The Genetec Channel Partner program has partnered with Credly to award verified digital badges to European channel partners who complete Genetec certification courses. Badges provide an easy way to share and validate the skills, experience and technical knowledge. Digital badges are the best tool to highlight Genetec certifications and achievements on the website, social media, profiles and more. Think of the badges as a bonus for the hard work—there's no extra cost involved. What is a d...
Genetec Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it is broadening its portfolio of FICAM-(Federal Identity, Credential and Access Management) certified options for its Security Center Synergis™ access control system with the support of Veridt Stealth access control readers. Traditionally, the options for Federal Government organisations to replace a non-FICAM compliant system or to secure a new...
Tyco, the security products brand of Johnson Controls, the globally renowned company for smart and sustainable building solutions, has announced its secondary sponsorship of the SYNETIQ BMW Motorrad team for the 2021 British Superbikes season. Support for TAS Racing “We are delighted to have the opportunity to renew our support for TAS Racing who run the SYNETIQ BMW Motorrad team,” said Gordon Morrison, GB Sales Director for the Johnson Controls’ Tyco access control and video...
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more power...
Exabeam, the security analytics and automation company, announces the appointment of technology industry veteran and former Splunk marketing leader Sherry Lowe to chief marketing officer (CMO). Lowe will be responsible for leading the global marketing strategy and will report directly to Ralph Pisani, president, Exabeam. Throughout Lowe’s 20-year career in the technology industry, she has built strategic marketing programs for rapidly growing tech companies such as Expanse, Druva and Splu...
The role of physical security has expanded and grown rapidly over recent years. Below are some of our observations, particularly throughout the pandemic, and a look towards the changing times ahead. The new era of physical security The role of private security has shifted dramatically over the last decade and beyond. Historically, the focus was on protecting assets such as property and goods, but more frequently now the sector is being asked to play an even bigger role in protecting the...
W Series, the international single-seater motor racing series for female drivers only, is delighted to announce a new cyber protection and security partnership with Acronis, a globally renowned provider of cyber protection solutions. Global Cyber Security Partner The multi-year agreement sees Acronis become W Series’ new Global Cyber Protection and Security Partner, providing bespoke technology solutions for W Series’ on-track racing programme, which will resume in 2021 and the W Series Esports League which launched in June 2020. Plans are already in place for a bigger and better on-track W Series season in 2021, including at least two races on the Formula 1 calendar, in Austin, Texas, USA, and in Mexico City, Mexico. Acronis will implement video and brand analytics of W Series’ on-track and virtual races Acronis will develop and maintain a secure data management system, improving W Series’ ability to store, analyse and share content with partners. Enhanced by their award-winning artificial intelligence technology, Acronis will implement video and brand analytics of W Series’ on-track and virtual races, thereby accelerating the generation of content through predefined access and filtres. Cyber protection solutions Acronis’ range of cyber protection solutions are developed upon a five-pronged principle that aims to deliver Safety, Accessibility, Privacy, Authenticity, and Security (SAPAS) to organisations and users. This design methodology ensures that Acronis solutions deliver not only the highest calibre of safety and security to data, applications, and systems, but also a guarantee that data is tamper-free and easily accessible for smooth day-to-day operations. Acronis Cyber Protect One of Acronis’ top products that W Series will be using is the Acronis Cyber Protect, which provides fast and reliable backup, AI-powered anti-malware and anti-virus, and comprehensive endpoint management in a single solution. This integrated approach to cyber protection eliminates complexity and makes it simple for users to manage and monitor data across an entire network. Some of this technology will be delivered by Teknov8, a global provider of cyber security solutions that will support Acronis’ partnership with W Series as the Official #CyberFit Delivery Partner. Catherine Bond Muir (Chief Executive Officer, W Series) said, “Acronis’ innovative and award-winning cyber protection solutions are used by many of the major automotive companies and sporting organisations around the world." Acronis – W Series multi-year partnership She said, “Therefore, today’s announcement of a multi-year partnership against the backdrop of the ongoing global health crisis and the devastating economic impact that it has had, is a significant endorsement of W Series and our mission.” Acronis’ support will be vital as we prepare to resume our on-track racing programme in 2021" Catherine adds, “It has become clear in our discussions with Acronis that they are as committed to improving equality and diversity in motorsport as we are, and their bespoke data management system will improve the speed and accuracy with which we can share our content, thereby helping to spread our message further and faster.” She further stated, “Acronis’ support will be vital as we prepare to resume our on-track racing programme in 2021 with a schedule which is bigger and better than ever before. The W Series Esports League has also kept our drivers sharp and our fans entertained, and Acronis’ commitment to that brand-new platform reflects our own.” Enhancing cyber security in work from home environment Serguei Beloussov (Founder and Executive Officer, Acronis) said, “Ever since the COVID-19 pandemic hit, cyber-attacks have increased five-fold. Cybercriminals are ruthlessly targeting a workforce that has largely migrated to working from home on less secure networks.” Seguei adds, “Acronis Cyber Protect is perfectly designed to combat this threat, as it allows for system administrators to remotely manage and protect even devices that are not on the same network, so home users can keep both their professional and personal data safe and secure.” He further stated, “We are honoured to have been chosen to help the W Series team get #CyberFit, and we look forward to a long and fruitful partnership with the team.”
