Fugue, the company helping organisations innovate faster and more securely in the cloud, announced support for AWS CloudFormation in Regula, the open-source infrastructure as code (IaC) policy engine. Cloud engineering and security teams can now use Regula to secure their AWS CloudFormation and Terraform configurations before deployment and apply those same rules to running cloud environments using the Fugue platform to secure the entire cloud development lifecycle. Expanding Regula capabiliti...
According to a recent wide-ranging article on data security in Computer Weekly: “physical security is key to maintaining the resilience and effectiveness of data centres… businesses end up exposing themselves to a range of risks in this area of security is ignored.” A lack of investment in the physical security of servers undermines the cyber-security of data assets and vice versa. Appropriate physical security controls manage risk by minimising unauthorised access to server...
Checkpoint Systems, a vertically integrated supplier of RFID solutions for retail, has again demonstrated its commitment to innovation by becoming the first manufacturer to have an RFID inlay, featuring the new NXP UCODE 9 IC certified by Auburn University’s ARC Laboratory. Impinj M700-based RFID inlays The exciting announcement follows news that Checkpoint Systems recently became the first company to achieve ARC certification for its Impinj M700-based RFID inlays. By setting another ne...
Check Point Software Technologies Ltd., a provider of cybersecurity solutions globally announced the launch of Check Point Cloud Academy in partnership with its Platinum Elite ATC Partners - Arrow Electronics, Red Education, and Westcon Security. Check Point Software is the first security solutions provider to address the knowledge gap in the industry by offering a dedicated certified education program specialising in cloud security globally. Opportunities for professionals Open to Check Poin...
LenelS2 introduced its indoor location subscription-based service for businesses and other organisations using LenelS2’s BlueDiamond™ mobile app version 2.1.8 for smartphones. Touchless solutions This new premium mobile app service complements LenelS2’s touchless access solutions by providing users with: the ability to quickly pull up a map to determine the current location within a building, search for points of interest, use turn-by-turn directions for efficient navig...
ASSA ABLOY Group brands Corbin Russwin and SARGENT announce the release of their highly anticipated premium bored lock that is certified to surpass ANSI/BHMA Grade 1 requirements, making it ideal for use in some of the most challenging environments. Marketed as the Corbin Russwin CLX3300 Series and SARGENT 10X Line, the lock offers superior vandalism resistance as evidenced when it successfully maintained egress in the face of more than 3,100 in-lb. locked lever t...
Ping Identity, the Intelligent Identity solution for the enterprise, has centralised Identity Access Management (IAM) for over 300,000 DB Schenker employees, contractors, partners, and customers. The successful project, conducted in partnership with iC Consult, streamlined the management of critical security policies and enhanced secure access and authentication to business applications. Secure authentication service DB Schenker is one of the world’s leading global logistics providers, with 2,100 locations and more than 76,900 employees across the world; it supports the exchange of goods through land transport, worldwide air, and ocean freight. After identifying the need for a more secure and modern authentication service, DB Schenker saw an opportunity to accelerate a digital transformation initiative and provide more streamlined access to resources for its workforce, partners, and customers. Expanding IAM “The goal was to extend our existing identity and access management (IAM) infrastructure to secure employee access and take advantage of the cloud,” said James Naughton, Head of Identity Management at DB Schenker. “In the past, we needed to invest significant time and resources to develop integrations, but now we simply configure the system and can deliver technically complete interaction in 30 minutes, decreasing effort by 75%.” Centralised identity management DB Schenker used Ping Identity to deliver a consolidated and centralised identity management service Working closely with iC Consult, IAM consultant, and systems integrator, DB Schenker used Ping Identity to provide the authentication and authorisation capabilities needed to deliver a consolidated and centralised identity management service. The project utilised PingFederate, PingAccess, PingID, PingOne, and PingDirectory, impacted over 300,000 identities, and involved the migration of 50 business applications to the new authentication service. Two-step authentication “DB Schenker’s identity team can now centrally manage critical security policies and control access and authentication to their applications,” Naughton explained. “The addition of FIDO2-enabled risk-based two-step authentication allows us to provide an even higher level of security for access to the DB Schenker IT landscape, creating peace of mind for both our team, partners, and customers.” Identity journey “This is only the beginning of the identity journey for DB Schenker,” said Emma Maslen, VP, and general manager of Ping Identity, EMEA & APAC. “We will continue to seek new ways to push the boundaries of identity and provide MFA to every employee to improve workforce productivity.”
