for security specialists Events and sports venues need increased protection as they are likely targets due to the high numbers of crowds. Places of worship are sadly another target that should be given extra protection, says Glen. The use of vehicles as tools of destruction has become one of the top concerns for security specialists. This tactic has grown popular regardless of ideology and is especially alarming when coupled with cars’ accessibility. In many places, individuals only need a valid driver’s license to rent a truck. News of a particular attack encourages or inspires other individuals to perpetuate the same form of violence. Unfortunately, this creates a feedback loop as more reports emerge following these tragedies, potentially sparking future assaults. Straightforward security solutions In the case of vehicle-ramming attacks, there are straightforward security solutions to protect patrons. Delta Scientific offers over 100 product designs, emphasising barriers that stop and destroy attacking vehicles. Delta’s barriers carry crash ratings from PU50 up to K54 and include sophisticated control systems that provide custom optimisation. Control systems feature the latest, most advanced protection technology. Early warning systems enable active security measures built into Delta products plus alert features to on-site security personnel. Delta Scientific’s High Security Protection and Barricade Systems are used internationally by governments, armed forces, federal agencies, private corporations, and other industries. Jackson’s Fencing’s range of solutions includes fencing, bollards, road blockers, and gates. They have been tested to PAS 68 standards and can stop a 7.5-ton vehicle travelling at 50mph (80km/h). The products come with a 25-year guarantee. Attractive timber appearance They offer crash ratings up to M50 and include both automated barriers and passive bollards In addition, their unique Linebacker PNR system is a cable crash fence, encased within a timber post and rail fence, offering a completely discreet yet highly effective vehicle security barrier with an attractive timber appearance. Facilities that require day-to-day employee and civilian access need permanent solutions installed to thwart daily terror threats, says Hamm of Delta Scientific. Solutions include wedge barriers, bollards, beams, and sliding gates with high duty cycles and excellent reliability coupled with appropriate crash ratings. Local fairs and festivals, parades, conventions, sports, and vaccination sites utilise portable barriers that can be towed into place and set up within 30 minutes. They offer crash ratings up to M50 and include both automated barriers and passive bollards. They can be plugged into a local 120v source and provide a portable solution that allows vehicle throughput by pushing a button. Vehicle-borne attacks Both temporary and permanent barriers are extremely effective, says Glen of Jackson’s Fencing. Temporary barriers can be deployed rapidly and removed when a threat has passed (for example, an event such as the London marathon, where large crowds gather), while permanent measures are used for sites that will always be a high-risk target. Glen says temporary barriers also generally have a more dominating appearance and wider footprint. Permanent measures are used for sites that will always be a high-risk target. Temporary barriers can be used immediately after a risk assessment highlights vehicle-borne attacks as a threat to a site before permanent measures are installed. They can help to identify the ideal positioning of permanent barriers – often it's a case of trial and error before finding a solution that works well for one’s particular needs. The United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. Access control products This certification minimises insurance risks for organisations that deploy authorised Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorised to carry the SAFETY Act Designated mark. By minimising insurance risks to deploying authorised Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security. A common planning deficiency occurs when designers choose non-certified barriers or barricades A common planning deficiency occurs when designers choose non-certified barriers or barricades. Certified equipment has been tested and proven to work under extreme conditions, thus giving planners the confidence they rely on. No area is more critical to the vehicle barrier selection process than testing. Without adequate testing, there is no assurance that the barrier will resist the threat. Independent testing company Testing is normally done by an independent testing company or government agency, such as the Department of State (DOS) and ASTM. Comprehensive reports of test results are issued and are available from the testing agency or manufacturer. A common misconception among the general public is that the barriers are ‘ugly,’ but this often comes from the appearance of temporary barriers that are installed for testing purposes before deciding on permanent measures. Temporary barriers often have a large footprint because they have no foundations and can be quite obtrusive. There are actually many discreet and attractive permanent solutions such as road blockers and stainless steel rising bollards, which allow flexible control over entry and security, and can be rapidly activated.
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones. Beyond video analytics "Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists. AI made its initial splash in the physical security market by transforming the effectiveness of video analytics AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient. Biometrics with access control Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit. AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future. Smarter perimeter protection Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognise a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customisable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Meeting urban needs Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analysing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyse it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. Optimise security solutions As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimise security solutions. In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioural analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. AI surveillance software In many ways, it’s the equivalent of a neighbourhood watch programme made far more intelligent through the use of AI This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighbourhood watch programme made far more intelligent through the use of AI. Fighting illicit trade Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioural anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labour-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.
