Testing & Approvals
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill...
PPSS Group launched SlashPRO Cut Resistant Neck Guards in order to help further improve the personal safety of homeland security professionals worldwide. The latest addition to this widely respected brand of slash resistant clothing certainly makes sense, understanding that the side of the neck and throat contains both the Carotid Artery and Jugular Vein. If either is cut by an attacker one will most likely suffer from rapid blood loss, subsequent shock and most likely death. Demand from homel...
When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of the...
As part of the ongoing expansion of its banking and payments security and consultancy offering, FIME has confirmed the appointments of Arnaud Crouzet and Edouard Baroin. “Banking and retail are experiencing unprecedented change and, while the digitalisation of payments represents significant opportunities, each stakeholder must overcome a range of challenges,” comments Lionel Grosclaude, CEO at FIME. “Banks must balance the need to transform their strategies and infrastructure...
Aqua Security announced that its Aqua Container Security Platform (CSP) has been certified by CIS Benchmarks to compare the configuration status of Kubernetes clusters against the consensus-based best practice standards contained in the CIS Kubernetes Benchmark. Organisations that leverage Aqua CSP can now ensure that the configurations of their critical assets align with the CIS Benchmarks consensus-based practice standards. “We are thrilled to have our platform certified by the CIS for...
telent Technology Services Ltd (telent) has announced that it has been awarded a multi-million-pound contract to test the Emergency Services Network (ESN) for the Home Office as it transitions to 4G based communications. The win will see telent deliver the ESN Assure service and follows an announcement from the Home Office in September for a ‘new strategic direction’ for ESN. It aims to save £200 million in public money per year by fully replacing the current radio-based netwo...
Paul van der Zanden is the new General Director of Euralarm. Paul holds over 30 years of experience in the global security market. The new General Director is committed to making Europe a safer place where more people have access to reliable fire protection- and security systems as well as services. Existing economic models are changing rapidly and new technologies and regulation will create both risks and opportunities. This will have an impact on the security and fire safety industry. Euralarm has existed for almost 50 years and continues to play an important role in driving new regulations and standardisation to support quality and an open market approach. A good relationship with the local organisations and policy makers in the countries and Europe are part of this process. Offering secure and reliable products In this changing environment, Euralarm works proactively on awareness, education and regulation. The European association offers a platform for different stakeholders from the industry to work together on standardisation, innovation and market development. "We want to ensure that the industry will continue to offer best in class professional products, systems and services which are secure, reliable and accessible for all European people and businesses,’’ according to the new General Director. “We are well aware of the responsibility we have as an industry to deliver products, systems and services which do their job on the moment we count on them.”
The International Security Expo (ISE) 2018 will be taking place at Olympia London on 28th and 29th November. Steelway will be exhibiting its Protect range of fabricated steel high-security products. Protection against intrusion attack Steelway recognises the need for high-security products, which provide maximum protection against minor vandalism and aggressive intrusion or terrorist attacks. Their Protect range consists of mild steel physical security products with varying levels of protection. The high-security products have been tested and certified, to LPS1175 Issue7, by the BRE. The Steelway team will be on hand at the Expo to discuss the products with attendees and showcase how these products can help improve security. Steelway are looking forward to this year’s ISE and greeting existing and future customers. See Steelway at the International Security Expo, 28th – 29th November at Olympia, London on Stand K83.