The Security Industry Association (SIA) has launched a new course to help industry professionals prepare to take the Certified Security Project Manager (CSPM) exam. The new CSPM Review Course expands SIA’s CSPM offerings; it will be offered virtually and will be taught by CSPM-certified instructors with extensive experience in security project management. Course coverage The course covers the key areas of knowledge and topics tested by the CSPM exam, shares strategies on how to prepare for the exam, and gives course participants a chance to ask the instructors specific questions. Course registrants will also receive a CSPM Review Course Student Workbook that provides reference materials, a study plan worksheet, educational content on domain-specific knowledge, and insights into the test-taking experience. Industrial certification course The CSPM is a highly respected industry certification that demonstrates that the credential holder can manage complex, technical security projects. CSPM is a highly respected certification demonstrating that the credential holder can manage complex, technical security projects It is often earned by security integration professionals, consultants, security managers, and other practitioners and professionals who are regularly providing oversight and support on security projects. Preparing for CSPM exam While taking the new CSPM Review Course does not guarantee success on the exam, SIA Director of Learning and Development Dr. Elli Voorhees said the course was designed to match the needs of many SIA members who have asked for a course that prepares them for the CSPM exam. “Unlike our SPM training courses, which dive deep into explaining key concepts and best practices associated with leading technical security projects, the CSPM Review Course aligns succinctly with the certification exam blueprint,” said Voorhees. “Participants customise a plan of study based upon their own self-assessment and focus on the areas where they may need improvement using the resource guides provided.” CSPM review course The first CSPM Review Course will be offered May 18-20, 2021, from 4-6 p.m. EDT each day. Registration is $595 for SIA members, and the course will be taught by Rex Allen of Allied Universal Technology Services and Brendan McFall of Northland Controls. Full course details can be found here. The new CSPM Review Course rounds out a full complement of SIA’s Security Project Management (SPM) courses. Additional courses include the Basics of SPM Course and the full SPM Training Seminar. Basic and Full SPM The Basics of SPM Course provides 10 hours of education and teaches the fundamentals of managing security projects; it has proven especially valuable for new project managers in the security industry and those aspiring to project management roles. SIA will also be offering remote, virtual test-taking for the CSPM exam The full SPM Training Seminar is a 20-hour in-depth course that provides extensive learning on security project management and is often attended by project managers, lead technicians, and program managers at security integration firms, in addition to corporate security and government security practitioner teams. Virtual courses and tests All SPM courses are live, instructor-led courses that are offered virtually. An on-demand version of the Basics of SPM course is also available on SIA’s website, and information on all courses and a current schedule of course dates can be found on the SPM page. Nearly simultaneously with the launch of the new CSPM Review Course, SIA will also be offering remote, virtual test-taking for the CSPM exam starting May 1. For details on how the new remote CSPM exam testing works, please contact SIA Associate Director of Certification Katie Greatti.
Hanwha Techwin, a global supplier of IP and analogue video surveillance solutions, has announced the immediate availability of a new range of easy to install and affordable Public View Monitors (PVMs) designed to help retailers deter crime. Wisenet PVMs The new Wisenet PVMs offer a complete built-in SSL-connected 2-megapixel camera, eliminating the need for system integrators to install and connect a separate supporting camera. With a choice of 10”, 27”, and 32” (inches) monitors, the three new PVMs can be easily placed at store entrances, shopping aisles, cash registers, or self-service checkouts. Public view monitors can serve as a strong deterrent to illicit behaviour" “Public view monitors can serve as a strong deterrent to illicit behaviour,” said Ray Cooke, Senior Vice President, Products, Solutions, and Integration, Hanwha Techwin America, adding “Our new line of PVMs has been designed for ease of installation so they can be quickly deployed across a large number of stores.” Supported by Wisenet WAVE VMS and NVRs Aside from deterring crime, the new PVMs can also display other important information, such as customised on-screen messaging to indicate a recording is in progress, as well as supplier commercials, own-brand product promotions, and special offers, by making use of the monitors’ SD/SDHC/SDXC slot, which can facilitate up to 256GB of data storage capacity. Supported by the Wisenet WAVE video management platform (Wisenet WAVE VMS), as well as Wisenet NVRs (Network Video Recorders), the ONVIF-conformant Public View Monitors can be programmed so that images captured by the cameras are either continuously recorded or when prompted to do so, by built-in face or motion detection video analytics. Face and motion detection activation The face and motion detection feature can also be configured to switch the display to ‘live’ view to make people aware they are being watched, as they will be able to see themselves on the monitor as they enter a store or walk down a shopping aisle. The display reverts to the slide show after a specified number of seconds. The PVMs can be integrated with tagging (EAS) systems to record images of people, who might be leaving the store with stolen items. Video evidence Public View Monitors will continuously stream images to a control room, where