Midway Car Rental, the privately-owned car rental company in Southern California, caters to both an exclusive and expansive clientele, including VIPs, high-end hotels, and replacement vendors like dealerships and body shops. The company currently owns and operates 15 locations and has aggressive plans for expansion, with 6 or 7 more sites planned for this calendar year. Challenges faced With a portfolio that includes Ferraris, Lamborghinis, and Jaguars, Midway can have up to a million dollars of assets parked on any of its lots. Some of the company’s newest locations lack secure perimeter fencing. Sean Perez, Midway’s General Manager, says, “We needed to protect our vehicles, but even more importantly, we had to ensure the safety of our employees and clients.” The problem became acute when Midway opened a new location to provide loaner and replacement vehicles for an adjacent dealership partner. Prior to Midway’s arrival, the lot had been populated by vagrants and the homeless who would sleep in and around the cars parked there. “When we took over the property, we needed to provide a safe and secure environment where we could conduct business,” Perez explains. “There were issues with vandalism and graffiti. Some of the displaced homeless would get aggressive. We needed a proactive solution – a way to stop these incidents from happening rather than trying to prosecute the individuals after the damage was done.” Expansion opportunities Traditionally, Midway’s properties have been less exposed, with electronically secure gates or fences that restrict access. However, as Midway’s expansion plans include growing alignment with business partners like dealerships, many future sites will likely face similar security challenges. To address this situation, the company sought: A scalable system that could grow incrementally with Midway’s expansion Flexible technology that could be moved to new sites with minimal effort A technology partner capable of servicing and supporting a long-term solution The ability to outsource monitoring services in the near future “I tend to be conservative,” says Perez. “I wanted to start off slow and then, when comfortable that we’d found both the right partner and technology, have the ability to really scale up.” Solution recommended Midway Car Rental deployed ROSA units, Responsive Observation Security Agents, manufactured by Robotic Assistance Devices (RAD). “I have to tell you, I was a bit skeptical at first about these ROSA units,” says Perez. “You can stick an armed guard out there, but the idea that a technology device could provide both consistent monitoring and serve as a deterrent system seemed like a stretch. However, our two ROSAs are really helping us protect our assets. In very short order, our problem decreased and our situation has improved dramatically.” AI-based ROSA solution ROSA is a compact, self-contained, security and communication solution that can be deployed in about 15 minutes ROSA is a compact, self-contained, security and communication solution that can be deployed in about 15 minutes. Its AI-driven security systems include human and vehicle detection, license plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and response library. Two-way communication is optimised for cellular, including live video from ROSA’s dual high-resolution, full-colour, always-on cameras. “The folks from RAD sent out an engineer to help us determine where to mount the ROSA units by identifying areas on our site that are most exposed to potential vandalism or other threats,” says Perez. The devices are highly visible, featuring scrolling LED text, colorful neon ribbons, and two video cameras. Automated detection and response ROSA may be programmed to display welcome messages or marketing messages during business hours, along with a reminder to visitors that the property is under surveillance. When it detects the motion of humans or vehicles on the lot, it sends an alert to Perez and his team along with an associated video clip, keeping them well informed of activity happening in real-time. During off-hours, ROSA's automated response kicks in. Its friendly daytime messaging is replaced with a more stern warning to trespassers. Upon detecting a human or moving vehicle, ROSA responds with flashing red lights and a visual warning to vacate the property immediately. If ROSA continues to detect a presence, more lights, sirens, and a pre-recorded audio message add a sense of urgency. Monitoring personnel, who have been alerted