Security personnel responsible for the safety of visitors at airports, sports stadiums and other wide open environments where there is a high risk of terrorist activity, can now rely on a new high-performance Wisenet video surveillance camera manufactured by Hanwha Techwin, to help them detect and forensically analyse any suspicious activity. “The super high resolution capabilities of the Wisenet TNB-9000 means that large areas can be covered with sufficient pixel density to enable operators to digitally zoom in to see a sharp image of just a small part of the scene,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. Installing multiple cameras “This ability to closely zoom in without losing any detail, makes the Wisenet TNB-9000 ideal for applications where installing multiple cameras may be impractical or cost prohibitive.” The H.265 Wisenet TNB-9000, which utilises a full size 43.3mm CMOS sensor to capture true 8K images at 15 frames per second, is equipped with deep learning based video analytics. This simultaneously detects and classifies various object types, including people, vehicles, faces and license plates. The Wisenet TNB-9000 has a wide range of built-in Intelligent Video Analytics (IVA) The deep learning based video analytics is also able to ignore video noise, waving trees, moving clouds and animals, all of which might normally be the cause of false alarms. In addition to its deep learning capabilities, the Wisenet TNB-9000 has a wide range of built-in Intelligent Video Analytics (IVA), including Tampering, Loitering, Directional Detection, Defocus Detection, Virtual Line, Enter/Exit, Appear/Disappear, Audio Detection and Motion Detection. Deep learning based video analytics It also has an audio analytics feature which recognises critical sounds such as raised voices, screams, broken glass, gunshots and explosions, and generates an alert to enable security personnel to quickly react to any incidents. Additional features: Digital Wide Dynamic Range (DWDR), helps to accurately produce images in scenes that simultaneously contain very bright and very dark areas. A micro SD/SDHC/SDXC memory slot which allows up to 256GB video or data to be stored at the edge should there be disruption to the network. Video evidence, which might have been potentially lost, can be retrieved when the network connection has been restored. A choice of H.265, H.264 or MJPEG compression, with the cameras’ bandwidth friendly credentials enhanced by WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression, according to movement in the image. Bandwidth efficiency is improved by up to 99% compared to current H.264 technology when WiseStream II is combined with H.265 compression. As such, WiseStream II reduces the total cost of ownership of a video surveillance system by minimising the storage and bandwidth requirements of high definition cameras. Gigabit Ethernet and SFP fibre optics allow the transfer of up to 1,000 Mbps for high speed connectivity. 12VDC or HPoE which negates the need to install separate power supplies. Support for Canon EF (Electro Focus) mount lenses provides a wide variety of options for focal length and aperture settings. Accurately detect suspicious activity “The superb quality of the images captured by our highest resolution camera to date, together with its deep learning based video analytics and other innovative features, provides security personnel with an extremely powerful tool to accurately detect any suspicious activity,” said Uri Guterman. “As such, the introduction of the Wisenet TNB-9000 presents system integrators with an excellent opportunity to help their end-user clients cost-effectively take their security to a higher level.”
The shareholders of TE Connectivity (TE), a provider of connectivity and sensors, elected Lynn A. Dugle, former chief executive officer of Engility Holdings Inc., and Dawn C. Willoughby, former executive vice president and chief operating officer of The Clorox Company, to its board of directors during the 2020 Annual General Meeting on March 11. "We are very pleased to have Lynn and Dawn join as new directors to TE's board," said TE Connectivity Chairman Tom Lynch. "They are seasoned leaders that understand the increasing global challenges our customers face in highly competitive markets. Their excellent experience in a variety of marketing, operations, technology and strategy leadership roles make them valuable new members to our board." Technology consulting company Dugle was a director of The Analytic Sciences Corporation from October 2014 to February 2015 From 2016 to 2019, Dugle was chief executive officer and a director of Engility Holdings Inc., an engineering and technology consulting company listed on the New York Stock Exchange. She was appointed board president in June 2017, and then board chairman in February 2018. Dugle was a director of The Analytic Sciences Corporation from October 2014 to February 2015, prior to its acquisition by Engility Holdings Inc. Dugle joined Raytheon Company, a publicly traded company specialising in defence and other government markets throughout the world, in April 2004 and served as the vice president of Raytheon Company and president of Raytheon IIS until March 2015. She became president of the former Intelligence and Information Systems business in January 2009 and was previously its vice president and deputy general manager. Manufacturer and marketer of consumer products From 2002 to 2004, Dugle served as the vice president of the product, systems software division at ADC Telecommunications Inc. and as general manager of the cable systems division from 1999 to 2002. Dugle is currently on the board of directors at State Street Corporation, as well as KBR Inc. Willoughby was the executive vice president and chief operating officer of The Clorox Company She holds a Bachelor of Science in technical management and a Bachelor of Arts in Spanish from Purdue University, as well as an MBA from the University of Texas at Dallas. Willoughby was the executive vice president and chief operating officer of The Clorox Company, a manufacturer and marketer of consumer and professional products, from September 2014 through January 2019. Home care products She also served as the company's senior vice president and general manager, Clorox cleaning division; vice president and general manager, home care products; and vice president and general manager, Glad products, along with several other positions since she began there in 2001. Prior to her career at The Clorox Company, Willoughby spent nine years with The Procter & Gamble Company, where she held several positions in sales management. She is currently a director of J. M. Smucker Company. Willoughby obtained a Bachelor of Arts in sports management from the University of Minnesota and an MBA from the University of California, Los Angeles, Anderson School of Business.