they can be viewed via VMS Regardless of whether they are displaying live images or a slide show, or the monitor has been turned off by someone using a remote control, the Public View Monitors will continuously stream images to a control room, where they can be viewed via video management software (VMS), as well as continue to be recorded on an on-site or remotely located NVR. The ultra-low light capabilities of the new PVMs, together with Wide Dynamic Range (WDR) technology performing at up to 150dB, enables the built-in camera to capture clear and sharp images in strongly contrasting light conditions, at store entrances, for example, where strong sunlight may be streaming in. Power over Ethernet (PoE+) All three Public View Monitors (PVMs) can be powered by 12V DC power supply, with the Wisenet SMT-1030PV also offering the option to utilise Power over Ethernet (PoE+), if there isn’t an existing power supply close to where the Public View Monitor is being installed. A single cable of up to 325 feet is all that is needed to provide power to the SMT-1030PV and for network communications. The three new Wisenet PVMs, which can be mounted by using standard VESA brackets, are as follows: SMT-1030PV: 10” monitor with LED backlight and 1024 x 600 display resolution. SMT-2730PV: 27” monitor with LED backlight, HDMI input, and Full HD display. SMT-3230PV: 32” monitor with LED backlight, HDMI input, and Full HD display.
The team was building and designing a new website with improved content and features. The main addition being a new product listings functionality which includes: Full product hardware specifications 360° product images 3D product models A downloadable set of manuals, data sheets, and documents Product videos Improved product search database Plus new and improved sections and information throughout. The company will be evolving its website, adding new product lines, and further developing the AMG brand along the way.
Johnson Controls, a global company for smart, healthy, and sustainable buildings, announced that its chairman and CEO George Oliver has been invited by U.S. President Joe Biden to participate in the virtual Leaders Summit on Climate. Addressing climate crisis The summit will bring together leaders of the world’s major economies and other vital partners for an urgent and open dialogue on ways to strengthen collective efforts to address the climate crisis. President Biden has made tackling climate change a top national priority since taking office and is urging other world leaders to attend the summit to discuss how their governments will help drive the goal of limiting global temperature rise. Roadmap to a low-carbon economy Transitioning to a lower-carbon economy is an opportunity to build back better, as we recover from the COVID-19 pandemic “I am honored to accept President Biden's invitation to join him and other world leaders calling for urgent climate action. It is especially important to establish a roadmap to limiting the rise of global temperatures as we get closer to the COP26 climate conference scheduled for November in Glasgow,” said George Oliver, chairman, and CEO, Johnson Controls. “Transitioning to a lower-carbon economy is an opportunity to build back better, as we recover from the COVID-19 pandemic. Providing clean, sustainable, and energy-efficient solutions creates jobs while building strong, resilient, global economies.” Clean energy economy According to the White House, a major theme of the summit will be the broad economic benefits of climate action, with a strong focus on job creation. This will explore both the economic benefits of green recovery and long-term decarbonisation and the importance of ensuring that all communities and workers benefit from the transition to a clean energy economy. Representing Business Roundtable and Johnson Controls, Oliver will address these topics in a session on April 23 as well as the role buildings can play to slash both emissions and costs. Promoting eco-friendly future Business Roundtable is an association of chief executive officers of America’s leading companies. Oliver was named chair of the Business Roundtable Energy & Environment Committee in January 2021. The Committee is dedicated to advancing policies that encourage innovation and support an environmentally and economically sustainable future. Reducing carbon emissions The vast majority of Business Roundtable’s 223 member CEOs have made public commitments to reduce their companies’ greenhouse gas emissions/carbon footprints, are making serious progress, and reporting on it publicly. Nearly half of those commitments are for net-zero carbon emissions by 2050, if not sooner. Business Roundtable members are playing a significant role in driving ambitious climate action and the policy needed to spur low-carbon economic growth. Last September, the organization endorsed the goals of the Paris Agreement and proposed aggressive policies to achieve those goals. Commitment to cut emissions Johnson Controls believes its OpenBlue platform for optimizing building sustainability will be central to fulfilling its goals Johnson Controls' own ambitious emissions reduction targets were recently approved by the Science Based Targets Initiative – an independent organization that assesses corporate sustainability claims. As part of its environmental sustainability commitments, Johnson Controls aims to cut operational emissions by 55 percent and reduce customers’ emissions by 16 percent before 2030. Johnson Controls believes its OpenBlue platform for optimizing building sustainability will be central to fulfilling these goals and ultimately creating an environment for healthy people, healthy places, and a healthy planet. The climate pledge The company also recently joined the Business Ambition for 1.5°C campaign and is a signatory to The Climate Pledge, an initiative of business leaders co-founded by Amazon and Global Optimism. Signatories to the pledge commit to reaching net-zero carbon emissions by 2040 – ten years ahead of the Paris Climate Agreement goal.