of the event and have access to live video, can also issue pointed commands over ROSA's loudspeaker. Ultimately, if the police must be summoned, the encounter has been thoroughly documented and recorded. Effective security Perez describes ROSA's effectiveness as a deterrent. "I've watched when people encounter the system. Initially, their reaction is one of shock and awe. When the unit goes off with its lights flashing and they hear those verbal commands, they’re terrified. They look like they've seen a ghost. Literally, in less than ten days after we put those things out, the word had spread to stay away. The vagrants were gone. It was like night and day." Independent monitoring Currently, Midway's management has chosen to monitor the system themselves. Perez explains, "Initially, I was getting alerts somewhat often, but they quickly tapered off. At this point, they're infrequent. With just these two units in place, plus two more scheduled to go up in Newport Beach in the coming weeks, we can handle the monitoring independently.” “Within the next year or two, as we open new locations and add more units, we'll take advantage of RAD's monitoring services. We had that in mind when we went this route – that with our continued growth, we would eventually leverage that option." Customer-friendly solution The system is very intuitive and customer-friendly "The system is very intuitive and customer-friendly," adds Perez. "I've used other systems that are really cumbersome. The RAD SOC dashboard is nothing like that. The ease-of-use is amazing." So is the deployment process. As ROSA requires nothing more than the power to operate, it is truly plugged and play. "We had them installed and received training all within a few hours on one day," says Perez. "We haven't run into any issues, but if we do, the relationship we've built with the RAD team is so good that I can call on them at any time for assistance. They are very, very customer-centric." Evaluating ROI Midway Car Rental quantifies the value ROSA delivers in several ways, including monetarily, a reduction in crime, and improved peace of mind. Perez elaborates, "Thanks to the ROSA units, we've addressed all sorts of issues. Damage to vehicles, graffiti on the exterior of the building, the homeless tampering with our electrical outlets to charge their phones, trash left around the property – that’s all gone since we put the ROSAs in. There are also important intangibles that you really can't put a price tag on, like an improvement in employee well-being and productivity because our staff now feels safe at work." Easy installation RAD's cloud-based software simplifies the management of multi-site systems The system's scalability and flexibility ensure that Midway's investment will continue to pay dividends. Perez says, "We're growing so fast, we're trying to put flagpoles in the markets where we identify a need, but that doesn't mean we're locking ourselves into long-term leases." "Down the road, if we decide to move locations, our ROSAs move with us. We heavily factored their ability to easily install, uninstall, and re-install when deciding to go with this technology." Consistent with Midway's plans, RAD's cloud-based software simplifies the management of multi-site systems. As new Midway locations open and ROSA units are installed, management and monitoring of all devices can occur through one login to the centralized RAD SOC dashboard. Alert notifications include the location of the activated unit. RAD’s additional services In addition to ROSA, RAD offers a suite of other products that share the same platform for delivering automated remote services, including some that are more appropriate for indoor use. Should Midway encounter new security challenges in the future, they can expand their system with other RAD devices. "For now, ROSA is what fits our needs best, but I've seen some of those other units, and they look pretty cool," says Perez. ROSA subscription Midway uses the ROSA units through RAD's subscription model. The company pays a low monthly fee that covers unlimited use of the devices, software and software updates, maintenance, and technical support. Their out-of-pocket equals a small fraction of what hiring a security guard would cost. When asked whether Perez recommends the system to others, his answer is concise. "It's a no-brainer!" he laughs. "Knock-on-wood, we've been near without incident for the four months since the ROSAs went up. I attribute that to the units' effectiveness."