HID Global, a worldwide provider of trusted identity solutions, announced its patented Lumidigm multispectral imaging solution is the first fingerprint technology certified to the ISO/IEC 30107-3 Presentation Attack Detection (PAD) standard, which focuses on anti-spoofing and liveness detection to determine whether fingerprint data captured from the sensor is from a real, living person or from a plastic fake or other artificial copy. Since the specification’s release more than a year ago, only the Lumidigm V-Series solution has stopped all fake-finger attacks to receive a perfect certification score in a Level 1 test, which was administered by iBeta Quality Assurance and certified by the National Institute of Standards and Technology (NIST) National Voluntary Laboratory Accreditation Program (NVLAP). Ensuring fingerprint data is real Deployed globally, these fingerprint sensors authenticate billions of transactions annually"“This industry certification is an important accomplishment which validates the security- and privacy-enhancing capabilities of our multispectral fingerprint capture technology,” said Michael Chaudoin, Vice President of Product Management and Marketing, Extended Access Technologies business unit with HID Global. “Deployed globally, these fingerprint sensors authenticate billions of transactions annually. They provide trust whenever they are used to validate a person’s identity to grant access, deliver services or distribute funds, because each time they ensure that fingerprint data is from a real person rather than a fake or stolen sample.” The independent test result is based on the global ISO/IEC 30107-3 standard, which established procedures for testing and reporting a device’s level of susceptibility to fake fingerprints, also called spoofing attacks. During these tests, the fake fingerprint is presented to a biometric capture device by an imposter to gain unauthorised access, steal an identity for fraudulent use, or evade a watch list. Receiving a perfect score during Level 1 certification testing means the Lumidigm technology detected 100 percent of spoof attempts while correctly authenticating legitimate users. Importance of liveness detection Liveness detection is a critical component of a trusted fingerprint biometric security architecture"“Liveness detection is a critical component of a trusted fingerprint biometric security architecture that also includes capture and template-matching capabilities,” said Michael Thieme, Novetta Vice President of Special Projects and Editor of ISO/IEC 30107-3. "Organisations deploying biometric systems should consider independently-validated PAD solutions to help ensure the biometric products they deploy defend against these types of attacks." Liveness detection is increasingly important for ensuring the integrity of what Acuity Market Intelligence forecasts will be more than one trillion cloud-based biometric transactions annually by 2022. In 2015, more than 21.5 million people were affected by a breach of the U.S. Office of Personnel Management (OPM) systems that compromised 15 years of biometric fingerprint identity data. Critical component of secure biometric solution This and other breaches at companies in financial services, healthcare and other industries have fuelled concerns about the fraudulent use of stolen biometric data, which liveness detection can help prevent. According to Acuity’s principal analyst, Maxine Most, “one of the main challenges ahead is educating markets about what constitutes the integrity of a biometric system, including how to apply best practices for liveness detection.” Multispectral fingerprinting works reliably for a broad range of people, across a wide range of conditionsThe firm said in its September 2017 financial services whitepaper that liveness detection is a critical component of a secure, well-architected biometric solution, and one of the most important countermeasures to biometric spoofing and presentation attacks. Optimal fingerprint capture technology HID Global’s patented multispectral fingerprint imaging technology captures unique characteristics from the surface and subsurface of the finger, providing the most reliable fingerprint capture technology available today. Multispectral fingerprinting works reliably for a broad range of people with normal, wet, dry or damaged fingers, across a wide range of conditions -- from dirt and grease to sunlight to wet or cold conditions. These devices provide field-updatable ‘liveness detection’ that helps future-proof deployed systems against new threats as criminals continue to escalate their attacks and techniques. The sensors use a top-ranked NIST certified MINEX III minutia algorithm for proven interoperability with industry standard fingerprint template databases.
Following the successful launch of Kisi Labs with its first product vision ‘Drone Guard’, Kisi Inc., a pioneer in cloud-based keyless access control and security management, has reported the launch of a new security card test to drive physical access innovation through exposing the vulnerability of key cards. Anyone concerned about the security of their access card can send it to Kisi Labs to be tested for free. The original access card will be sent back to the user with a cloned or copied card and a report on how difficult it was for Kisi’s technicians to hack. Rather than hiring a security consultant or paying thousands of dollars for a penetration test, Kisi Labs aims to automate the process and offer this free service to as many people as possible. Different options to test card security Our goal is to make it easy and free to understand card security" There are three free options to test cards. Users can locate their card model in Kisi’s card security hacking database to see if it’s already listed. The second option is for users to send the card type and model for Kisi to check against its database of known exploits or hacks, as well as what tools are typically enlisted to breach the card. The third option requires sending the card to Kisi Labs to be tested by a technician for a full diagnosis, complete with video proof of the process as well as a cloned or copied card sent along with the original. Bernhard Mehl, Kisi’s Founder and CEO comments, “Our goal is to make it easy and free to understand card security, so that expensive physical penetration tests can focus on taking your security to the next level rather than doing your homework." Awareness about card security Mehl adds, "During our work with hundreds of security-sensitive companies we were surprised at how little awareness and knowledge there is surrounding card security. When we looked into the reason, we discovered that methods that should be available to everyone are buried under complicated penetration testing, which often costs thousands of dollars.”