Atos announced it has reached an agreement to acquire Ipsotek, an AI-enhanced video analytics software provider. With this acquisition, Atos, already a major player in Edge AI/ML and more specifically Edge Vision will strategically reinforce its leading position in Edge and Computer Vision by adding key software capabilities and IP to its solutions portfolio. VISuite by Ipsotek VISuite provides multi-camera tracking capabilities, enables users to efficiently manage alerts in real-time Established in 2001 and based in London, Ipsotek offers a scalable AI platform, VISuite, that enables users to efficiently manage automatically-generated alerts in real-time, and can be used across a range of use cases including crowd management, smoke detection, intrusion detection, perimeter protection, number plate recognition, and traffic management. VISuite also provides multi-camera tracking capabilities. The company has executed more than 600 projects in 38 countries. The acquisition will add a highly skilled team of approximately 50 professionals to Atos. Creating a new standpoint Atos and Ipsotek’s combined capabilities will create a unique proposition across the entire value chain for the public sector, retail, manufacturing, transportation, and critical infrastructure sectors and make them a partner of choice in the computer vision market. Strategic collaboration “With this strategic move, Atos is reinforcing its leading position in Edge and Computer Vision and complementing its existing end-to-end offering in Edge AI/ML. Ipsotek’s extensive experience, its highly skilled experts, and powerful product suite will strengthen the Atos teams and create a truly unique offering on the market,” said Pierre Barnab, Senior Executive Vice President, Global Head of Big Data & Security at Atos. “We are excited to join forces with Atos and are confident that our combined capabilities offer significant value to our respective clients. We look forward to creating a great success story together,” said Boghos Boghossian, CTO, and Co-founder of Ipsotek. The closing of the transaction is expected to take place in Q2 2021.
The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and centre on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol. This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilising system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralised location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.
The Hugs Infant Protection Solution tracks the location of babies and provides protection anywhere the infant may be transported Wireless tracking and radio frequency identification (RFID) continue to improve dramatically in range and reliability, allowing Real-Time Location Systems (RTLS) pinpointing people, places and things with impressive accuracy. Systems integrator Advance Technology Inc. (ATI), Scarborough, Maine, recently installed a comprehensive, hospital-wide solution at the newly opened Boston Medical Center’s (BMC) Women and Infants Center to provide detection and protection for newborns throughout the facility. The web-browser based system from Stanley Healthcare called the Hugs® Infant Protection Solution is based on the AeroScout® Wi-Fi RTLS platform and MobileView® software. Rob Simopoulos, president of the security and audiovisual managed services firm, said ATI worked in tandem with the Department of Public Safety’s Luigi Martiniello, Assistant Director of Operations and Public Safety, IT Department, Stanley Healthcare, hospital personnel and other stakeholders to install the solution successfully on the hospital’s Wi-Fi network. The installation is one of the first in the New England region. “It’s a full deployment, meaning it tracks the location of babies and provides protection anywhere the infant may be transported, instead of being confined to areas limited to hardwired receivers and repeaters common to other infant protection systems,” said Simopoulos. “It was our first deployment – a highly IT-centric solution that required certification and training by our skilled technicians prior to installation.” In alarm, when an unauthorised person tries to leave the area with a protected child, magnetic doors lock down instantly and hold specified elevators Quick access to location of tagged infants Nurses, administration and other hospital personnel have immediate access to the location status of tagged infants through PC or mobile devices via the MobileView enterprise platform, which serves as the graphical user interface (GUI) for scheduling, control, history and alerts. They can easily place tags into transport mode when an infant needs to leave the floor, but still track the location of these patients ongoing in real-time wherever they travel. Bob Gilbert, ATI’s remote technical support supervisor, said the reliability and integrity of the solution is extremely robust, with tags transmitting every 10 seconds. During installation, which was completed in a fast turnaround of several weeks, ATI used heat-mapping capability to ascertain the density of Wi-Fi access point coverage and assimilate effective distances of RF signals from the tags. The installation included two dedicated, high-availability servers for redundancy and back up. The MobileView platform is installed in the Public Safety Department’s Command and Control Center and integrates with Lenel by United Technologies OnGuard Security Management System. Other highlights of the security installation: The system integrates to all door contacts, access control readers, audible alarms and elevator controls. Exciters, which also act as access points, are installed at every entrance/exit point and work independently should they lose network connectivity, allowing the doors to still