Midway Car Rental, the privately-owned car rental company in Southern California, caters to both an exclusive and expansive clientele, including VIPs, high-end hotels, and replacement vendors like dealerships and body shops. The company currently owns and operates 15 locations and has aggressive plans for expansion, with 6 or 7 more sites planned for this calendar year. The challenge With a portfolio that includes Ferraris, Lamborghinis, and Jaguars, Midway can have up to a million dollars of assets parked on any of its lots. Some of the company’s newest locations lack secure perimeter fencing. Sean Perez, Midway’s General Manager, says, “We needed to protect our vehicles, but even more importantly, we had to ensure the safety of our employees and clients.” The problem became acute when Midway opened a new location to provide loaner and replacement vehicles for an adjacent dealership partner. Prior to Midway’s arrival, the lot had been populated by vagrants and the homeless who would sleep in and around the cars parked there. “When we took over the property, we needed to provide a safe and secure environment where we could conduct business,” Perez explains. “There were issues with vandalism and graffiti. Some of the displaced homeless would get aggressive. We needed a proactive solution – a way to stop these incidents from happening rather than trying to prosecute the individuals after the damage was done.” Traditionally, Midway’s properties have been less exposed, with electronically secure gates or fences that restrict access. However, as Midway’s expansion plans include growing alignment with business partners like dealerships, many future sites will likely face similar security challenges. To address this situation, the company sought: A scalable system that could grow incrementally with Midway’s expansion Flexible technology that could be moved to new sites with minimal effort A technology partner capable of servicing and supporting a long-term solution The ability to outsource monitoring services in the near future The solution “I tend to be conservative,” says Perez. “I wanted to start off slow and then, when comfortable that we’d found both the right partner and technology, have the ability to really scale up.” Midway Car Rental deployed ROSA units, ¬Responsive Observation Security Agents, manufactured by Robotic Assistance Devices (RAD). “I have to tell you, I was a bit skeptical at first about these ROSA units,” says Perez. “You can stick an armed guard out there, but the idea that a technology device could provide both consistent monitoring and serve as a deterrent system seemed like a stretch. However, our two ROSAs are really helping us protect our assets. In very short order, our problem decreased and our situation has improved dramatically.” About ROSA ROSA is a compact, self-contained, security and communication solution that can be deployed in about 15 minutes ROSA is a compact, self-contained, security and communication solution that can be deployed in about 15 minutes. Its AI-driven security systems include human and vehicle detection, license plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and response library. Two-way communication is optimised for cellular, including live video from ROSA’s dual high-resolution, full-color, always-on cameras. “The folks from RAD sent out an engineer to help us determine where to mount the ROSA units by identifying areas on our site that are most exposed to potential vandalism or other threats,” says Perez. The devices are highly visible, featuring scrolling LED text, colorful neon ribbons, and two video cameras. ROSA may be programmed to display welcome messages or marketing messages during business hours, along with a reminder to visitors that the property is under surveillance. When it detects the motion of humans or vehicles on the lot, it sends an alert to Perez and his team along with an associated video clip, keeping them well informed of activity happening in real-time. Functions During off-hours, ROSA's automated response kicks in. Its friendly daytime messaging is replaced with a more stern warning to trespassers. Upon detecting a human or moving vehicle, ROSA responds with flashing red lights and a visual warning to vacate the property immediately. If ROSA continues to detect a presence, more lights, sirens, and a pre-recorded audio message add a sense of urgency. Monitoring personnel, who have been alerted of the event and have access to live video, can also issue pointed commands over ROSA's loudspeaker. Ultimately, if the police must be summoned, the encounter has been thoroughly documented and recorded. Perez describes ROSA's effectiveness as a deterrent. "I've watched when people encounter the system. Initially, their reaction is one of shock and awe. When the unit goes off with its lights flashing and they hear those verbal commands, they’re terrified. They look like they've seen a ghost. Literally, in less than ten days after we put those things out, the word had spread to stay away. The vagrants were gone. It was like night and day." Intuitive and customer-friendly Currently, Midway's management has chosen to monitor the system themselves. Perez explains, "Initially, I was getting alerts somewhat often, but they quickly tapered off. At this point, they're infrequent. With just these two units in place, plus two more scheduled to go up in Newport Beach in the coming weeks, we can handle the monitoring independently. Within the next year or two, as we open new locations and add more units, we'll take advantage of RAD's monitoring services. We had that in mind when we went this route – that with our continued growth, we would eventually leverage that option." "The system is very intuitive and customer-friendly," adds Perez. "I've