ASSA ABLOY the global provider of door opening solutions, has issued its whitepaper in response to Dame Judith Hackitt’s Independent Review of Building Regulations and Fire Safety, following the Grenfell Tower incident of 2017. The whitepaper summarises practical recommendations derived from the key points made within the Independent Review and advises ways in which the industry can work together towards best practice. Fire door installation solutions Compartmentation has been highlighted as a key reason for the failures at Grenfell. Fire doors intended to stop and slow down the spread of fire were not performing as designed, due to failures in hardware specification and lack of fire door inspections. The paper also highlights the importance of not only ensuring that third-party certification for fire door products is in place and specifications are fit for purpose, but also ensuring that they are installed correctly and maintained. We believe we need to work collectively to create a cohesive industry that puts fire safety at the forefront of building design" Fire door safety Tina Hughan, Marketing Director for ASSA ABLOY UK, said: “Our latest whitepaper has been issued to reflect on the findings of the Hackitt Review and make recommendations based on ASSA ABLOY’s many years’ of experience within the fire door industry.” “We believe we need to work collectively to create a cohesive industry that puts fire safety at the forefront of building design, construction and maintenance, and this paper suggests ways in which manufacturers, architects, specifiers, contractors, facility managers and end users can come together to ensure that thorough due diligence is carried out at each and every stage of a project where fire doors are involved.” In addition to the whitepaper, ASSA ABLOY UK will host its annual fire door safety event in partnership with West Midlands Fire Service on Thursday 27th September, to support Fire Door Safety Week 2018 in raising the bar of fire door standards.
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announces that, in a review of its top selling products to the government, the United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. This certification minimises insurance risks for organisations that deploy authorised Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorised to carry the SAFETY Act Designated mark. By minimising insurance risks to deploying authorised Delta vehicle access systems, this certification lets customers feel comfortable Encourage commercial organisations "By minimising insurance risks to deploying authorised Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security," emphasises Keith Bobrosky, Delta Scientific senior vice president. "As the only manufacturer having such certification for wedge barriers, beam barriers and crash gates, this announcement should encourage commercial organisations to more fully explore using such life-saving products in their anti-terrorist and safety vehicle access solutions." Anti-terrorism technologies Delta certified products include the DSC501, DSC2000 and HD300 wedge barriers; MP5000 portable wedge barrier; DSC720-1M and DSC800 deep foundation bollards; DSC1200 surface mounted barrier; DSC7000 beam barrier; DSC600 and DSC650 shallow foundation fixed bollards and DSC288 crash gate. To illustrate the dependability of these products, the HD300 barrier stops a 15,000 pound (66.7 Km) vehicle traveling 50 mph (80 kpm) and has a demonstrated ability for continuous operation of 1 million cycles in independent test lab testing that took place over 14 months in an outdoor setting while exposed to full sunlight and the effects of climatic conditions. Congress enacted the SAFETY Act to bestow liability protections for providers of certain anti-terrorism technologies and provide incentives for the development and deployment of these technologies by creating a system of risk and litigation management. Each product had to demonstrate prior U.S. government use with substantial utility and effectiveness, provide immediate deployment Provide immediate deployment Certification means that the authorised Delta products have been reviewed comprehensively by DHS and it has found that the unit(s) ‘will perform as intended, conforms to the Seller's specifications, and is safe for use as intended.’ To pass review, each product had to demonstrate prior U.S. government use with substantial utility and effectiveness, provide immediate deployment, show that it would create risk to the public if the technology is not deployed, demonstrate effectiveness of the technology in defending against acts of terrorism and obtain determinations made by federal, state or local officials that the technology is appropriate for preventing, detecting, identifying or deterring acts of terrorism or limiting the harm that such acts might otherwise cause.