lock down in alarm. ATI worked closely with the elevator contractor to implement input controls to prevent the elevator door from opening if a tag is sensed at the door. The access control system also will not unlock if an infant tag is present on the other side of the opening, even when a valid proximity badge is presented. The solution may also be deployed for asset tracking and management, with ATI looking to incorporate that functionality in the near future In alarm, when an unauthorised person tries to leave the area with a protected child, magnetic doors lock down instantly and hold specified elevators. The system can integrate with hospital communication and information systems, strobe lights, sounders and audible devices and video surveillance cameras to capture and view images before an exit alarm occurrence. The solution may also be deployed for asset tracking and management, with ATI looking to incorporate that functionality in the near future. Real-time location system improves protection and detection status “Our goal is to continue to learn and embrace new technology to provide our customers the best protection and detection,” continued Simopoulos. “Providing the hospital with the ability to achieve real-time status and location of system tags beyond the mother-baby unit is critical. Nearly 20 percent of hospital abductions in the U.S. happen outside this area, according to the National Center for Missing and Exploited Children. In the past, once infant tags left the range of proprietary receivers in the protected area the infant’s whereabouts became unknown.”
Interest in mass notification systems appears to be growing in the security community as a response to active shootings and workplace violence 2014/2015 Boon Edam Review and Forecast: The security industry seems very healthy and continues to experience solid growth. We have observed an increased level of corporate and government expenditures, which allows for expanding security upgrades in general. Looking ahead to 2015, I see interest in mass notification systems appears to be growing in the security community as a response to active shootings, workplace violence, etc. Workplace incidents are getting more coverage in educational sessions and the media. We are investigating how our entrances can be involved in an overall solution. We expect this interest to expand and proliferate into the next decade. When it comes to physical security entrances, customers are demanding a more consistent set of solutions from their providers and they are consolidating their suppliers. They want vendors that provide multiple parts of the whole system and offer an excellent service level on all counts. Vendors that can do this will be clear winners in the long term with large customers. If a manufacturer provides only a subset of entrance solutions; for example, turnstiles, which deter unauthorised entry or traffic control, but that vendor doesn’t also offer security doors that absolutely prevent tailgating or piggybacking, they can only satisfy certain installations or silos within large organisations. We are fortunately able to offer different security entrance products to different silos within the same end user organisation. We are thus providing multiple solutions to the various parts of their business. Boon Edam has been able to fully meet those varied needs with our breadth of product range and with our expanding sales team that can better reach the various stakeholders within these customer organisations. For 2015 and beyond, we have continued to react to and expand operations and capabilities of the organisation to accommodate the unprecedented growth of revenues and numbers of customers in the last three years. We’re bullish about the continued growth of physical security entrance usage within the security industry and anticipate demand for applications such as ours will continue to grow at a rate faster than the security industry as a whole. See the full coverage of 2014/2015 Review and Forecast articles here
GMB has struck a deal with Securitas to become the first security provider to sign up for the union’s ground-breaking disability passport. The passport- developed by GMB and the TUC - is a straightforward, worker-owned process, that removes the stress and uncertainty many disabled workers face around reasonable adjustments. Securitas employs 355,000 people in 48 markets including more than 9,000 UK Employees. The move will mean all staff will be covered by the policy - which agrees the adjustments for employees with disabilities need to stay in work. Disability passport Securitas first security employer to sign up to life-changing reasonable adjustments disability passport Nell Andrew, GMB National Equality and Inclusion Officer said, “GMB commends Securitas for making this potentially life-changing commitment for their disabled staff. We believe this passport will promote dignity and highlights the value of disabled workers' work." "Disabled workers want the opportunity to thrive in the workplace - not just survive and we believe this short policy, will go a long way in achieving this.” Supporting disable workers Sarah Hayes, HR Director, Securitas Security Services UK, said, “We are delighted to be working in partnership with the GMB to support any employee with a disability and who may need help to thrive in their work." "The disability passport will help us make sure we make any reasonable adjustments an employee may need in the workplace environment, whether it be removing physical barriers or providing additional support. This fantastic initiative is one of a number of tools we are using to help us be a more inclusive employer and develop the expertise and diversity of our people.”