HID Global, a front-runner in trusted identity solutions, announced the launch of HID® Signo, its signature line of readers that creates a new industry benchmark for the most adaptable, interoperable and secure approach to access control. The new readers dramatically simplify system deployment and management, meet the advanced security requirements of today’s dynamic environments, and set organisations up for smarter, more connected access control. Demand for versatile solutions “With the industry now seeking to use access control systems as a backbone for creating intelligent environments, consultants, integrators and end-users are increasingly demanding more versatile, high-performance solutions,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control Solutions, HID Global. “HID Signo is built on an open platform and delivers on our commitment to innovation with its unprecedented flexibility and robust set of forward-looking features that optimise workplace experiences.” “Our goal is to put more choices in the hands of our customers and give them peace of mind in knowing they can continually adapt their systems as requirements change.” Mobile access For ultimate versatility, the readers are interoperable with over a dozen physical and mobile credential technologies so organisations can use their technology of choice and easily migrate to the latest solutions at their own pace. Additionally, with support for Apple's Enhanced Contactless Polling (ECP) to enable Student IDs in Apple Wallet, HID Signo is driving the next wave of flexibility and convenience with mobile access. Smart features Readers are IP65 rated and feature a capacitive touch keypad resistant to harsh weather conditions HID’s new readers are packed with smart features, such as automatic surface detection that recalibrates and optimises read performance based on the mounting location. For rugged, outdoor performance, the readers are also IP65 rated with no additional gasket needed and feature a capacitive touch keypad resistant to harsh weather conditions. Transcending traditional access control HID Signo’s connectivity-by-design model empowers administrators to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. Additionally, the configuration can be further streamlined through the controller via the Open Supervised Device Protocol (OSDP). “HID’s novel approach to access control also lays the foundation for a future of cloud-connected systems that will enable new applications and innovative capabilities, such as the ability to proactively anticipate and address system issues before they occur,” Radstaak added. Multi-layered security Delivering multi-layered security with built-in support for OSDP Secure Channel and HID’s proven Security Identity Object technology, the readers store cryptographic keys on certified EAL5+ secure element hardware and custom authentication keys can be used to further enhance security. HID’s patented velocity-checking feature also protects against brute force rapid electronic attacks. Availability The new line of HID Signo Readers is available through Advantage Partners in major markets worldwide, with a phased roll out in select regions.
HID Global, a front-runner in trusted identity solutions, announced it will support the industry’s passwordless authentication initiative at RSA 2020 by demonstrating converged access solutions that extend zero trust security and FIDO2 authentication across the workplace in the physical and digital worlds. The company’s solutions, including smart cards, an expanded USB key family and an updated cloud-based credential management service, are among the first to help realise the industry’s vision for a passwordless future at the door and in hybrid IT environments spanning on-premise and cloud applications. FIDO2 authentication solution Extending benefits of FIDO2-based passwordless authentication throughout the workplace “HID Global provides the industry’s only complete FIDO2 authentication solution for the workplace that provides a converged access experience from the door to on-premise IT systems and cloud resources,” said Brad Jarvis, Vice President & Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. “Besides making it easier and more cost-effective to deploy FIDO2 on employees’ corporate ID badges and other form factors, we increase value with HID IdenTrust digital certificates that give authenticators signing and encryption capabilities for email and documents.” “Our goal is to help drive the adoption of FIDO2-based passwordless authentication by extending its benefits throughout the workplace.” USB-C option HID Global is announcing the general availability of a USB-C option in its HID Crescendo© Key Series family at the conference. The Crescendo family supports passwordless authentication with an end-to-end approach to an organisation’s workplace security. Key elements include Access Convergence that Bridges the Physical and Digital Worlds: HID Crescendo 2300 Series converged smart cards and HID Crescendo Key Series authenticators streamline and increase security, accelerate return on FIDO2 deployment investments and plug vulnerability gaps in physical access systems and cyberspace. Growing Family of Authenticator Options: The Crescendo Key USB-C authenticator joins HID’s Crescendo Key USB-A device to provide an option for logical access option that also accepts a publicly trusted digital certificate. Users can digitally sign and encrypt emails, PDF documents and files without the need for complex public key infrastructure (PKI) solutions. Centrally Managed FIDO: HID Crescendo Series cards and keys are among the first supported by enterprise-class credential management, which simplifies tasks like resetting PINs without needing user service re-enrollment. The updated HID Credential Management Service now also issues and manages HID IdenTrust certificates on Crescendo Key USB-C devices.