Security teams at casinos and gaming facilities are challenged daily to balance a welcoming and guest-focused attitude with a firm and capable presence to prevent and handle security issues, manage surveillance and security systems, and protect employees, guests, and assets. And all of this needs to be accomplished while complying with strict gaming regulations. An experienced security systems integrator can assist you with many of those challenges, including the very important job of ensuring that the correct security technologies are integrated and installed correctly to avoid downtime and maintain regulatory compliance. On the flip side, partnering with the wrong security integrator can be an expensive lesson with disastrous financial consequences due to system interruptions that can shut down gaming operations. However, selecting the right security systems integrator is not always an easy task. To get the answers you need, you need to ask the right questions. Here’s a list of criteria to help get the search process started. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry 1. Relevant and proven industry experience This may be one of the most important factors for you to research. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry. You wouldn’t hire a plumber to fix your roof or a chef to repair your car, so why consider hiring an integrator without relevant work experience in your specific industry? Does the integrator have experience working with security solutions for casinos and gaming facilities similar to your facility? Have they worked with gaming commissions in your state? Do they have the gaming certifications necessary to ensure your new system is in compliance? And what specific projects have they done – with references you can contact? Even more, look for a systems integrator who has strong relationships with contractors, suppliers, unions and equipment suppliers, as they may need to call on them for assistance during the course of your installation. 2. Security systems knowledge Security technologies are evolving at an unprecedented pace which presents obvious advantages and some hidden dangers. It’s important that you select a systems integrator who not only installs products well – but also works very closely with equipment and software manufacturers to develop new and innovative solutions for the most challenging installations.It’s also important to ask about their procedures and processes for after-hours emergency situations Look for systems integrators that utilise integration and testing facilities to evaluate which system configuration and specific components meet your functionality needs, lighting challenges, resolution and frame rate requirements, and recording accuracy demands to ensure your system provides you with the highest levels of identification while maintaining regulatory compliance. Since no two systems are ever alike, it’s also important to look for custom integration capabilities employing solutions from different manufacturers to ensure you are getting the best possible solution on an application by application basis. 3. Brand loyalty versus conflicts of interest There’s no doubt that security professionals have their preferred brands. This can be based on prior experience, proven reliability, superior customer support, or even personal relationships. But it’s also no secret that price and sometimes spiffs can play a deciding role on which products a reseller recommends. Be specific to ask questions about the systems integrator’s line card – which manufacturers’ products do they actually represent and why? And how do they select specific products for specific applications? If the answers to these simple questions seem vague, there may be more at play than meets the eye. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation. 4. Accelerating resolutions How is the integrator’s firm structured? How long have they been in business? Who will be your daily contact? How long have members of the integrator’s team been with the firm? What experience do they have? It’s also important to ask about their procedures and processes for after-hours emergency situations, as you will likely need service after normal business hours. Find out if they offer on-demand remote system support to address problems immediately, and to accelerate resolutions if and when there is a failure. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation Most importantly, verify that they have technicians who can get to your physical location quickly in the event problems need to be addressed physically in order to keep your property in compliance. Even though it can be overlooked, it’s important to assure the system integrator’s organisational structure meshes well with your general requirements before starting a relationship. 5. Pricing structure Of course, price is important, but while an integrator’s pricing should be competitive, it should be viewed as one of many selection criteria.An experienced systems integrator with casinos and gaming facilities will understand local, state, federal, and tribal regulations A security systems integrator with a proven track record of successfully configuring, installing, and servicing projects like yours, on time and on budget, is worth more than the small amount of money you might save by going with a low-cost integrator. 6. Knowledge of gaming regulations A systems integrator who has experience working with casinos and gaming facilities will understand local, state, federal, and tribal regulations, and will provide you with a gaming surveillance and security solution that minimises disruptions to your operations during its installation and after your new system has been implemented. Along with the requirement standards of performance, quality and reliability, compliance is critical to ensure fluid gaming operations. 7. Adding value with industry references Industry references are invaluable in determining your ideal choice. First, ask them to provide client contacts from their reference list, and contact those individuals. Questions to ask include: Did the integrator clearly understand the reference’s requirements? How did they contribute to the solution? What challenges did they need to overcome? Did the company deliver on time and on budget? How has the system(s) been operating since implemented? How has their support been? Why would you recommend them? A good security systems integrator will take extra steps to ensure your security solution is always working 8. Asking the right questions There are very few security systems integrators who can address all of a casino’s or gaming facility’s needs, but they do exist, and you’ll find them if you do your homework. Look for an integrator that can add value and not just take direction. A good security systems integrator will volunteer ideas to reduce maintenance costs, take extra steps to ensure your security solution is always working, and help save your casino money. Their success will be determined by their initial ability to understand your challenges and deliver the best possible solution to resolve them. And it all starts with choosing the right partner by asking the right questions.