82% of schools and colleges in both the US and Northern Europe see a potential role for CCTV/video monitoring systems in supporting a safe return to face-to-face teaching in school buildings and across further education college campuses, following the pandemic. Many schools and colleges have already adapted their video monitoring systems. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 12 months. Video monitoring systems The AVA Security Education Sector Security Survey provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 12 months. Safe-specific video analytics Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the next year. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels in retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 12 months. Contactless access control The education sector is a deployer of facial recognition analytics in existing cameras Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 12 months. However, the education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22 percent of schools and colleges have deployed facial recognition to date, although this is set to more than double as 29% over the next 12 months. Reduced VMS costs The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely in 2021. Cybersecurity has become a key IT priority As IT, Operations, and Security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few weeks, the University of Hertfordshire experienced a major cyberattack which led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely’ that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. Smarter, easier to use video systems There was some disquiet about the quality of existing video systems’ core capabilities, the Ava Security research found. For example, 29% thought it was a ‘High Priority’ to improve the speed of finding and retrieving video evidence after a security or safety incident. A further 40% saw it as ‘Somewhat a Priority’ to improve the systems’ retrieval capabilities to find ‘required footage of incidents easier and quicker. It currently takes too long.’ Further, 22% saw the need for ‘better integration between video monitoring camera systems and other security-related systems, such as access control or alarm systems’ as a ‘High Priority’, while over half (57%) saw wider security systems integration as ‘Somewhat a Priority’ now. Nearly two-thirds (66%) of video monitoring system decision-makers in the education sector were keen to make their video monitoring systems ‘more intelligent, using video analytics to support better post-event decision-making’ – placing this improvement as either a ‘High Priority’ or ‘Somewhat a Priority’. Cloud on the horizon 73% of the education sector is experiencing accelerated cloud migration Others were more focused on Cloud Migration of more IT Systems. Over half (51%) confirmed that their cloud migration plans had been accelerated in 2020/21 and a further 32% confirmed that a new budget had already been allocated for moving more services into the cloud in the financial year 2020/21. That means that altogether (net) 73% of the education sector is experiencing accelerated cloud migration. Linked to this, the same study uncovered that 58% found ‘adoption of Video Surveillance as a Service (VSaaS) i.e., moving their video monitoring system into the cloud’, as a ‘net priority’ for improving and optimising their video monitoring systems looking forward. VSaaS selection criteria For the 82% of all education respondents actively considering VSaaS options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS right now, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people’. Third-party cameras While 24% of education sector decision-makers considering VSaaS, said it was critical that the provider was not headquartered in mainland China. A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment.' A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Latest analytic capabilities An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling etc), people and vehicle search, object searching and colour searching’. Balance of power The Ava study also explored whether the events of the last year had prompted changes in terms of who looks after the management of video monitoring systems. There was some evidence in the education sector that as CCTV has increasingly been migrated onto the network, IT departmental control is increasing. According to the study, nearly a third (31%) of schools and colleges’ video systems passed more control of their video monitoring systems to their IT department – taking the total percentage of video systems run by IT in the education sector to 39%. However, security and/or facilities management still holds the balance of power in the running of these systems with 50%, with 24% gaining responsibility for video monitoring during the pandemic. Only 4% of systems confirmed they had fully outsourced video system management and 7% confirmed that more of the management, upgrading, and running of their systems had been outsourced over the last year. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimising the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection There is a strong determination to adapt existing school surveillance systems to new COVID-safe requirements" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Cloud Connector Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