FLIR Systems, Inc. announced three dome-shaped, Pan-Tilt-Zoom (PTZ) security cameras, including two dual-sensor camera series for critical infrastructure locations, the FLIR Elara™ DX-Series and the FLIR Saros™ DM-Series, and a high-resolution visible camera for safe city deployments, the FLIR Quasar™ 4K IR PTZ. The latest FLIR security products offer multiple lens options for long- and short-range needs to enable accurate perimeter protection of critical infrastructure, remote facilities, and in urban city environments, day or night. Perimeter security protection Critical infrastructure sites, such as utility substations and transportation centres, have significant and often increased security requirements. The latest FLIR Systems cameras featuring thermal imaging and 4K high-resolution sensors, the Elara DX-Series and Saros DM-Series, help deliver superior perimeter security protection where it matters most. With the ability to see through fog, rain, sun glare, and snow, both series provide the ability to spot heat signatures at all hours. Elara DX-Series & Saros DM-Series Elara DX-Series features a longer viewing range & Saros DM-Series provides a shorter viewing range The FLIR Elara DX-Series features longer viewing range capabilities, infrared illumination, and a wiper blade that can be remotely operated for use in harsh conditions to ensure a clear view. The more compact Saros DM-Series provides shorter viewing range capabilities in a weatherised housing. Both series offer eight lens options, enabling customers to choose the most appropriate lens for their application. Quasar 4K IR PTZ For the growing metropolitan city safety and security market, the Quasar 4K IR PTZ delivers high-resolution visible video quality with the best-in-class low light capabilities to give operators superior monitoring in large coverage areas. Seamless integration Providing VMS integration with FLIR United VMS and all major platforms, these latest FLIR security cameras can provide a comprehensive end-to-end experience with seamless integration to the FLIR United VMS platform or a complementary solution with integration available to all major platforms. Security and safety “With our latest products, FLIR is delivering advanced cameras purpose-built for perimeter protection and the evolving security needs of critical infrastructure sites and cities,” said Travis Merrill, President of the Commercial Business Unit at FLIR. “For surveillance in critical environments, including utility substations, airports, train stations, or stadiums, these perimeter protection cameras are designed to withstand harsh environments to help keep sites secure and people safe.”
You are not alone: operators everywhere are asking themselves what are they going to do? How are they going to get back to business, and fast? How are they going to cost-effectively operate with all the new safety requirements that have arisen as a result of COVID? How are they going to ensure it all gets done for the safety of customers and staff? How are they going to protect their brand from the negative exposure of being identified as a property with a reputation for COVID? The economic impact of COVID is expected to hit brick and mortar businesses the worst, as their businesses are dependent on people being physically present. According to a recent report by RBC, it is estimated that 70% of Americans expect to avoid public spaces, 57% of Canadians will be unwilling to attend conferences without a vaccine and 63% of people will prefer to drive vs fly. This means, that for those of you in the business of travel, conferences, co-working spaces, retail stores, museums, art galleries, restaurants, sports arenas, hotels, cruises, airlines, resorts, theme parks, long-term care, education, etc. in the blink of an eye your approach to on-site safety just changed. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitisation To get back to business and operating at full capacity after COVID, operations must find a way to eliminate the fear, uncertainty and doubt in the minds of their customers and employees. The affect of COVID-19 on safety and security To safely get back to business, the Centers of Disease Control and Prevention (CDC) emphasis that all operations need a pandemic response planJust like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budget. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitisation, the lines between the security and maintenance just blurred. From customers, to employees, to government regulators, to management, the focus is now on operations and the sanitisation policies, procedures and actions of the team. To put this change of priority into perspective, six months ago, sanitisation was not top of mind for people. Why, because it was not a life or death issue, we had other first world problems to garner our attention. From an operations perspective if we enabled a sanitisation issue to become significant enough to impact the safety of customers and staff and therefore the brand, then that was an operational choice versus a mistake. Standards for sanitisation Just like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budgetThe issue is, today while the operating priority of sanitisation has significantly increased, it is not measured and managed to the same standard as the other safety and security concerns across a business. Also, important to consider, while people may not hold an operation liable during this first wave, we can guarantee they are not going to be as understanding during the second wave or a future pandemic. To safely get back to business, the Centers of Disease Control and Prevention (CDC) and the Occupational Health and Safety regulators emphasis that all operations need a pandemic response plan and should follow these simple guidelines: Develop your plan Implement your plan Maintain and revise your plan While this sounds simple enough, keep in mind that requirements are constantly evolving and will continue to do so for the foreseeable future, or at least until all the research is in. To create an emergency response plan for a pandemic, properties must first determine what needs to be sanitised. The current requirements dictate that most surfaces and objects will just need a normal routine cleaning, it is only the frequently touched surfaces and objects like light switches and COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-havedoorknobs that will need to be cleaned and then disinfected to further reduce the risk of germs on surfaces and objects. The challenge is when you step back and consider what people touch in a day; the list quickly grows. After only 30 minutes, I easily came up with a list of over 60 items that one could call ‘high touch’! If you think about it, the list is extensive; telephones, doorknobs, drawer handles, counters, pens, keypads, computers, etc. and the list is only going to get longer as the research comes in. The challenge is when you step back and consider what people touch in a day; the list quickly grows Operating efficiency If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper and filing cabinetsTo scope the impact on operations as part of the plan, we must then find and identify all of those