The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), machine learning, cloud-based video management systems and cloud-based access control systems. New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow.The global managed security services market is projected to reach nearly $40.97 Bn, with a CAGR of 16.6% over the next five years Need for education and enhanced security With the increased profile of the industry, one can clearly see that the physical security industry is expanding globally to new consumers; bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols and the need for education. This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership. According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years. Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprised of cloud services at nearly $7B. Sharing security service best practices In September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity. The physical security market will have nearly 18% of the total market opportunity comprised of cloud services These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities. Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions; VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers.Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise Cloud versus non-cloud services The insight that one was able to glean from this information and, that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions. The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition and as such should be addressed across all levels of manufacturing, implementation, and customer utilisation. Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products. Ensuring successful deployment As a SaaS service provider, the technical personnel makeup results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed.Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry. As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions. Data security strategies Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimise attack surfaces, create complex, proprietary associations in a multi-layered and multi-tiered connection throughout the application and lastly ensuring that all communication to and from customers’ devices are encrypted and secured. Implementing a process to protect customer’s data records and facilities begins with mapping out a strategy to secure software and hardware Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests. Addressing cyber threats These tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the manufacturer is providing the latest solutions available in the market.Integration implementation personnel should gain greater knowledge in networks and cybersecurity best practices for their solutions An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises. As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected. It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner. Knowledge of networks and cybersecurity best practices The products and services utilised must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation. However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions.The products and services utilised must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply In most cases, this will mean additional jobs for new higher-level personnel, access to additional services to provide to end users, and an elevation of networking and security expertise within their business. Expanding the reach of physical security These new-found skills and expertise will likely bleed into new markets and expand the reach of the traditional physical security market. It truly is an exciting time to be a part of a rapidly expanding market in the physical security space and to watch the industry react to the growing need for cybersecurity within products and services. In the next four years, there will be new innovations, new investments, and new winners and losers in products and services. It seems clear that those integrators and manufacturers who have begun to create the strategies and products for tomorrow will be well ahead of those who are not actively addressing the need for SaaS products, yet the window to opportunity remains wide open.