As the Jigme Dorji Wangchuck National Referral Hospital (JDWNRH) works round the clock, one of the major concerns was to manage complex shifts of employees. Lift control, where only users with access rights can call the lift, was another challenge the hospital wanted to meet. Furthermore, the customer also wanted a solution, with the help of which the admin could assign entry and exit points for patients, visitors and employees. Lastly, the management wanted to restrict visitor entry to a pre-defined time and rooms of the hospital for better visitor management. Access control solutions Matrix’s Access Control, Time-Attendance, and Visitor Management Solution along with the different variants of biometric devices fulfill every requirement of this renowned Hospital. Around 206 devices were installed in the hospital that is used in controlling access at rooms and elevators. Devices were installed at the main entrance, wardrooms, server rooms, outside elevators, and ramps on every floor to restrict access. So, there is no individual in the building who is not enrolled in the system. As the hospital works 24 hours, there are multiple shifts in which the employees work. Through this, the hospital could manage multiple shifts of employees. Approximately, 700 visitor profiles were created with constrained time to visit, limited rooms to enter, and a pre-defined route of access. Also, the crowd at the elevator was controlled by restricting the use to only users with elevator access rights. Results JDWNRH fulfilled its requirement with Matrix People Mobility Solution and achieved the following results: Improved security by restricting un-authorised entry using an access control solution Reduced complexity of shifts by time-attendance solution Crowd controlling through elevator access control Time-based and Zone-based entry restrictions for visitors and patients
Cybersecurity services company Bridewell Consulting enhanced the security of the upcoming 2021 Census programme after following a stringent review process. Bridewell was enlisted by the Office for National Statistics (ONS) and the Northern Ireland Statistics and Research Agency (NISRA) to perform the Independent Information Assurance Review (IIAR) which took place between September 2020 and January 2021. Securing the risks The purpose of the assurance review was to identify any security risks to Census systems, services and information, and to present an independent view of security maturity to stakeholders. Bridewell also produced a public report to assure the nation adequate measures are in place and encourage members of the public to complete the Census. The Census is a nationwide survey that takes place every 10 years and must be completed by every household. The data collected in the survey builds a picture of all the people and households across the UK to help organisations make decisions on planning and funding public services including transport, education, and healthcare in each area. The 2021 Census survey will take place on 21st March. Security assurance review Bridewell previously delivered the assurance review for the Census rehearsal in 2019 and was selected to undertake the review of the 2021 Census following a formal tender process. Bridewell engaged with the ONS, NISRA, and their trusted partners over three months to ensure that a thorough and robust review into every aspect of the programme was completed effectively. ONS has developed strong security measures to safeguard submissions but we did not want citizens just to take our word on this The assurance review took a three-phase approach, covering governance and management, operational security, process and design, and security assurance. Andy Wall, Chief Information Security Officer at the Office for National Statistics comments, “The protection of citizen information collected in the Census is critical. ONS has developed strong security measures to safeguard submissions but we did not want citizens just to take our word on this." Security Assessment Criteria "It was very important for us to test our approach and measures and so we wanted an independent view. A specialist organisation like Bridewell, which has the expertise to look under the bonnet of the Census and assess the detail of what we have built, was very valuable.” The assessment criteria comprised of a range of selected controls, outcomes, and good practice from security industry recognised control frameworks to ensure the assessment was not confined by one singular framework. This included ISO27001, the Cyber Security Framework, the Open Web Application Security Project Software Assurance Maturity Model, the UK Security Policy Framework, NCSC principles, and other guidance. Implementation of assessment In total, Bridewell shared 21 findings in review which were rapidly addressed before the assessment concluded The scope of the review included systems, services, and staff in ONS and NISRA supporting the Census, the Census supply chain, and physical and digital security. Bridewell also assessed how comprehensive and effective the assurance review itself was in improving the programme’s security. In total, Bridewell shared 21 findings in review which were rapidly addressed before the assessment concluded. Scott Nicholson, Co-CEO at Bridewell adds, “The Census is vital to informing how organisations and public authorities effectively plan and fund critical services we all require. Whilst completion of the assessment is a legal requirement, members of the public need confidence that the data they provide will be processed fairly and lawfully with adequate protection in place." "We are proud to have played a key role in independently assessing the governance, design, implementation, and operation of controls to ensure they are providing an appropriate level of protection.”
