Interface Security Systems, a managed service provider delivering business security, managed network, and business intelligence solutions to distributed enterprises, announced it is now offering interactive remote video monitoring service with automated voice-down options to help its retail and restaurant customers promote social distancing and mask-wearing guidelines on their premises. A growing number of retailers and restaurants are reporting increased incidents of agitated customers and in-...
Johnson Controls will showcase solutions and thought leadership critical to safe building reopening during the virtual Global Security Exchange Plus (GSX+) conference. From Sept. 21 to Sept. 25, 2020, Johnson Controls experts will demonstrate and discuss the latest security innovations that have become integral to intelligent security during the COVID-19 crisis and beyond. Attendees can interact with Johnson Controls leaders during keynote event sessions, technology demos and a thought leader i...
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced they are showcasing a new optical turnstile, the Speedlane Compact, as well as presenting the inaugural first episode of BoonTV about “Scalable Security” at the Global Security Exchange Plus (GSX+) virtual exhibition hosted by ASIS International. Security professionals from across the globe are converging online to participate in over 100 educational sessions, network with peers, and...
Geoff Slagle, a globally-known patron and spokesperson for mobile driver’s licence (mDL) technology, has been appointed as President and Chief Business Development Officer of Scytáles AB. The former director of Identity Management for the American Association of Motor Vehicle Administrators (AAMVA) will help guide both Scytáles and its global mDL partner, GET Group, in establishing a position for ISO-compliant mobile driver’s licences and mobile IDs. Mobile identity t...
Hikvision, an IoT solution provider with video as its core competency, has announced the integration of its HikCentral video security platform with the Nedap AEOS Access Control Solution to provide single-platform operations for users who maintain both Hikvision and Nedap systems. The integration, via Nedap AEOS Connector, provides event information, alarms, and person-data synchronisation of access control and intrusion events between AEOS-connected hardware and HikCentral. This integration en...
A Security Barometer poll conducted by the Security Executive Council finds that corporate security and cyber security functions have interacted and cooperated more in the last 12 months than in previous years. The survey, conducted in collaboration with SEC strategic alliance partner ISC2, identified emerging issues of joint interest as the most frequent drivers for the increase. Comments from participants showed that many security leaders now view cooperation between functions as critical to...
Security researchers at Check Point have unravelled a six-year, ongoing surveillance operation apparently run by Iran-based threat actors against regime dissidents. Going back as far as 2014, the attackers used multiple attack vectors to spy on their victims, including hijacking victims’ Telegram accounts, extracting two-factor authentication codes from SMS messages, recording a phone's audio surroundings, accessing KeePass password manager account information, and distributing malicious Telegram phishing pages using fake accounts. Malware-laced documents The victims appear to have been hand-picked from anti-regime organisations and resistance movements such as Mujahedin-e Khalq, the Azerbaijan National Resistance Organisation, which advocate the liberation of Iranian people and minorities within Iran, and Balochistan citizens. The attackers used malware-laced documents to lure victims into infecting their devices. The core functionality of the malware is to steal as much information as it can from the target device. The payload targets two main applications: Telegram Desktop and KeePass, the famous password storage manager. The main features of the malware include: Information Stealer Uploads relevant Telegram files from victim's computer. These files allow the attackers to make full usage of the victim's Telegram account Steals information from KeePass application Uploads any file it could find which ends with pre-defined extensions Logs clipboard data and takes desktop screenshots Unique Persistence Implements a persistence mechanism based on Telegram’s internal update procedure Two-factor authentication During their investigation, Check Point researchers also uncovered a malicious Android application tied to the same threat actors. The application masquerades as a service to help Persian speakers in Sweden get their driver's license. This Android backdoor contains the following features: Steals existing SMS messages Forwards two-factor authentication SMS messages to a phone number provided by the attacker-controlled C&C server Retrieves personal information like contacts and accounts details Initiates a voice recording of the phone's surroundings Performs Google account phishing Retrieves device information such as installed applications and running processes Setting up an account Some of the websites related to the malicious activity also hosted phishing pages impersonating Telegram. Surprisingly, several Iranian Telegram channels issued warnings against the phishing websites, claiming that the Iranian regime is behind them. According to the channels, the phishing messages were sent by a Telegram bot. Some of the websites related to the malicious activity also hosted phishing pages impersonating Telegram The messages warned their recipient that they were making an improper use of Telegram's services, and that their account will be blocked if they do not enter the phishing link. Another Telegram channel provided screenshots of the phishing attempt showing that the attackers set up an account impersonating the official Telegram one. At first, the attackers sent a message about the features in a new Telegram update to appear legitimate. The phishing message was sent only five days later, and pointed to a malicious domain. Cyber-security expert A removed blog entry from 2018 accused a cyber-security expert of plagiarism, when he was interviewed by AlArabiya news to discuss Iranian cyber-attacks. Researchers believe this page was created as part of a targeted attack against this person or his associates. The blog included a link to download a password-protected archive containing evidence of the plagiarism from `endupload[.]com`. It appears that `endupload[.]com` has been controlled by the attackers for years, as some of the malicious samples related to this attack dating to 2014 communicated with this website. Monitoring different geographies Lotem Finkelsteen, Manager of Threat Intelligence at Check Point said: “After conducting our research, several things stood out. First, there is a striking focus on instant messaging surveillance. Although Telegram is un-decryptable, it is clearly hijackable. Instant messaging surveillance, especially on Telegram, is something everyone should be cautious and aware of.” “Second, the mobile, PC and web phishing attacks were all connected to the same operation. These operations are managed according to intelligence and national interests, as opposed to technological challenges. We will continue to monitor different geographies across the world to better inform the public around cyber security.”
Global cyber and deep tech investor, Paladin Capital Group, announces the appointment of Ciaran Martin, CB, as a Managing Director. Ciaran joins Paladin from the UK Government’s National Cyber Security Centre (NCSC), which he established as its first CEO in 2016 and is regarded as one of the best public authorities in the world for cyber security. The mission of the NCSC is to help make the UK a safe place to live and work online, working with the public sector, SMEs and industry, and the general public. Ciaran was the head of cyber security at GCHQ from 2014 before starting up the NCSC. Evolving threat landscape Michael Steed, Founder and Managing Partner, stated: “Ciaran Martin is an exceptional talent in the cyber sphere and we’re profoundly pleased to have him join the Paladin team. His understanding of the ever-evolving threat landscape and knowledge of the technologies required to meet those challenges will help us assess potential investments and support our portfolio companies in their growth." "At Paladin we focus on companies that have a “dual lens”, that is, they provide services to government and commercial customers. Ciaran’s experience working across the public and private sectors to develop cyber solutions will be invaluable for the companies we back.” Cyber security for businesses Ciaran will assist with the development of Paladin's presence in the growing European cyber security early stage market Paladin is a venture capital investor in early stage companies, based in EMEA, North America and Asia, which develop products and services that defend, monitor and secure our shared critical, digital infrastructure. Ciaran will be based in Paladin’s European headquarters in the UK. He will assist with the development of Paladin’s presence in the growing European cyber security early stage market. He will also be part of Paladin’s global Strategic Advisory Board, advising the company on threats, trends, risks and opportunities in cyber security for businesses and governments. This important role is in addition to Ciaran’s position as Professor of Practice at the Blavatnik School of Government at the University of Oxford. Common cyber threats Ciaran Martin commented: “I am delighted to be working with the Paladin team. I learned in Government that whether it’s in the UK, Europe, the US or globally, the common cyber threats we face can only be solved if there is a strong, innovative private sector taking care of huge swathes of the problem. That presents enormous economic opportunities for talented technologists and entrepreneurs and I’m looking forward to being part of a venture capital team helping them to succeed." Previously, Ciaran was Constitution Director at the Cabinet Office from 2011, working on the Scottish independence referendum. From 2008-11 he was Director of Security and Intelligence at the Cabinet Office. Paladin has invested in nearly 50 cyber and advanced technology companies. Portfolio companies in Europe include CyberHedge, Dashbird, Digital Shadows, DPOrganizer, Elliptic, Panaseer, RangeForce, Secure Code Warrior and Teraki, in countries including Luxembourg, Germany, Belgium, Sweden, UK and Estonia.