high touch things across the property. If we then combine that with the fact that CDC requires that all high touch locations must not only be cleaned more often, but that they also require that each location is first cleaned with soap and water, and then disinfected for one minute before finally being wiped down. This means a one-minute task just turned into a 4-minute task, that must now be completed multiple times a day. From a resourcing perspective this adds up quickly, and operating efficiency must be a priority. Not to mention it is going to get very complicated to measure and manage especially. Post COVID rules Getting back to business is going to be complicated; lots to do, lots of moving parts and no technology to help. The fundamental challenge to keep in mind is not that the sanitisation requirements have evolved, the real issue is that for most businesses this area has been left unchanged for generations. Still today most rely on checklists, logbooks and inspections to manage the responsibilities of our front-line workers, which might have been fine before COVID. Post-COVID the rules have changed and so should the approach to managing physical operating compliance on the front lines. COVID like most physical operating requirements is tactical, detailed and specific; broad strokes, the honor system and inspections are not going to cut it. The digital transformation COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-have. If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper, filing cabinets filled with checklists, never to be seen again. Only with the right data can we significantly improve the operational decisions necessary to accelerate our return to full operating capacity. At the end of the day, to fully recover, operations must eliminate the fear, uncertainty and doubt in the minds of customers and employees, only then can we really get back to business.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organise and regulate. Integrating drones in existing regulatory ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS measures and regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones European c-UAS legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorisation act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating counter-drone legal infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-driven decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis and application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilising data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyse data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant access to connected devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyse this data is of imperative importance. Real time data storage availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing stored data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilise surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
A high majority of Americans (83%) are concerned about a criminal attack causing physical harm at large-scale events such as sporting events or concert festivals. More than one in five (22% of) Americans say they have cancelled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks and the safety of their data. Across the pond, three in 10 Britons think twice about attending large-scale events due to data or physical security issues. Although less than half of U.K. survey respondents have changed their plans to attend large events, some 45% are taking extra security precautions. Brits are as afraid of using public Wi-Fi at an event as of a physical criminal attack. These are some of the insights from the 2019 Unisys Security Index survey of more than 13,000 consumers in 13 countries, including 1,000 in the U.S. and another 1,000 in the United Kingdom. Currently, the U.K. index is at 147 (down from 149 in 2018), which is one of the lowest of the countries surveyed Security index scores of countries Unisys gauged attitudes on a range of security-related issues and created an index based on survey results. The index is a calculated score from zero to 300 based on concern about eight specific issues within the categories of national, financial, Internet and personal security. Currently, the U.K. index is at 147 (down from 149 in 2018), which is one of the lowest of the countries surveyed. In contrast, the U.S. index is now at 165, considered a serious level of concern and the highest among developed countries surveyed. Globally, the index average stands at 175, with the Philippines scoring highest with an index score of 234 and the Netherlands registering the lowest concern ratings with a score of 115. Concerns about misuse of information Privacy is an area where concern is growing. “This year more than half of U.K. citizens expressed concerns about the misuse of their personal information,” says Unisys’ Global Chief Security Architect, Salvatore Sinno. Another 49% expressed serious concerns that intelligence services listen in on them through electronic devices such as mobile phones or smart speakers. The summer calendar of major sporting events, concerts and festivals raises the levels of security concern The summer calendar of major sporting events, concerts and festivals raises the levels of security concern. Nick Aldworth, former National Counter Terrorism Co-Ordinator, tells the BBC that the government is not doing enough to ensure venues are secure. He supports a campaign for more rigorous checks at venues in the U.K., named Martyn’s Law, after Martyn Hett, a victim of the Manchester Arena attack in 2017. Safety pointers while attending event Salvatore Sinno of Unisys provides the following pointers on keeping safe this summer: If planning to attend a crowded event alone, let someone know. Make sure friends or family know where you are going, when you plan to arrive and when you are expected to return. Plan ahead and check local authorities’ alerts; sign up for any travel or news alerts to receive updates on traffic or news of any disturbances. As soon as you get to an event, survey your surroundings. Make sure you know where the exits are and agree on a meeting place with friends in case you should get separated from the group. Know where stewards and information points are so you can speak to someone if you need to. Be vigilant for suspicious activity at an event. Don’t be afraid to report something you think is unusual, such as unattended baggage or people behaving in a suspicious or threatening way. In an emergency, stay calm and move to the edges of crowds. Try to leave the area quickly and calmly. If you need to, follow the standard police advice of ‘Run, Hide and Tell’. Only buy event tickets from official channels or trusted websites. Update your mobile device with the latest, most secure software and avoid unsecured Wi-Fi networks; keep your phone charged and take along a battery charger pack. Don’t make electronic transactions at unofficial event vendors; be careful with contactless cards or making mobile transactions. “Whether it’s your physical security or the security of your data, you can take precautions around major events so you do not make it easy for criminals to take advantage,” says Sinno.