used other systems that are really cumbersome. The RAD SOC dashboard is nothing like that. The ease-of-use is amazing." So is the deployment process. As ROSA requires nothing more than power to operate, it is truly plug and play. "We had them installed and received training all within a few hours on one day," says Perez. "We haven't run into any issues, but if we do, the relationship we've built with the RAD team is so good that I can call on them at any time for assistance. They are very, very customer-centric." Evaluating ROI Midway Car Rental quantifies the value ROSA delivers in several ways, including monetarily, a reduction in crime, and improved peace of mind. Perez elaborates, "Thanks to the ROSA units, we've addressed all sorts of issues. Damage to vehicles, graffiti on the exterior of the building, the homeless tampering with our electrical outlets to charge their phones, trash left around the property – that’s all gone since we put the ROSAs in. There are also important intangibles that you really can't put a price tag on, like an improvement in employee well-being and productivity because our staff now feels safe at work." RAD's cloud-based software simplifies the management of multi-site systems The system's scalability and flexibility ensure that Midway's investment will continue to pay dividends. Perez says, "We're growing so fast, we're trying to put flagpoles in the markets where we identify a need, but that doesn't mean we're locking ourselves into long-term leases. Down the road, if we decide to move locations, our ROSAs move with us. We heavily factored their ability to easily install, uninstall, and re-install when deciding to go with this technology." Consistent with Midway's plans, RAD's cloud-based software simplifies the management of multi-site systems. As new Midway locations open and ROSA units are installed, management and monitoring of all devices can occur through one login to the centralised RAD SOC dashboard. Alert notifications include the location of the activated unit. RAD’s suite of products In addition to ROSA, RAD offers a suite of other products that share the same platform for delivering automated remote services, including some that are more appropriate for indoor use. Should Midway encounter new security challenges in the future, they can expand their system with other RAD devices. "For now, ROSA is what fits our needs best, but I've seen some of those other units, and they look pretty cool," says Perez." Midway uses the ROSA units through RAD's subscription model. The company pays a low monthly fee that covers unlimited use of the devices, software and software updates, maintenance, and technical support. Their out-of-pocket equals a small fraction of what hiring a security guard would cost. When asked whether Perez recommends the system to others, his answer is concise. "It's a no-brainer!" he laughs. "Knock-on-wood, we've been nearly without incident for the four months since the ROSAs went up. I attribute that to the units' effectiveness."
Optilan, the security and communications company for the energy, infrastructure, pipeline, and rail sectors, has been appointed by Limak to deliver communications and security systems on the Jubail - Riyadh Water Transmission System in the Kingdom of Saudi Arabia. Optilan has been selected by Limak, the Principal Contractor for the state-run Saline Water Conversion Corporation (SWCC), which owns the water transmission system. Upon completion, it will be one of the largest water transmission systems in the world. Leak detection systems Optilan will support Limak in delivering this project by providing the necessary security and communications systems, which will ensure the safe and efficient operation of the water system. Optilan will define the basic layout, design and construction requirements Optilan will define the basic layout, design and construction requirements and guarantee performance, by providing key leak detection systems so that the two 88” pipes will be able to transport 1.2 million m³ of potable water per day, once implemented. Optilan will leverage its expertise in Critical National Infrastructure and precisely list the required key equipment, including the main data, and the necessary functions for the 412 km long twin pipeline. Leak detection systems Optilan will also provide Limak with a further range of services including: Design, documentation Project management Procurement Building cabinets LAN and WAN networks FAT Leak detection systems Third-party intrusion detection Testing and commissioning at site This is the latest in a series of international project wins for Optilan This is the latest in a series of international project wins for Optilan as it gears up for another year of strategic growth. In the last year, Optilan, which is backed by private equity firm Bluewater, has secured contracts within critical infrastructure, rail, and renewables sectors that span from the UK, Europe, Middle East, and Asia. Critical infrastructure projects Optilan has been appointed by Limak on the basis of its proven expertise and its successful track record of delivering high profile critical infrastructure projects, globally. Bill Bayliss, CEO of Optilan, says: “We’re delighted to announce we’ll be supporting Limak on the state-owned Jubail - Riyadh Water Transmission System. As we ramp up for another year of growth, we’re committed to demonstrating our communications security Critical National Infrastructure expertise globally.” “We’re proud that our strong success record led Limak to appoint Optilan for, what will be, one of the world’s largest water systems. With this project in our portfolio of work, we’re on track to successfully achieve our key strategic aims, and continue on with our global expansion.”