Alcatraz has announced the appointment of Holley Hunt as the company’s Director of Business Development. Hunt will lead Alcatraz in discovering and pursuing new business opportunities and partnerships as the technology security startup carves out a new industry, Autonomous Access Control. Alcatraz Chief Revenue Officer, Tina D’Agostin said, “As a leader in the security space, Holley is an excellent addition to the Alcatraz team in this critical time of our go-to-market strategy and execution. She has impressive security industry business development experience with world-renowned security leaders.” Tina adds, “What’s also impressive is that, throughout her career, Holley has taken the extra step of serving as a mentor to her peers in the industry and also in encouraging young women to get into STEM fields to help create future leaders.” Business Development and Sales expert Prior to joining Alcatraz, Hunt served as Director of Business Development for Johnson Controls Prior to joining Alcatraz, Hunt served as Director of Business Development and Global Strategic Account Executive for Johnson Controls. She also was Business Development Manager for Qognify, Director of Strategic Partnerships for Kepler Group and Regional Sales Manager for Bosch Security Systems. She has also served in a variety of volunteer roles, including mentor-protégé chair for the ASIS San Diego Chapter, Board Member of the San Diego Security Association and the Orange County Alarm Associations and President of Inland Empire Alarm Association. Creating Risk, Operations, Cyber and Controls experts Hunt created an active global networking group called Cool Peers Rock for practitioners to connect and benchmark best practices. She also developed School of ROCC, a program for high school STEM students, which helps create future leaders in Risk, Operations, Cyber and Controls. “With Alcatraz, I’m starting a new chapter and it’s all about the rock. And by rock, I mean several things, a foundation to set my future and an opportunity to focus on the Alcatraz Rock autonomous access control platform,” said Hunt. Alcatraz Rock autonomous access control platform She adds, “The Alcatraz Rock is just what’s needed for security in general, access control in particular, and during this time when we need to create a touchless experience for our business environments. With the Alcatraz Rock, your face is your badge and that delivers an impressive level of security.” Alcatraz has changed the way that companies leverage access control systems, by providing a facial authentication solution that leverages 3D, artificial intelligence and analytics to modernise existing access control technology. Mask Detection feature Enterprises are choosing to deploy the Alcatraz Rock as their first line of defence against unauthorised access, to deliver effective and secure autonomous access control. Because Alcatraz's platform also detects masks, it has become the perfect post-COVID solution for businesses that want to deliver touchless security in their buildings while observing state and local mask mandates.
ASSA ABLOY, the globally renowned provider of door opening solutions, has collaborated with long-time security partner, LenelS2 to enable mobile access to IP-enabled IN Series access control locks via the LenelS2 BlueDiamond app. Through the app, users can pre-load their most frequented pathways to enjoy streamlined access to doorways, use their phone as a badge even while it remains in a pocket or bag, and utilise voice commands on their smart phone or other connected device to conveniently unlock and open doors. This facilitates enhanced security that helps prevent unauthorised access of information. IN120/IN220 locks integration with ASSA ABLOY access control IN120/IN220 locks work with ASSA ABLOY IP-enabled Access Control Partner software IN120/IN220 locks work with ASSA ABLOY IP-enabled Access Control Partner software, allowing straightforward integration into new or existing access control systems. These system integrations allow for easy changes to access rights, detailed transaction history and other advanced functionality options. “Working together, ASSA ABLOY and LenelS2 are committed to making access to spaces more seamless and convenient without compromising security,” said Joseph Sceviour, Product Manager for ASSA ABLOY’s wireless solutions, adding “We are excited about the flexibility that the BlueDiamond app offers users of IN120 and 220 Series access control locks.” Enhanced access control solution “Further expanding the BlueDiamond ecosystem supports our objective to provide a next-generation, convenient and more secure access control experience,” said Greg Berry, Vice President, Mobile Credentialing, LenelS2, adding “We look forward to bringing this experience to IN120 and 220 users.” IN120 and IN220 are ANSI/BHMA Grade 1 locks available in cylindrical, mortise, multi-point and exit device configurations. They are offered in a wide range of finishes and decorative levers that complement any design style, to serve designers and architects in a variety of vertical markets.
Pulse Secure, the provider of software-defined Secure Access solutions, announces its new partnership with Trainocate to deliver Pulse Secure Authorized Training courses across ASEAN. “Our channel has been instrumental to Pulse Secure’s growth as a Zero Trust secure access solution provider,” said Gary Gee, Pulse Secure Regional Channel Manager, ASEAN. “The Trainocate team brings expertise that will further empower our partners to help customers achieve workforce productivity, especially in the context of COVID-19." “Pulse Secure is a force to be reckoned with in a Zero Trust world. As businesses navigate the new normal in the current landscape, we anticipate demand for Pulse Secure training to grow,” said April Li, Head, Strategic Portfolio Management at Trainocate. "We’re incredibly excited to be part of the Pulse Secure ecosystem as an authorised education delivery partner and look forward to offering our customers the full spectrum of Pulse Secure trainings.” Interoperability for hybrid IT and multi-cloud Pulse Secure brings together core secure access functions with required interoperability for hybrid IT and multi-cloud. The company’s Zero Trust value proposition is realised through its Access Suite, which delivers protected connectivity, operational intelligence, and threat response across mobile, network, and multi-cloud environments in order to provide easy, compliant access for end users and single-pane-of-glass management for administrators. Training and Certification Program The Pulse Secure Training and Certification Program includes training courses designed to help network engineers, enterprise system architects, technical support specialists and implementation consultants to successfully deploy and maintain Pulse Secure products and services. After completing the training course, participants are prepared to take the Pulse Secure Certified Technical Expert exams. Local classes will begin in September 2020 and will include training for: Pulse Policy Secure (PPS) - Deployment, Implementation and Configuration; Pulse Connect Secure (PCS) - Administration and Configuration; Pulse Secure vADC - Foundation and Pulse Secure vADC - Administration and Configuration.