Coming off a successful ISC West show, Honeywell is sharply focussed on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine learning-based analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralise decision making, and allow customers to manage it all from anywhere. Solutions for vertical markets Honeywell Commercial Security is focussed on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalised systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing technology for sports security The software is able to visualise, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualise, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices. Hypervisor software separates a computer's operating system and applications from the underlying physical hardware. The elements continue to function as before, and software keeps them separated virtually, while also enabling the system to run more economically on less hardware. Virtualisation within hyperconverged systems Hypervisor software separates a computer's operating system and applications from the underlying physical hardware Software companies such as VMWare, Microsoft Hyper-V and Nutanix provide virtualisation software that enables hyperconverged systems in the IT world. However, bringing hyperconverged systems to the world of video surveillance requires special handling, and security integrators may not be aware that hyperconverged software from the IT market does not work seamlessly with video data. Specifically, these hypervisor software systems have latency problems that are not compatible with video. Therefore, hyperconverged software systems must be adapted to meet video’s needs. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations of security integrators and end users while also providing economic and operational advantages of hyperconverged systems. Why a virtual machine can aid your server solution A hyperconverged system can transition a stack of 10 or more application servers down to three servers, with all the applications still virtually separated on fewer machines. Each server is used to 100 percent of its capacity, which is more efficient. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations Both operating and maintenance expenses are lower, and if more computing resources are needed for a virtual machine, the software interface enables an end user to allow more processing power, RAM or disk space to that application. Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses. When a video system is working on a hyperconverged cluster, what happens if there is a hardware failure? The virtual system gets moved to a cluster that is working, but there might be a 30-second gap in video, which would not be acceptable for a critical application. All video must therefore be saved in two places. Virtualised server stacks from BCDVideo BCDVideo has entered into an engineering partnership with Scale Computing to develop an optimised hypervisor based on Scale Computing’s HC3 software that is also efficient for writing video.Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses Virtualisation in the physical security market can create traffic patterns that are unlike traditional IT, and changes need to be implemented to accommodate for that. To avoid a “bottleneck” that can occur during the virtualisation process, the virtual machine and the underlying physical hardware must be optimised to account for the virtualisation process. “Performance and high-availability are critical in the video surveillance market and not all HCI solutions will adapt to video data,” said Dan Pierce, VP of Strategic Sales at Scale Computing. “With Scale Computing’s HC3 platform and BCDVideo’s ‘purpose built’ approach, customers will benefit from a solution that’s adapted to meet industry wide requirements while simplifying the management and maintenance of their infrastructure.” Hyperconverged infrastructure will become more and more prevalent in the video market, especially for large systems that have high camera counts and longer video retention times. Hyperconverged systems offer a more efficient use of resources and save costs because hardware is more fully utilised. Previous problems of using hyperconverged systems for video have been solved, which paves the way for much more widespread deployment. Over time, we should expect hyperconverged system to become more common for larger video installations, such as gaming, sports arenas, large cities, universities, corporate campuses and airports. The key to success is applying knowledge both of the needs of video systems and of how hyperconverged systems can be adapted to meet those needs.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Centre, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights Security Centre is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
FLIR Systems, Inc. announced it has installed its EST screening system at the Pentagon Visitor Center in Washington, D.C. The company’s integrated EST screening solution, the A700 EST-IS, features the FLIR A700 thermal imaging camera. The system is being used to screen visitors for elevated or higher than expected skin temperatures, which can help guard against the spread of COVID-19. The installation of its EST system at the Pentagon is one of many efforts FLIR is currently discussing with United States Department of Defense officials for applications across the armed services. The news follows statements made by FLIR President and CEO Jim Cannon on a recent earnings call that the company booked roughly $100 million in new EST business in the first quarter of 2020. Skin temperature screening For more than 40 years, FLIR has provided advanced thermal imaging technology to America’s military" More recently, General Motors announced it will use FLIR cameras at many of its sites to screen workers in an effort to help prevent the spread of the novel coronavirus. “For more than 40 years, FLIR has provided advanced thermal imaging technology to America’s military - on its aircraft, helicopters, ships at sea, and to forces on land,” said Cannon. “We’re honoured to again serve the U.S. defence community in this effort to better protect visitors to the Pentagon and support elevated skin temperature screening.” Thermal imaging cameras For applications in public buildings, hospitals, airports, schools, sports venues, or manufacturing, FLIR Systems’ EST cameras can be a first line of defence in managing the risks associated with a global pandemic. These groups and others are using FLIR thermal imaging cameras and software for the initial screening needed to help detect people with signs of elevated skin temperature. Once identified, those individuals can be checked with a medical device to determine if they have a fever, one of the symptoms of a coronavirus or other flu infection. FLIR is a global provider of thermal cameras for temperature screening-related applications. Its technology has been employed worldwide by customers since the 2003 SARS epidemic, with unique functionality that includes advanced measurement tools and alarms to enable faster critical decisions.