HID Global, the globally renowned company in trusted identity solutions, has announced that it has deployed the government of Libya’s first diplomatic and special ePassport program. HID Integrale HID Global provided Libya’s Ministry of Foreign Affairs (MOFA) with HID Integrale, a secure end-to-end solution that expedites the application and issuance processes and manages the entire ePassport lifecycle. For improved security, the redesigned and modernised booklets include a durable polycarbonate data page and are personalised using new laser engraving and chip encryption equipment. HID Global designed, engineered and delivered the identity solution to the Libyan government in four months, even amid travel restrictions due to the COVID-19 pandemic. Robust and complete ePassport system We are pleased that our collaboration with HID Global has yielded a robust and complete ePassport system" “We are pleased that our collaboration with HID Global has yielded a robust and complete ePassport system that we have seamlessly integrated with our existing processes,” said Mohamed Elkoni with Libya’s Ministry of Foreign Affairs. Mohamed Elkoni adds, “HID’s identity document expertise, the delivery of the solution in record time against the current restrictive backdrop, and ongoing technical support has greatly simplified the implementation of our new systems.” Public key infrastructure (PKI) service To ensure compliance with ICAO standards, HID Integrale’s public key infrastructure (PKI) service creates and manages Libya’s Country Signing Certification Authority (CSCA) keys and certificates to sign personalised eDocuments and enable verification. By implementing the PKI service, Libya can connect with the ICAO Public Key Directory, which enables the global use of their new ePassports and the potential for future security enhancements, such as biometrics. In addition, the solution’s web-based platform makes it possible for HID engineers to efficiently train the ministry’s staff as part of HID Integrale’s customer support package. Issuing secure diplomatic and special ePassports “A successful migration to an ePassport system requires a solution that enhances each touchpoint of the user experience, from application to travel,” said Craig Sandness, Senior Vice President and Head of Secure Issuance and Citizen ID Solutions with HID Global. Craig Sandness adds, “By opting for HID’s Integrale software suite, the Libyan government has created a solid and future-proof foundation to issue diplomatic and special ePassports.”
Border Caravan Storage, a family run business that offers storage for 170 caravans, motor homes and trailers has been operated by Keith, Alison and Helen Rogers for over 15 years. The site used an access control system to control access to the site, but there wasn’t an ideal method of tracking which units were on site, at any given time. The management team had been using a manually operated display board that was prone to error, so they decided to look for a reliable automatic method of identifying which units were on site. Airlock system with uPASS long-range reader The Border management team spoke to Paul Evans of BTT Comms (ex MMV), who suggested using Nortech’s airlock system, where vehicles have to pass through two separate electronically controlled gates to enter or exit the site. The existing drivers’ access control fobs are used alongside uPASS tags, which are placed in the side window of the caravans for detection by the uPASS long-range reader. The system has been recognised by CaSSOA, who endorse the system giving the highest level of security possible If a caravan passes through the first gate, the second gate will only open if the uPASS tag and the driver's fob are both detected and provide a valid match. The information is also relayed to a specially designed asset management system that keeps a real-time log of all units on and off the site. High level of access control security This system has been recognised by CaSSOA, the Caravan Storage Owners’ Association, who endorse the system giving the highest level of security possible, which is recognised by insurance companies, thereby reducing insurance costs for caravan owners. Benefits Simple and reliable means of monitoring the movement of caravans on and off the site. Reliable long-range tag detection avoids manual intervention and reduces running costs. Enhanced security reduces insurance costs for caravan owners. Helen Rogers of Border Caravan Storage stated, “We are very pleased with the new system which provides information in real time and we now know which caravans and owners are on site at any time giving us total peace of mind.”
Round table discussion
Contact tracing has been more than a buzzword during the coronavirus pandemic. In some cases, it has been an issue of life and death. Tracking who an infected person has been in contact with is an important tool to minimise disease spread, and technology from the physical security industry claimed a role in contact tracing early on – and continues to provide benefits as companies seek to reopen. We asked this week’s Expert Panel Roundtable: How can the security industry enhance contact tracing?
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Security tagging: Manufacturers & Suppliers
Artificial intelligence: Understanding its place in physical securityDownload
Delivering smart, secure and healthy retail environments with the cloudDownload
Protecting your data against physical threatsDownload
Achieving true situational awareness in operation centres with computer vision & AIDownload