Device Authority, a global provider of identity and access management (IAM) for the Internet of Things (IoT), announced the latest version of its KeyScaler platform which includes enhanced device connectivity, secure data storage and support for Microsoft Azure Sphere. In today’s evolving technology-driven world, security needs to be architected into IoT devices from the moment of inception and requires a robust foundation to deliver secure updates throughout the device lifecycle. Devices must have a strong Root of Trust (RoT) in the processors/systems and a mechanism to deliver signed and encrypted images either for production and/or for ongoing updates. This will enable secure production, protect against IP theft, detect device cloning, and help mitigate security breaches. Intelligent secure products Azure Sphere brings together the best of Microsoft’s expertise in cloud, software and silicon to provide a security foundation and connectivity to create intelligent secure products and accelerate the adoption of IoT at scale. Device Authority’s KeyScaler platform has the ability to leverage this initial security foundation by enabling Azure Sphere devices to connect to KeyScaler and provide them with operational certificates to automate and secure device enrolment to any IoT platform. Today’s KeyScaler release builds further on our technology integrations and support for Microsoft" This extends the security suite to Azure with connectors to HSMs, CAs and IoT platforms for secure trusted IoT solutions. “We’re delighted to work with the Azure Sphere team to help solve their customer’s challenges with security lifecycle management. Today’s KeyScaler release builds further on our technology integrations and support for Microsoft - now with functionality to automate certificate management for Azure Sphere devices." Access controller solution "These devices need to connect to different constituents including Microsoft and non-Microsoft assets in operations. KeyScaler is a key component in this ecosystem to extend the trust and automation required,” said Darron Antill, CEO of Device Authority. Additionally, this KeyScaler release also expands on the previously announced HSM Access Controller solution with a secure data repositories feature. This enables customers to centrally and securely store sensitive data and use policies to control access to that data. This release also includes control panel updates, improved device connectivity support, along with new logging and reporting features.
Today, 55% of the world’s population lives in urban areas. According to estimates from the UN, this number is expected to increase to 68% by 2050. As urban areas become more densely populated, the ability of law enforcement to uphold law and order becomes ever more critical to public security. It’s a challenge that must be constantly reviewed, and issues addressed where needed. One such area is the detection, identification and interception of physical threats, which has traditionally included guns, knives and explosives. Over the last six months, however, this has now evolved into the detection and identification of new, invisible microbiological threats, such as COVID-19. A new approach to physical security Since reports began on COVID-19 in Wuhan, China, in December 2019, the virus has spread to over 188 countries, killing over 790,000 people. When this is set against the unrelenting backdrop of rising terrorist threats, a new approach to today’s physical security is needed to create safer public and private spaces. Globally, tensions are running high. An international health crisis, political tumult and unstable economic environments are creating the potential for a perfect storm for extreme behaviour. Now, more than ever, governments must coordinate with healthcare, security services, and technology providers to pool the expertise needed to deploy innovative detection platforms to address these growing threats. In smart cities, in particular, technology will play a crucial role in addressing both physical and biological/viral threats in order to keep their citizens safe. Technology will play a crucial role in addressing both physical and biological/viral threats Collaborating to advance security systems in smart cities To date, we’ve seen an increase in the number of smart city programmes around the globe; cities that are beginning to deploy innovative technologies for the management and ease of life services. Global spending on smart city initiatives has now reached a total of nearly $124 billion this year alone, an increase of 18.9% over 2019, according to the International Data Corporation’s (IDC) latest Worldwide Smart Cities Spending Guide. However, the growth of urban populations is impacting overall infrastructure and resources and many towns and cities are struggling to keep pace. According to research from Deloitte, just 16% of cities can self-fund required infrastructure projects. As a result, cities are enlisting the support of private partners and governments to advance their smart city agendas. Public-private collaboration is a lifeline for developing effective security systems in smart cities. Decision-makers must coordinate and collaborate with security experts and operators to arm themselves with a comprehensive understanding of how to best implement and integrate innovative, agile, data-driven security systems. They need to work together, with a clear strategy in place, to respond to these growing threats, while improving public safety. Using smart technology for public security and safety The challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimise security solutions. Demand a security response that is proactive, adaptable and dynamic Computer vision technology is one such solution that incorporates AI and machine learning into existing video monitoring security (VMS) systems. This computer vision technology enables the detection of visible weapons, such as guns or knives, helping to identify potential threats before an attack occurs. After identifying the weapon, the AI-driven security system can immediately alert onsite security, in real-time, to the location and nature of the incident or potential attack. This allows security and first responders to intervene, possibly before a weapon is drawn and/or used. AI-driven software has also demonstrated great potential for identifying those displaying symptoms of viral or infectious diseases, without requiring physical human contact. By using AI-powered video analytic software with a common ‘off the shelf’ thermal video camera, this new security solution can become a remote video health safety screening tool for the identification of elevated body temperature, as well as face mask and social distancing detection for compliance. Now, with the power of real-time AI software, integrated with current VMS systems, threat objects held by an assailant, whether visible or not, can be identified for immediate security response. This can be done in an effective, unobtrusive way that does not interrupt people’s day-to-day routine, as has been the case with other larger or more overt security solutions; including queueing for physical temperature checks or walking through a metal or millimetre wave detector. While individuals and communities are willing to accept some inconvenience as a result of this new normal, privacy and civil liberties must be maintained, until a potential threat is detected. The future of smart cities in a post-COVID world Look ahead to the future of public security We look ahead to the future of public security in a world where physical and microbiological threats are continually evolving. It is only by adopting a new approach to threat detection that such a wide spectrum of the active assailant attacks can be mitigated. Today’s communities are working this into their smart, connected and safe city models. With AI-driven technology that optimises the efficiency and safety of city operations and public services, its citizens will not only stay connected but will also stay safe. Governments must coordinate with security services, as well as technology providers, to pool the expertise needed to best implement and integrate these innovative technologies for the public good. They need to work collaboratively to ensure smart city projects include solutions to address physical security technologies that addresses theft, civic disturbance, terrorist activities and infectious disease. This, in turn, will make these cities not only smarter, but safer as well.