An upgrade of surveillance, using the latest video technology from IDIS, has put Circuit Zandvoort in poll position as host venue for the 2020 Formula 1 Grand Prix in the Netherlands. As well as wider improvements to the track, a top priority at the circuit was a complete overhaul of the video monitoring capability to meet the requirements of Formula 1. Security and safety surveillance For Track Manager Niek Oude Luttikhuis a key objective was to rapidly implement a solution that would be much easier than the previous system to use, maintain and adapt in the future. To achieve this, he brought together a team including IDIS – Korea’s surveillance manufacturer. Significantly improving security and safety surveillance of the track, their solution will also let the Formula 1 organisers temporarily receive functional authorised access of video data for the duration of the competition. Video management software Circuit Zandvoort will be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS At the heart of Circuit Zandvoort’s new system is IDIS’s server-crunching, 64 channel DS-IR300 NVR technology, pre-loaded with IDIS Solution Suite video management software (VMS). This allows all the track’s existing cameras to be easily integrated and operated alongside the latest IDIS 5MP speed dome PTZs and 12MP bullet cameras. It also delivers impressive new functionality, including ultra-high-definition monitoring capability using IDIS Smart UX Controls. The system now provides real-time image capture of the highest quality, with no lag, ghost-shadowing or stuttering of images, even when cars travelling at high speed are displayed. Critical Failover technology Images on the racing control room video wall are now crisp and clear. And looking ahead, the IDIS Solution Suite VMS will make it easier to sustain this high standard by allowing cost-efficient, remote firmware updates and system maintenance. Circuit Zandvoort will also now be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS. This protects against video data loss due to a wide range of potential fault conditions, such as network instability or power failure. It ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings while the fault is resolved. No interruption to surveillance IDIS demonstrated a deep understanding of the security and operational requirements of our circuit"The entire upgrade was completed while the original system continued to run in parallel, confirms Track Manager Niek Oude Luttikhuis. This meant there was no interruption to surveillance during implementation, which was vitally important as the track is in almost continuous use. “There is fantastic mutual communication between IDIS and the different suppliers – they think ahead and complement each other,” says Mr Luttikhuis. “And from the start IDIS demonstrated a deep understanding of the security and operational requirements of our circuit and a passion for motor racing.” PTZ cameras for tracking With the new system operational as promised, in the control room a rotating team of 10 people work with the IDIS Solution Suite VMS, with minimal training required to use all its features and functions – including easy search and retrieval, and silky-smooth control of the ultra-high-definition (UHD) PTZ cameras for tracking in real-time. Authorisation levels can be set, giving each individual specific user rights, and during the Grand Prix itself the Formula 1 organisers will also be given access to the system. If necessary, this will also include the ability to view and retrieve footage on mobile devices via the IDIS Mobile app – helping the 2020 Formula 1 Grand Prix to run smoothly behind the scenes.
The Danish Superliga football club Brøndby IF were aware that family attendance had fallen at some of the more high-profile games, such as the local derby with F.C. Copenhagen, due to concerns over hooliganism and safety. With an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist for causing trouble, the football club wanted to find a way to make genuine fans feel safer by preventing problems before they could occur. Improving security With the use of cameras and facial recognition, blacklisted offenders can now be automatically identified in the crowd before they attempt to enter the stadium. This system identifies any individuals registered on the offenders list and alerts security staff to prevent them from entering. The automated procedure at the stadium entrance also decreases congestion at the gates, so genuine fans can get into the stadium faster. As well as improving security outside, the system allows staff more time to focus their attention on creating a safe and entertaining environment for those inside the stadium. The technology can identify faces that are difficult to recognise with conventional techniques Facial recognition server The Panasonic facial recognition software ensures high levels of accuracy. The technology can identify faces that are difficult to recognise with conventional techniques, such as those taken from an acute angle and even when part of the face is concealed or hidden by sunglasses or scarves. In fact, the National Institute of Standards of Technology (NIST) in independent testing identified the system as the most accurate facial recognition server on the market. And the system is already working. One blacklisted offender was prevented from entering the stadium at the very first home game of the season in mid-July and he will receive a fine and extended ban. Protection of personal data However, some fans were initially sceptical about the scheme. They were worried about the Big Brother concerns of privacy and personal data protection. These fears quickly faded once the club explained the sensitive way that the scheme had been implemented. Security personnel remain in control of the process at every stage. The technology flags potential blacklisted offenders and the security advisers then take over and investigate further before taking action. People-led and technology supported The solution is people-led and technology supported. Personal data privacy is also protected because the facial recognition technology does not store the images or data of any supporters, other than those registered on the blacklist. In addition, all personal data is stored on an internal server, not connected to the internet or to any other system, significantly reducing any cyber risk of data breach. After seeing the results of the technology and receiving reassurances about data protection, both Brøndby management and fans alike have welcomed the new technology. Moving forward there is also the potential to utilise a national hooligan register with the system to help spot travelling troublemakers within Denmark.