Calipsa, a provider of deep-learning powered video analytics for false alarm reduction, announces that its false alarm filtering platform is being used by Ecuador's Totem. This is the first Latin American customer to take advantage of Calipsa's 93% false alarm reduction rate. Totem specialises in the engineering, construction and integration of electronic security systems for companies and homes through two business units, managed electronic security; and fire detection and extinguishing systems, with over 15 years' experience delivering security projects at both a national and international level. Its surveillance division monitors thousands of cameras across a vast range of industries. Improving operational efficiency Calipsa's technology filters out alarms caused by nuisance factors such as lighting Calipsa's cloud-based false alarm filtering platform is video analytics software with a difference. The software uses deep learning technology to recognise whether an alarm has been caused by human or vehicle movement. Calipsa's technology filters out alarms caused by nuisance factors such as lighting, weather or foliage, enabling customers to focus on genuine threats. Luis Fernando Uribe, chief executive officer, Totem, said he looks for products, such as Calipsa's false alarm reduction platform, that improve operational efficiency, enabling his employees to provide enhanced service offerings to Totem's customers. False alarm reduction "A big goal in our business is reducing the number of false alarms sent to our operators," he said. "The Calipsa technology will do that and help us thrive in the competitive Latin America technological market. We want Totem seen as a regional benchmark for innovation in video monitoring." Brian Baker, chief revenue officer, Calipsa, said working with Totem is a proud moment for Calipsa. "Totem, our first Latin American customer, is an ambitious and innovative company," he said. "We look forward to developing a strong partnership with Totem and helping it achieve its false alarm reduction goals."
DPG Media Group is the largest media company in both Belgium and the Netherlands, and active in television, radio, newspapers, magazines, and online services. It employs around 6,000 people company-wide and has its modern headquarters located in Antwerp, Belgium. DPG Media has been a Nedap customer in the Netherlands for many years. Until recently, this was not the case in Belgium. Here, locations were standardised on an access control system where they were completely dependent on their products and services (so-called vendor lock-in). Access control system When building their new headquarters in Antwerp, they started looking for an access control system that is fully flexible and scalable, in terms of the future. DPG Media needed a system that is well supported in both the Netherlands and Belgium Moreover, DPG Media needed a system that is well supported in both the Netherlands and Belgium. Together with partner Nsecure, Nedap became the perfect match for DPG Media. Nedap addresses the following requirements to provide a unified and flexible security for life: A unified access control system for multiple locations in the Netherlands and Belgium – including their ultra-modern headquarters (Antwerp), and one of the largest printing plants in Europe (Lokeren) Ensured support for the latest technologies, features, and security Fully scalable and flexible access control Security with the highest standards to protect against the impact of cyber attacks on access control Implementation and support by a single trusted partner (Nsecure) in both the Netherlands and Belgium "Given the good experiences with Nedap in the Netherlands, it was a logical choice for DPG media to also secure their locations in Belgium with AEOS," said Peter van Bockstal, Nedap Security Management.
Polpharma is the largest Polish manufacturer of pharmaceuticals and among the top 20 generic drug manufacturers in the world. They actively operate in the markets of Central and Eastern Europe, the Caucasus and Central Asia. For over 80 years, Polpharma have been trusted by patients, healthcare professionals and business partners alike. The Polpharma Group and associated companies employ more than 7,500 people in Poland and on international markets. Polpharma wanted a centralised, high-level and reliable security solution. Moreover, they need the flexibility to integrate with systems, like Hikvision, Evoko and Followme. All in cooperation with a company that offers local support. Centralised access control Nedap provides the following things to provide the flexibility to manage complexity Centralised access control Encryption on each level of communication Implementation and support from local channel partner Improved flexibility and scalability Integration with HikVision, Followme (printing), Evoko (room manager) "The Pharmaceutical sector and especially Polpharma has to pay high attention to security. That’s why they identified that operating so many access control systems and card technologies leads to risks and affects the resilience of the company. Since 2016 we have been involved in the merge of the access control systems into one: AEOS," said Anna Twardowska, Nedap Security Management.
Round table discussion
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
“Open systems” has been a security industry buzzword for decades, although reality has sometimes diverged significantly from the ideal. The current state-of-the-art in open systems provides a multitude of benefits to increasingly complex physical security systems. We asked this week’s Expert Panel Roundtable to elaborate: What is the impact of open systems on physical security?
Security systems: Manufacturers & Suppliers
- Dahua Technology Security systems
- Vicon Security systems
- Vanderbilt Security systems
- Seagate Security systems
- Bolide Security systems
- Bosch Security systems
- ComNet Security systems
- VIVOTEK Security systems
- MobileView Security systems
- Videotec Security systems
- Hanwha Techwin Security systems
- Sony Security systems
- HID Security systems
- LILIN Security systems
- BCDVideo Security systems
- OT Systems Security systems
- MOBOTIX Security systems
- DSC Security systems
- CEM Security systems
- TESA Security systems