In a multi-faith society, individuals should have the freedom to practice their faith in complete safety. It’s taken a long time for the right to freedom of belief in the UK to be enshrined in law – the Human Rights Act 1998 protects public worship – yet there are signs that religious intolerance is on the increase. Hate crime offences on the rise Home Office figures show that hate crime offences in England and Wales have been rising steadily over the past six years, with 7,446 religiously motivated incidents last year. Nearly half of those religious hate crimes recorded were Islamophobic, while crimes against the Jewish community more than doubled over a year. These faiths are not the only targets of increasing violence: an ‘epidemic of crime’ was reported last year with almost half of listed churches targeted by professional gangs. An ‘epidemic of crime’ was reported last year with almost half of listed churches targeted The situation has resulted in the government increasing their Places of Worship Protective Security Fund to £1.6 million – the largest since the scheme was set up. A ‘Ramadan package of support’ for mosques was also announced, along with extended police protection and a new £5 million fund devoted to security training for places of worship. Protection of synagogues, which aren’t covered by this fund, has been bolstered by a government grant increase via the Community Security Trust. Evolving threats Simply put, the right to freedom of religion is under attack, and many places of worship have become targets. Anticipating the evolving threats of a changing world is one of the prevailing priorities for the security industry. At times, certain events can prompt concern over a shift in risks; it was correctly predicted, for example, that hate crime would spike after the 2016 Brexit referendum. To truly get to grips with threats in the UK, however, we first need to understand the concerns of the people involved – and then start implementing strategies to protect them. Uncovering views across the nation With a view to understanding the key threats and security issues facing places of worship and how best to solve them, we commissioned original research that explored the opinions of the people with the most direct experience: congregations of religious institutions. 59% said their place of worship had been the target of an attack. We surveyed 2,000 people across the nation, seeking to uncover their views on safety at places of worship and their personal experience of religious hate crime. It was a far-reaching survey, with responses gathered from followers of Christianity, Islam, Hinduism, Sikhism, Judaism, Buddhism and other religions across all regions of the UK – a representative sample of the British population. The results were concerning. The scale of the problem was confirmed by the fact nearly two thirds of respondents (59%) said their place of worship had been the target of an attack. Just 13% said they felt ‘secure enough’ at their place of worship, pointing to the need to better understand the threats and consider viable security solutions. This is a conclusion strengthened by 90% of respondents backing different security measures to strengthen their feeling of safety. Restoring faith in security While our research exposes serious concerns over security at places of worship, there are other findings that should give us confidence in the well-being of their regular users. A quarter of respondents, for example, claimed to be unconcerned by threats at their place of worship – perhaps suggesting a natural feeling of comfort and protection that faith affords believers. 13% of respondents reported their place of worship was attacked on a daily basis From a closer look at the findings relating to personal experience of crimes, it’s clear that enhanced levels of security measures are required in our changing world; one of the most disheartening findings is that nearly 13% of respondents reported their place of worship was attacked on a daily basis. Along with ensuring places of worship have adequate funding in place, expert security guidance is also required to protect these buildings. While better security shouldn’t be needed for places of worship, having well designed physical fencing and access control can give worshippers peace of mind and deter those with nefarious intent.
Latest insights from the Economist Intelligence Unit’s Global Barometer show that 41% of execs think 5G is now less important than it was before the pandemic. There are numerous reasons why this could be the case, one being that 4G and home broadband has been proven to be up to the job of supporting home working. There’s also no escaping the headlines that surround 5G and political espionage. They read like a script from House of Cards. Presidents, prime ministers, heads of foreign intelligence services and global corporate leaders, providing the colourful characters that are essential in any good political drama. It could well have made some organisations rethink their plans for adopting 5G enabled technologies and wait until there can be more assurances on security. New technologies The latest edict by the UK government is a pretty clear statement. It has promoted many industry insiders to say that it will take years to exchange kit, possibly even a decade for some operators, as they take on the heavy lifting of removing core network components and finding alternative suppliers. The financial impact is huge: operators will have to find additional budget to purchase the kit, conduct validation and integration testing, overhaul their service wrap around offers and factor in the time and cost of retraining employees on new technology. Achieve new ambitions related to driverless cars Despite all this, many carriers have made very public statements that they will progress with 5G as planned, some are even accelerating plans. The insight available to them confirms that there is still a good proportion of businesses and pubic bodies that see its value. It’s a way to propel smart city development and connectivity, and to achieve new ambitions related to driverless cars, and highly automated manufacturing for example. 5G therefore remains a rolling stone and regardless of the core network kit, security needs to be designed in, not bolted on, at every step of network and application design and build. New rules for working The pandemic has shaken up how we live and work. It has brought home the necessity for ultra-fast, affordable and agile communications everywhere. It’s also proved a fertile hunting ground for scammers keen to exploit the public’s thirst for up to the minute news. Click bait has been rife and it still forms one of the most effective ways to distribute malware and ransomware. Unprotected VPNs have added to the risks, as companies scrambled to roll out remote access at mass scale. It overburdened their security infrastructure and created vulnerabilities all in the name of getting home working ramped up quickly. Some companies have learnt the hard way that maintaining patches on software and keeping on top of the security education their employees receive is vital to protect operations from attack. Rural vs urban working The move to home working has also brought to light discrepancies in speed and access to communications, reigniting the rural versus city investment debate. We’ve seen some companies say that employees can now work anywhere, and others downsize their office footprints. This is opening the door for people to swap city living and commutes for more rural locations. 5G roll out plans typically focus on large cities and towns, but is this still the right strategy? I’d suggest that operators need to step back and look at the larger global trends and update their plans. Connected cows and beyond For example, farming and the environment has to be a planning priority now. To meet the needs of a predicted 9 billion people in 2050, farming supply will need to increase by 50%. COVID-19 has brought into sharp focus how precarious the global food supply chain is. In addition, this increase needs to be met with technology to make agriculture more efficient in order to preserve the world’s natural resources while meeting these goals. COVID-19 has brought into sharp focus how precarious the global food supply chain is The vision of the ‘connected cows’ is mooted as a way to solve global food security. As such, farming and the environment are set to gain greatly from technologies and applications enabled by 5G Internet of Things (IoT). But the benefits will only be realised if the connectivity and security is in place. The vast network of IoT sensors that will be used to improve farming inefficiencies, increase welfare standards and reporting, as well as efficiently manage food manufacturing will generate an abundance of data. Highly sensitive data This data will range from highly sensitive sets related to pricing and employees, critical data related to yield management and compliance, to more transactional weather and water sensor data. Ensuring continuity will be essential to not just farming productivity and meeting standards, but also protecting IP or personal information throughout the supply chain and preventing a cyberwar intended to starve people. Corporate espionage is a very real threat to manufacturing at the moment, and as farming becomes more connected, it’s expected this threat will extend as far as the farmyard. Not only that, protests against government handling of policies related to food poverty or overproduction could be done using ‘hacktivism’. It’s easy to buy a hack these days and start an online attack to make your point. So, as farming adopts technology models we usually see in the corporate world of pharma and finance, it too may become a target. Healthcare goes truly national The much talked of vision for the virtual GP accelerated in the pandemic, helping people see a GP without leaving the house. Governments have had a very real glimpse into the importance of connected healthcare in terms of saving money and time. There is now a greater likelihood that nursing teams will be given mobile devices that can access and update patient records in real-time, GPs will scale down consultation space in favour of online appointments, and prescriptions will be automatically filled and delivered at the click of a button. Comprehensive 5G networks can help make more of this happen particularly in remote areas where health care is scarce, of that there is no doubt, and this is before we get into the exciting prospect of remote brain surgery that 5G can facilitate. The pandemic also exposed the precarious nature of online healthcare But the pandemic also exposed the precarious nature of online healthcare. Patient data remains a sitting duck, as illustrated perfectly by breaches we saw across the world both in public and private delivery. At its very worst, nation state attacks pose a significant threat to public health and it’s essential there is local and global collaboration to ensure data is protected. This threat won’t wane. In fact, it is increasing as we drive more innovation and connectivity. Security experts have their work cut out. But it’s not impossible to achieve secure networks and applications, so long as we don’t put profit before people.
Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. Today, even air travel seems incredibly risky, or at minimum a huge hassle. The good news is that the industry has adapted well without the shows. A series of “on-line shows” has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. It’s easy to dismiss these sessions as “Death by PowerPoint,” but some of them are incredibly informative. And conveniently accessible from the comfort of a home office. Internet transforming businesses We have already seen how the online world makes it easier than ever to connect with customers. In the consumer space, businesses like Uber, Shopify and Airbnb have proven that the Internet can transform how business is done. But in the security industry, we hear: “You can’t replace the value of meeting face to face.” That’s definitely true to some degree. A lesson of 2020 is the need to take a hard look at the economic model of trade shows However, the reality of 2020 suggests that there are alternatives that are almost - emphasis on almost - as good. And that don’t cost as much. And that don’t take away as much time from the office. And that don’t involve the effort of schlepping luggage through an airport yet again to a hotel in a beautiful city you will never see where you will spend three days in a big exhibit hall eating overpriced hot dogs and regretting your choice of footwear. Economic model of trade shows Sure, you’ll meet up with old pals, and get some value out of the experience. But how much value versus the cost? A lesson of 2020 is the need to take a hard look at the economic model of trade shows - how much they cost versus the value they provide. Considering how well we have gotten along without them, one wonders how and why trade shows have become such an integral part of our industry, and of hundreds of other industries, for that matter. I have had many conversations with exhibitors at trade shows in the last several decades. I have heard probably thousands of complaints about the slowness of the foot traffic, the high costs of exhibiting, the price and hassles of travel. The question I have often wondered (and asked): Is it worth it? Defray the costs Usually, the complaining exhibitor will reluctantly admit that it is, and/or provide some other justification, such as one of the following: All my competitors are here. If I don’t exhibit, it sends the wrong message to the market. That’s why I need to have the largest booth near the front of the show, too, because it’s all about perception and positioning ourselves in the market. We need the show for the sales leads, which drive our sales for the next six months. If I meet one large end user who turns into a big sale, the extra revenue pays for it all and makes everything worthwhile. This is the only time I get to see my sales staff or other coworkers from around the country. We have a sales meeting this week, too, so it helps to defray the costs. Success of alternatives The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come Given the experience of the year 2020 without any trade shows, might some of these justifications melt away? At a minimum, companies will be taking a hard look next year to evaluate what they missed about the trade show experience, and more importantly, what the impact was on their business (if any). What is the future of trade shows? After the 2020 hiatus, exhibitors and attendees alike will be starting with a clean slate, taking a fresh look, reexamining the value proposition with new eyes, braced by the successes (while acknowledging the failures) of alternatives that emerged as necessities during a global pandemic. Ensuring safety and security The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come - including trade shows. During the pandemic, we have all had to reinvent ourselves, deploy new strategies, work around new challenges, and in the end, hopefully, emerge better for it. There’s no reason trade shows shouldn’t undergo the same transformation. And it’s likely the “new normal” could look very different. The security market has found new opportunities during the pandemic, including new applications for existing technology and a renewed emphasis on the importance of ensuring safety and security. That positivity will hopefully carry our industry triumphantly into the new decade, and trade shows will adapt to find their place in the newly revitalised industry. As it should be.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also known as red teaming). The session, titled “We Sneak into High Security Buildings and Get Paid for It”, will be presented by Michael Glasser, President, Glasser Security Group. He has two decades of experience providing security design strategic planning, implementation oversight, auditing and penetration testing. “Penetration testing determines whether people and systems are providing the protection you think they are,” says Glasser. Various system components should come together into a solution that works for the client. People, technology and architecture are all components of successful security systems. His motto: “Stop guessing and starting testing". Test-driving security systems “You can compare it to driving a car,” says Glasser. “You want to be sure the brakes work and the engine works, but then somebody has to test-drive the car.” Stop guessing and starting testing" The concept of penetration testing goes back to the Cold War, when the military had “Red Teams” and "Blue Teams”, competing squads that used their skills to imitate attack techniques enemies might use. More recently, the term “pen testing” has become common in the cybersecurity industry, often referring to “white hat” hackers that test the effectiveness of cybersecurity measures. Applying the concept to physical security in corporate America brings the concept full circle. “People think their controls work, but they realize they really need to see if it all works together,” says Glasser. Pen testing in corporate America “You can go to any military base or nuclear power site and you see pen testing,” says Glasser. “But often it doesn’t happen in corporate America.” Sometimes physical pen testing is approached as an extension of cybersecurity testing because addressing physical threats is an element in cybersecurity, too. “It’s the same service, except to make sure the physical house is in order,” says Glasser. Glasser’s session will be among the SIA Education@ISC East presentations scheduled at the education theaters on the show floor at ISC East, Nov. 20-21 at the Javits Center in New York. The process If you believe the movies, Glasser’s job is all fun and excitement, like a “bunch of kids having fun”. The reality is more mundane, he says. “People think it’s fun, but it’s work, not fun.” The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities before attempting a break-in. Research is based on threat modelling: What is a company worried about? Who is the bad guy? What do they want to do? What are the threats? The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities Among other tools, Glasser uses Open Source Intelligence (OINT), which is collection and analysis of information gathered from public, open sources, such as media, the Internet, public government data, etc. Glasser comes from a physical security industry family – both his mother and father were employed in the security industry – and he attended his first ISC East show in the 1990s when he was 11 years old. As a security consultant and security expert witness for more than 20 years, he has previously spoken at GSX and various ASIS International events.
La Maison Royale, Nairobi, is a 4-star superior boutique business hotel with a ‘French taste’, State-of-the-art facility and close to the entertainment in the Westland neighbourhood, La Maison Royale is a unique experience. La Maison Royale prides itself with friendly staff and the practical touches that make being away from home easier, whether a person books their rooms by the day, week or longer. Travelling for business, looking for temporary or corporate housing, needing short-term housing during relocation, or planning a weekend getaway? La Maison Royale has a solution that will fit everyone’s budget. Unified communication server La Maison Royale has their prominent presence across several locations in Nairobi. Considering this, they required seamless connectivity within sites. A system for call accounting, budgeting and routing with hospitality features was their primary requirement. Furthermore, a comprehensive and scalable solution that does not need a transformation in the coming years was their main challenge. Matrix addressed these challenges by proposing SARVAM UCS The hotel infrastructure required a centralised communication management of all business communication. Besides, they were looking for a multi-site connectivity with call accounting and call budgeting. Matrix addressed these challenges by proposing SARVAM UCS, which is a unified communication server for modern enterprises that manages all business communications from one place. SARVAM UCS is an enterprise-grade Unified Communications solution that offers La Maison Royale the much needed collaboration, communication, messaging and mobility between multi-locational sites. Unifying all the communication networks and devices provides users with the flexibility of accessing the calls, messaging and voicemails from any of the devices irrespective of their location. Better customer responsiveness Unified communication for workforce collaboration and better customer responsiveness Call Management and the ability to connect from anywhere, anytime and with anyone Simple administration and management due to web-based configuration Enhanced customer responsiveness to customer/clients Scalability to expand their business footprints in the future Leverages existing infrastructure and connect on a common communication platform IP-solution at core and application upgradation paths that renews and extends investment Efficient call management SPARSH Series of IP extensions are elegantly designed to offer reliable performance SARVAM UCS SME is a server software which runs on ETERNITY GENX– The next-generation hardware platform. The next-generation platform supports up to 99 VOIP (SIP) trunks, 40 GSM ports, 8 T1/E1 ISDN PRI ports, and 64 analogue trunks with up to 999 UC users, 96 digital users and 240 analogue users. Both AC and DC power supply options are available. SPARSH Series of IP extensions are elegantly designed to offer reliable performance, quality of business communication and efficient call management. It provides high quality speakerphone, programmable feature and DSS keys, corporate directory, message wait lamp, voice mail and intuitive user interface. Hotel management software Matrix offered complete hotel management software with built-in hospitality features like: web-based front desk management, check-in/check-out, guest-in/guest-out, room shift, wake-up calls and reminders, mini-bar, built-in call cost calculation, emergency call detection and more. Matrix VARTA application essentially shifts all of the desk phone functionalities to the smartphone or desktop computer which makes the desks wire-free and clutter-free. Place or receive calls through the extended communication endpoints and give a chance to effective communication without the mess. Furthermore, softphone offers additional features using smartphone or desktop computer hardware that adds to staff productivity and easy call management.