Zayed University is the newest of three government sponsored higher education institutes in the United Arab Emirates. The campus is located on the mainland of the Emirate of Abu Dhabi, near the Abu Dhabi International Airport and Masdar. The 229,000m campus houses six colleges across 28 separate buildings, including faculty and administration buildings, a childcare facility, residence halls, classrooms, science and computer labs, cafeterias and a sports complex, all equipped with the latest technology. Future development plans will see the student population increase to 7,500 and the campus grow to cover a net area of 269,000m. Access to and from the campus is an important concern for Zayed University and is carefully managed around the clock to keep the 6,000 strong student body safe. Managing gate barriers and doors Banner sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowedThe university employs Serco to implement and manage their security requirements. Serco partnered with Gallagher, selecting the Command Centre security platform to manage gate barriers and access controlled doors with just under 650 MIFARE readers and 130 controllers across the site. Zayed University implements a policy to provide students with a secure campus environment. This includes managing the entry and exit of the students based on their scheduled classes. To achieve this, Zayed University runs an interface between Command Centre and its Banner system. Banner is a comprehensive computer information system that contains information on courses, students, faculty, staff and alumni, including financial aid, finance and human resource components. Entry and exit requests for students to pass through the campus gates are sent from Command Centre to the Banner system for approval, using the Command Centre OPC Alarms and Events interface. Based on the time of the entry or exit and the student’s schedule, the Banner system decides whether the request is accepted or denied. Banner then sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowed. Safe and secure environment for students Its intuitive user interface provides flexibility and easy management of operations"Gallagher security solutions provide the assurance and the knowledge that movement throughout campus is managed simply and efficiently to ensure a safe, secure environment. “Keeping students safe is of utmost importance to us,” says Mukesh Karsan, Serco IT Manager at Zayed University. “The Gallagher system helps us honour this commitment. Its intuitive user interface provides flexibility and easy management of operations.” He adds that he’s been “impressed with the reliability and robustness the system offers; it’s powerful, versatile and allows security personnel to carry out their day-to-day responsibilities with efficiency.” Gallagher solutions are trusted by education providers worldwide to: issue student and faculty access cards manage individual access rights control campus and dormitory access secure computer labs, science labs and other high-value assets integrate with scheduling and resource booking systems evacuate or lock down sites in case of an emergency Time and money saving solutions From intelligent integration with building management systems, to people and time efficiencies gained through automation and smart use of resources, Gallagher designs solutions that save time and money. Whether it’s across multiple zones within a single campus, or over multiple campuses, Gallagher solutions offer an intelligent, powerful way to ensure business continuity, protection of assets and keeping people safe.
Beijing Daxing Airport, due to open in September, will soon be the second in Beijing to secure daily operations with state-of-the-art technology by Airbus. Airbus will provide one Tetra DXTA server, and nine TB3 base stations with eight TTRX 32-channel receivers per base station for Bejing’s second international Airport communication structure. The system will be mutually backed up by the Beijing Capital International Airport to enhance the communication and management of the two airports. The whole network will be put in use before the 30th of September, the official opening date of the airport. This new airport will possess eight runways and serve around 100 million passengers annually, all of which will be secured with Airbus technology. Seamless communications Airbus Tetra system has played a vital role in securing tasks relating to passenger transportation Tests carried out in April proved the interconnectivity between the digital trunk communication systems of both airports to be reliable, as stable and clear communications were recorded. The two Tetra systems provided by Airbus are fully interconnected; this will allow for Airport related entities such as Airlines and ground service companies to benefit from seamless communications between both airports. Beijing International Airport is also equipped with an Airbus Tetra system, which has provided highly stable, reliable, and flexible communication security for daily operations since its deployment in 2008. Over the past ten years, it has played a vital role in securing tasks relating to passenger transportation, as well as the logistics of high-scale world sports events. The current system serves over 10,000 subscribers. In 2018, the Beijing Capital International Airport saw over 100 million passengers for the first time, making it the second busiest airport in the world.
Round table discussion
A major benefit of technology innovation is more application opportunities. As video cameras become better and more versatile, new uses are emerging that extend the benefits of video surveillance, often outside tried-and-true parameters. Sometimes security camera manufacturers are on the front lines to see new ways video is contributing value to integrators and end user customers. We asked this week’s Expert Panel Roundtable participants: What is the most unusual application of surveillance cameras you have seen recently?
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download