Barriers certified by the US Department of State can be trusted to withstand specified weights and speeds This time of year, in the early spring, there pops up a plethora of trade shows in which security vendors can present their newest marvels to potential customers. Not to be outdone are the barriers manufacturers. Their products will range from a large metal planter to be placed in an area where no traffic is allowed to movable barriers which lower to let a car drive over and re-raise to protect the property. Some are so sophisticated that they can stop a 30-ton truck driven by terrorists at 50 mph. Vehicle barrier testing by U.S. Department of State But how do you know those 65,000 pounds and 50 mph figures are not just marketing numbers? If you are planning to implement such protection, you need to know exactly what weight and speed your new system will meet. And, as you go up and down the trade show aisles, you will see many different claims. That's why you want the figures to be certified and the leading institution doing such work is the U.S Department of State. In order to be certified by the DOS, vehicle barriers must be tested by an independent crash test facility. Certification is based on speed and penetration ratings. Originally, “K” indicated vehicle speed during the crash test; and “L” indicated the maximum allowed penetration of the barrier by the vehicle. For test purposes, K12 denoted a speed of up to 50 mph and L3 (the highest penetration rating) denoted a penetration of three feet or less. Other ratings included: K8 = 40 mph; K4 = 30 mph; L2 = 3 ft. to 20 ft.; and L1 = 20 ft. to 50 ft. Thus, penetration levels were set at 3 feet (1 m), 20 feet (6 m) and 50 feet (15 m), measured from the point of attack to the final resting place. In 2005, a revision (rev A) issued an update, eliminating all penetration levels except the 3 feet (1 m) standard. Importantly, it was also recognised that different types of vehicles use different platforms, which would affect results. So, a new test standard required the use of cars, pick-ups, medium sized trucks and trucks that haul heavy goods. They are referred to as the ASTM standards. Use these ASTM Standards for impact condition designations Four types of vehicles are defined: 1. Small Passenger Car: The car must have been manufactured in the last 10 years and weigh 2430 +/- 50 pounds (1100 +/- 22 kg). 2. Pickup Truck: The truck must be a ¾-ton model, manufactured within the last 10 years and weigh 5070 +/- 100 pounds (2300 +/-46 kg). 3. Medium Duty Truck: This vehicle must have a diesel engine with a vehicle mass of 15,000 +/- 300 pounds (6800 +/- 136 kg). 4. Heavy Goods Vehicle: This must be a tandem axle dump truck or tandem axle with drop axle truck, tested at 65,000 +/- 1300 pounds (29,500 +/- 590 kg). Most importantly, the new designations actually made some sense in that a car designation starts with a “C”, the pick-up is designated as a “P”, the medium duty truck gets an “M” and the heavy goods vehicle is labelled an “H”. The number following the letter is the speed, measured in mph. Thus, a “40” means the vehicle was tested at 38.0 to 46.9 mph. An H30 designation thus defines a heavy goods vehicle travelling at approximately 30 mph. The BSI has their own vehicle barricade testing standard, which specifically addresses European cars which have heavier frameworks and lower centres of gravity As a result, it is quite easy to determine the condition designation: Car: C40, C50 and C60 Pick-up: P40, P50 and P60 Medium duty truck: M30, M40 and M50 Heavy goods: H30, H40 and H50 What is the difference? It’s easiest to show the difference in designations with an example. For instance, the Delta DSC501 is presently DOS-rated as a K54-certified barrier. That means it has been tested to stop a 65,000-pound truck traveling at 50 mph dead in its tracks. That also means it took on 5.4 million foot-pounds. Under the ASTM system, the DSC501 would be designated as an H50. The British Standard Vs. US-based DOS for vehicle barricades The BSI (British Standards Institute) PAS 68 2007 was the first standard published for vehicle barricade testing in the United Kingdom. PAS 68: 2007 rates products by measuring the velocity and weight of the vehicle against the level of penetration of both the vehicle and any of its load past the vehicle control device. The maximum level of testing would see a 7.5 tonne (15,000 lb) vehicle travelling at 80 kph (50mph) with zero penetration. This test differs from the U.S.-based DOS and ASTM tests by specifying a wider range of attack vehicles. Most significantly, though, it specifies European cars and trucks. European trucks have much heavier frame works and lower centres of gravity, which can significantly affect the test outcome. Marginal barricade designs that have passed U.S. tests have failed PAS 68 2007. Nonetheless, the K12 vehicle mass and speeds are very similar to the DOS and ASTM tests. The post crash measurements of penetration and general test result evaluations are also much the same. Just remember, as you are going up and down the trade show aisles seeing the various claims, it behoves you and the people you intend to protect how and where they got those numbers. Listen for two very important terms - "independent crash test" and "certified." To learn more about certification standards, attendees at the ISC West Exposition in Las Vegas, April 6-8, should stop by the Delta Scientific booth, #21134.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorised access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT device security management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyses data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyse more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified vendor agnostic software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing connected devices from cyber threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