March Networks, a globally renowned company in video security and video-based business intelligence solutions, is proud to announce that one of the world’s largest oil companies will deploy its cloud-based Searchlight solution at more than 300 c-store locations. The Fortune 500 Company is currently rolling out March Networks Searchlight for Retail as a Service at all of its U.S. corporate-owned stores. The company’s branded fuel products are sold at nearly 8,000 service stations in the U.S., providing a future platform for March Networks to continue to grow its c-store customer base. Cloud-based Searchlight solution By choosing March Networks’ cloud-based Searchlight, the oil company can deploy a powerful loss prevention and data analytics solution in a shorter timeframe and with less upfront cost than a traditional video surveillance deployment. The subscription-based service, combining high-definition video, transaction data and analytics, is managed by March Networks from its secure Network Operations Centre (NOC). This eliminates the need for the company to purchase and maintain servers within its own IT infrastructure, and leaves it free to focus on its business, while March Networks handles all the software upgrades and maintenance of the application. With the addition of the oil company, nearly 15,000 business locations worldwide are now using the March Networks Searchlight solution. Security and transformational business insights “Leading banks, retailers and restaurant chains are choosing March Networks Searchlight for its unique ability to deliver both security and transformational business insights,” said Peter Strom, President and Chief Executive Officer (CEO), March Networks. He adds, “Organisations can not only reduce theft, fraud and shrink, but gather operational and business intelligence to boost performance and profitability. By offering Searchlight’s video insights in a monthly subscription model, March Networks is meeting increased demand for cloud-based video surveillance-as-a-service (VSaaS), and rapidly growing the services part of our business.” Convenient managed services Searchlight for Retail as a Service includes March Networks’ convenient managed services Searchlight for Retail as a Service includes March Networks’ convenient managed services, where trained professionals monitor each customer’s video network system health and performance, ensuring maximum uptime. Using the March Networks Insight platform, customers gain access to their network information, including device health and warranty information, through a secure web browser. Searchlight and Insight are part of the oil company’s complete end-to-end solution. Command Enterprise Software The end-to-end solution also includes March Networks’ highly reliable hybrid recorders, supporting analog and IP cameras, its Command Enterprise Software for advanced system management and administration, and its SE2 and SE4 Series IP Cameras for crystal-clear video capture. March Networks is partnering with NAVCO, a national electronic security systems integrator and long-time March Networks Certified Solution Partner (CSP), to complete the company’s deployment and provide seamless support for the solution moving forward.
Beginning September 1, 2020, six Vision-Box Automated Border Control (ABC) eGates will greet arriving travellers enrolled in the NEXUS Program at Winnipeg International Airport. As the only international airport in the Province of Manitoba, Winnipeg is an important travel hub for the region, having served close to 5 million aviation passengers in 2019. NEXUS program NEXUS is a trusted traveller program operated by Canada Border Services Agency (CBSA) that expedites border crossings for pre-approved and enrolled Canadian, American, and Mexican citizens. Travellers enrolled in the NEXUS program avoid border entry lines by using specially reserved lanes equipped with identity screening platforms for expedited checks when entering the country from anywhere in the world. Automated Border Control (ABC) eGates ABC eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers The Automated Border Control (ABC) eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers from all international locations using safe and secure automated biometric facial matching. “Finding better ways to serve the needs of travellers is paramount for Winnipeg Airports Authority,” said Barry Rempel, WAA President and Chief Executive Officer (CEO), adding “Adding Vison Box eGates for NEXUS users at Winnipeg Richardson International Airport not only enhances the customer experience but sets the foundation for future innovation and brings us one step closer to seamless, touchless passenger travel.” NEXUS touchless solution This is the first time that ABC Biometric eGates are being deployed to process NEXUS enrolled Travellers, instead of the regularly used NEXUS kiosks. It is also the first NEXUS touchless solution that will improve the border clearance process and give NEXUS travellers a unique convenience at the airport. The deployed GT-11 eGates are part of Vision-Box’s newest generation digital identity systems and will use the latest advances in biometric technology to securely and efficiently clear travellers using digital facial matching. The GT-11 eGates offer a smaller footprint than the previous NEXUS kiosks and are part of a modernising process for a seamless travel journey from curb to boarding at Winnipeg International Airport. Remote installation of border digital identity software This may also be the first time that a complete remote installation of border digital identity software has been successfully attempted and completed. Because of the COVID-19 pandemic that quickly spread across the globe, work at Winnipeg International Airport had to be stopped in February 2020, with only the physical installation of the eGates completed. Software and systems setup The ability to go live with a remote orchestrated installation is a major accomplishment" Logical setup of the software and system testing, prior to going live was then completed entirely from Vision-Box Lisbon headquarters, in close collaboration with Canada Border Services Agency (CBSA), using a dedicated secure connection. By remotely installing a border processing system, Vision-Box proved the feasibility and security of a remote installation process that could lead to far-reaching industry changes and cost-saving measures. “The ability to go live with a remote orchestrated installation is a major accomplishment,” said Miguel Leitmann, Vision-Box’s Chief Executive Officer (CEO), adding “Our team, along with CBSA and members of the Winnipeg Airport Authority worked tirelessly across time zones, with frequent and intense communication, to make this happen. I couldn’t be prouder of this accomplishment and I congratulate all the agencies and people involved in making this project a reality.” Orchestra Digital Identity Management Platform Vision-Box’s Orchestra Digital Identity Management Platform will manage the Nexus border clearance and crossing process. Orchestra manages in real-time the necessary parameters of traveller identification at the crossing point. After the traveller scans their NEXUS member card, a photo is taken of the traveller’s face and a secure identification match is made against the biometric facial information in the traveller’s NEXUS membership profile. This system gives CBSA and Winnipeg International Airport added flexibility with faster dedicated lanes that simplifies the airport border clearance process along the way.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Centre, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Centre (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Centre (RTCC) The Real Time Crime Centre (RTCC) already uses Security Centre to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Centre’s IT department also set up an event-to-action rule in the Security Centre platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Centre, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Centre (RTCC). Bill adds, “We love working with the Genetec Security Centre security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
Lufthansa Technik operates in a special division of the aviation industry, and security is a top priority to safeguard its people, planes and facilities. Over the years, the need to control access to its premises - particularly when it comes to external visitors - has become increasingly more important. A key challenge, however, is that Lufthansa Technik wants to maintain an inviting environment that feels free from restrictions, while also ensuring the highest security standards. Although Lufthansa Technik wants to prevent unauthorised access, it doesn’t want to hinder employees as they go about their day. It’s really important to the business to find the right balance between security and convenience, so people can feel secure but also free as they move around. And employees have a dynamic work environment that supports them in performing to the best of their ability. Unified access control Another key objective for Lufthansa Technik’s new access control system was unification. It has more than 35 locations and 100,000 employees worldwide and, in the past, each site was responsible for its own security. This would sometimes involve hiring specialists to solve the same problems at different locations. Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system Lufthansa Technik wanted to avoid this and ensure not just consistent security standards but a culture of great connection where people can easily network and collaborate wherever they’re based. As a result, Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system and follow the same standardised security policy. Access control system It also wants all employees to be able to use one single Lufthansa Technik badge to access all the locations they’re authorised to access - both locally and internationally. It was a big challenge to begin tackling, particularly when considering the IT challenges of implementing a unified access control system in multiple locations around the world. Lufthansa Technik began its search to find the right access control system by thoroughly researching the market and issuing an in-depth tender to a variety of suppliers. After detailed comparison, it chose Nedap. Melf Westphal, Head of Security Solutions at Lufthansa Technik, explains: “We were really impressed with Nedap’s entrepreneurial culture, hands-on mentality and personal approach. They were really reaching out to us, determined to find out exactly what we need. So we decided to implement Nedap’s AEOS system, which has helped us tremendously in meeting our requirements and creating a single system.” Security with convenience People set free to perform at their best Lufthansa Technik’s goals for its access control also align with Nedap’s people-first approach to providing ‘Security for life’. Nedap believes that a security system should be designed around the people using it, rather than the technology driving it. This ‘Security for life’ concept underline’s Nedap’s desire to free people’s minds from security so they can make the most of each day. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg Which, in turn, mirror’s Lufthansa Technik’s desire to balance security with convenience. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg, where it has 10,000 employees, followed by four affiliate locations. Melf says: “We weren’t sure at first how to go about it. But we got a lot of help from Nedap and their excellent partners, who were a great help to us during the implementation phase." Create tailormade solutions "The pilot project enabled us to overcome two major challenges: how to implement AEOS access control in our IT infrastructure and how to involve our employees. In both areas, Nedap and their partners did a wonderful job,” he continues. “It wasn’t only the really good products they presented to us. With their support, and that of their dedicated partners, they helped us solve all the operational issues." "And through their partner network, they enabled us to create tailormade solutions by offering third party integrations that matched our security demands. It’s meant that instead of barricading ourselves in we have relative freedom of movement. I feel very secure but I can use my badge to go anywhere. We have fantastic solutions and, importantly, the same Lufthansa Technik ID badge connects all of us – no matter where we’re based.” Third-party integrations The AEOS access control system that Lufthansa Technik implemented goes beyond just securing doors; they installed additional components such as key cabinets and visitor management. Melf says: “AEOS was a great help in this respect - it enabled us to bring in third-party providers. As Nedap has an ethos of working closely with third-party technology partners, and AEOS integrates easily with other systems, it means we weren’t restricted to just one solution." "We had the flexibility to create exactly what we wanted. I have a slogan when it comes to our security: ‘We open doors rather than close them.’ That’s really important to me,” Melf Westphal, Head of Security Solutions at Lufthansa Technik. For Lufthansa Technik, a key aspect of the pilot project and subsequent rollout is getting employees on board with the new access control system. Significant investment in training Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment It believes that even the best access control system loses its value if the people working with it don’t have the right mindset. For this reason, Lufthansa Technik made a significant investment in training, communication and awareness campaigns. These focused first on letting employees know how valuable they are, how important security is and why the security changes are being implemented. They’ve also made employees aware of the importance of anticipating security risks and of their own role in Lufthansa Technik’s security management system. Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment. And they’re all trained in how to respond to a security alert and address someone if they see them in a place they’re not supposed to be. New security system Importantly, Lufthansa Technik employees understand that their AEOS access control system is as much about preserving their freedom as it is about locking down their safety. The next steps for Lufthansa Technik are to continue rolling AEOS out worldwide. Melf explains: “The success of our new security system hasn’t gone unnoticed. Other Lufthansa Technik facilities have seen that AEOS has proved itself in practice in Hamburg, in a facility with 10,000 employees." "And we’ve seen an increase in requests for similar systems from facilities all over the world. Our goal now is to implement AEOS in all our locations worldwide, so we can truly build a unified security system that connects the entire Lufthansa Technik family. A security system that allows us to open doors, not close them.”
South Africa conservationist, Brett Barlow needed a robust security solution to protect Munu, a blind, South Western Black Rhinoceros, whose species is critically endangered. FLIR video solution Barlow deployed an all FLIR solution, comprising thermal cameras, visible cameras and an NVR, for around-the-clock monitoring, early detection and real-time response. FLIR technology has played an instrumental role to protect Munu’s life and livelihood. Throughout the 20th century, big-game hunters, settlers and poachers have decimated Africa’s black rhino population. In the early 1970s, there were approximately 65,000 black rhinos, and by 2018, that number was reduced to 5,630. In 2020, there are three remaining subspecies of the black rhino, one of the most vulnerable being the South Western Black Rhinoceros, also known as Diceros bicornis bicornis, of which there are only 254 left in South Africa. FLIR thermal and visible security cameras deployed Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes Munu, a 20-year-old blind male rhino, is one of these critically endangered species. When Munu was in danger, South Africa conservationist, Brett Barlow stepped in to save Munu’s life. Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes, detecting threats, increasing safety and enhancing his overall quality of life. In 2019, rangers working at a South African National Park found a black rhino walking in circles and visibly disoriented. They knew they had to do something. After safely tranquilizing him, an ophthalmic surgeon confirmed that the rhino, known as Munu, had suffered two detached retinas and was completely blind, likely as a result of disputes with other rhinos in the area. Protecting endangered rhino, Munu As soon as he heard about the situation, renowned South African conservationist, Brett Barlow spoke with the South African National Park and offered to permanently house and protect Munu. “Every rhino matters,” Barlow adamantly affirmed, adding “You wouldn’t put down a blind child, so why would you put down a blind rhino?” The South African National Park later transferred Munu to Barlow’s care. However, Barlow wasn’t the only one who wanted to help Munu. Relocating Munu to the Mantis Founder’s Lodge Adrian Gardiner, globally renowned conservationist famous for founding the Shamwari Game Reserve and the Sanbona Wildlife Reserve in South Africa, extended the invite for Munu to stay on one of his properties, the Mantis Founder’s Lodge. Wasting no time at all, Barlow relocated Munu to the lodge, knowing it would increase his quality of life. The property, spanning 850 hectares, is home to five white rhinos, as well as other animals, including a zebra and giraffe. The White Lion Foundation, in which Gardiner and Barlow are both executive board members, donated funds to construct Munu’s boma, comprising a secure covered boma and a five-hectare open grazing area. American Humane funding Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats Additional support came from a local internet provider, who donated free internet services for the project. American Humane, a non-profit organisation committed to ensuring the safety, welfare and well-being of animals, funded one year of feed for Munu. All donations for Munu go directly to the project with no administration costs deducted. Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats because of his highly valuable horn. He remained a prime target for illegal poaching. Much of Munu’s horn was removed to protect him, but the amount of horn that remained is still worth thousands of dollars. Experts say that one pound of rhino horn is worth at least US$ 3,000 universally and ten times that, on Asian black markets. Thus, even with much of his horn removed, Munu was still in danger. Self-harm was a risk should Munu charge into the boma. Munu’s next door neighbour, Rodney, a white bull rhino, was also a concern should a territorial fight occur. For all these reasons, Barlow looked for ways to enhance Munu’s safety. Video surveillance for enhanced security Previously, the Mantis Founder’s Lodge employed two guards for Munu’s security. However, Barlow believes guards should only be a second line of defence, a visual deterrent that responds to threats. “I wanted to go down to the electronic security system route,” Barlow said, adding “Technology doesn’t sleep.” The first security manufacturer Barlow hired charged high prices for their security products. More than this, once installed, Barlow discovered that these devices were unable to deliver quality images in extreme weather conditions, such as mist or rain, both of which are commonplace at the Lodge. As such, he decided Munu’s security required for a more robust and reliable video security system. In 2019, Wilke Pretorius, Distribution Sales Manager for Sub Sahara Africa at FLIR Systems, was working with Brett Barlow on a separate project. When Barlow told Pretorius about Munu, Pretorius informed the FLIR team who immediately got involved. FLIR end-to-end video surveillance system FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras, in order to protect Munu from poachers. FLIR’s powerful thermal and visible imaging cameras deliver intrusion detection at much longer ranges and complete, 24-hour perimeter protection, regardless of weather conditions. "Other camera manufacturers don't compare. Their cameras can't see through mist or rain. FLIR delivers images 24/7, rain or shine, darkness or light,” Barlow said, adding “technology like FLIR thermal cameras allow for early warnings for perimeter breaches. Even though rhinos have weak eyesight, without any sight, they are basically defenceless. So, in essence, FLIR became Munu’s eyes.” Beyond FLIR’s high-performing technology, Barlow loved working with the FLIR staff. Barlow said, “What drew me to FLIR were the people involved. Wilke and the rest of the FLIR team have been so passionate and resourceful, always available and willing to help when issues arise.” “When I started working at FLIR, Chief Executive Officer (CEO) Jim Cannon said our mission is to save lives and livelihoods,” Pretorius explained, adding, “These words stuck with me. Working on the Munu project, it was clear that saving lives and livelihoods are indeed a passion of FLIR employees. I am proud to be a part of a company so eager and passionate to produce solutions and technology that make a positive impact in the world.” Installation of FLIR cameras Installing the new security system was not an easy task. Merely two days prior to the arrival of FLIR cameras, in March 2020, South Africa was ordered into an immediate lockdown, due to the COVID-19 pandemic. But Barlow was eager to begin the installation process, so he set out to do it himself. By early May 2020, a two-person crew had manually dug over 600 meters of trenching to run cable and conduit through the lodge’s hard African soil. Barlow also installed a solar array to power the system. He cut bushes, installed polling and connected the entire system to FLIR’s central network video recorder (NVR), to view the camera feeds both inside and surrounding Munu’s boma. The result is a fully functioning, comprehensive video security system. FLIR Elara FB-Series ID thermal security cameras deployed Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system based on a two-tier model. The perimeter is shaped as a big triangle about 110 yards away from the boma enclosure. Six FLIR Elara FB-Series ID thermal security cameras, which use onboard analytics to classify human or vehicular intrusions, are installed to monitor the outer perimeter or the first tier. There are also 11 Ariel Full HD IP Bullet cameras deployed, which deliver 1080p video for high motion, complex and low-light scenes. FLIR Saros Dome DH-390 cameras deployed For effective surveillance of Munu’s boma, six FLIR Saros Dome DH-390 cameras, designed to deliver actionable alerts and alarm data, surround the enclosure. One FLIR Saros DM-Series camera is mounted inside the boma to capture every minute detail of Munu’s movement in all conditions. To manage the video from all the cameras, FLIR also supplied its Meridian TM product, a compact, all-in-one network video recorder (NVR), specially designed to support dozens of channels. Meridian also features a FLIR United VMS EZ Client web interface, which simplifies viewing capabilities and saves the cost of additional workstations. Powering, processing and managing this system are six edge servers, FLIR’s USS Edge Appliances, containing 12TB of storage and preloaded with United VMS software, built to seamlessly manage multiple, varied devices. Heightened perimeter protection Thanks to FLIR’s technology, Barlow is confident that Munu can be an ambassador for his species. He hopes Munu’s story may inspire future conservancies around the world to partner with manufacturers, like FLIR, for heightened perimeter protection. Case in point, actress Shannon Elizabeth, founder of the South Africa-based Shannon Elizabeth Foundation that is focused on wildlife conservation, was deeply moved by Munu’s story. She later asked Barlow to participate as an advisor to her foundation’s Ranger Relief Fund. Importance of early warning technology FLIR could prove invaluable to the efforts of rangers all over the African continent to protect endangered animals" In a time where conservation funding is down because of declining tourism due to the COVID-19 pandemic, the Ranger Relief Fund supplies money and much needed equipment to ensure conservation first responders remain employed and properly resourced. With early warning technology being more critical than ever, the need for conservancies to partner with technology manufacturers like FLIR is urgent. “FLIR could prove invaluable to the efforts of rangers all over the African continent to protected endangered animals,” Barlow explained, adding “With Munu being the proof point, FLIR could be more than Munu’s new eyes, but indeed the eyes of an industry desperate to protect the world’s natural heritage from the burgeoning poaching crisis.” Picking the optimal security solution When asked what advice Barlow would give to other conservancies considering similar security technologies, he said “Speak to the right people. Make sure you talk to someone who understands the product. See the solution in action. View a live site and see how it works. Work with the right people to implement that for yourself.” The longer Munu lives, the more good he’ll do. Barlow plans to expand Munu’s boma, once he has acclimatised to his new home. And he has already begun using the FLIR Saros DM-Series’ live stream capabilities to invite learners around the world to observe Munu up close. The plan for Munu is to mate with a female within his own subspecies, thereby directly contributing to the survival of his kind. If Munu does sire a calf, Barlow plans to donate the calf back to the South African National Park that Munu came from to help with the genetic diversity for the reserve. The future for Munu is bright and, with his new eyes, he will see through to the end.
Round table discussion
“Open systems” has been a security industry buzzword for decades, although reality has sometimes diverged significantly from the ideal. The current state-of-the-art in open systems provides a multitude of benefits to increasingly complex physical security systems. We asked this week’s Expert Panel Roundtable to elaborate: What is the impact of open systems on physical security?
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasising systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Security systems: Manufacturers & Suppliers
- Dahua Technology Security systems
- Vicon Security systems
- Vanderbilt Security systems
- Seagate Security systems
- Bolide Security systems
- ComNet Security systems
- Bosch Security systems
- VIVOTEK Security systems
- MobileView Security systems
- Videotec Security systems
- Hanwha Techwin Security systems
- Sony Security systems
- HID Security systems
- LILIN Security systems
- OT Systems Security systems
- BCDVideo Security systems
- MOBOTIX Security systems
- DSC Security systems
- CEM Security systems
- TESA Security systems