Can a U.S. manufacturing company compete and thrive in the global security market? Megapixel camera manufacturer Arecont Vision makes a strong case that it can. Dialogue and integration with VMS companies Assembling products in the USA helps Arecont Vision ensure quality. If there is a quality issue, the company can stop the production line and fix it. Although some of Arecont Vision’s components, such as camera housings, are manufactured in low-cost regions of the world, including China, everything is assembled in Glendale, California, with additional quality checks. The “Made in USA” tag line is a statement of quality in much of the world, says Scott Schafer, Arecont Vision’s Executive Vice President of Sales, Marketing and Service. Arecont Vision is expanding its technical support, especially maintaining a regular dialogue with technical support personnel from various video management system (VMS) companies. In effect, the goal is an “on-purpose, proactive teaming in the field” to provide a joint value proposition in the security market. Arecont Vision integrates with more than 100 VMS and NVR companies, including all the big ones such as Milestone, Genetec, Exacq, Lenel, DVTEL, 3VR and many others. “It depends on what the client wants,” says Schafer. "We have come a long way in ashort period of time. Our numbersare reflecting that. We are pleasedwith the progress we have made",said Sasha Ross, Senior Managerof Arecont Vision Technical SupportDepartment Faster, stronger technical support for customers Speed of technical support is another priority, and Arecont Vision is establishing processes and metrics to achieve faster support. Arecont Vision is strengthening its support team with new people, processes and systems. The company may have the same number of online and support calls as it did in 2012, but the business volume has tripled since then. The team is better organised, and behaviours are being established to prepare for installation of a help desk software solution to track service level agreements (SLAs), escalation procedures, etc. Technical support in the Glendale office opens at 5 a.m. Pacific time and closes at 6 p.m. Pacific, handling more than 91 percent of technical support calls (there is also technical support in Europe, and a French-speaking team in Montreal.) “We have come a long way in a short period of time,” says Sasha Ross, Senior Manager, Technical Support Department. “Our numbers are reflecting that. We are pleased with the progress we have made.” Technical support calls reflect any product problems, and the nature of calls has changed as quality improvements have been put in place. In fact, many of the calls are now from integrators who are installing IP systems for the first time and need extra hand-holding. Arecont Vision technical support personnel go out of their way to avoid finger-pointing and to help customers diagnose a problem, even if the problem stems from another company’s product and is not related to the cameras. "Overall, the process we use isvery robust. Because we work withthird party software providers, partof the QA cycle is to look at howour cameras work with the top five[VMS] products [in the market]", saysDarrel Tisdale, Director of Quality atArecont Vision. Robust quality control process Arecont Vision is embracing best practices related to quality control. They have better testing facilities, are using new metrics, and have a new quality director. Quality meetings are held often. All products get full quality inspections -- two of them -- and there are no more issues with wrong labels or missing screws or other problems with the cameras. Overall quality metrics have improved, even as growth in the company’s volume has exploded in recent years. Return rates have plummeted; RMA (return merchandise authorisation) rates have dropped three- or four-fold. In addition to quality control, cameras are tested – how do they work in low light, bright light or mixed lighting? How does a camera work inside an enclosure? “Overall, the process we use is very robust,” says Darrel Tisdale, Arecont Vision’s Director of Quality. “Because we work with third party software providers, part of our QA cycle is to look at how our cameras work with the top five [VMS] products [in the market].”
Knightscope, Inc., a developer of advanced physical security technologies focussed on enhancing U.S. security operations, announced that it is has taken a major step in its commitment to help better secure schools across the country by selecting Clovis Unified School District in California as its beta testing location for a suite of new technologies under development. The Company had prior announced this effort earlier this year when it solicited students to get involved and submit essays on how Knightscope’s fully autonomous security robots could help in a school setting. Security robots to monitor school safety “With over 100,000 schools in the country, we need to develop a new set of tools and technologies as a critical part of our long-term mission to better secure the United States of America,” said William Santana Li, chairman and chief executive officer, Knightscope, Inc. Knightscope’s robots will provide the authoritative presence needed on a school campus and provide actual intelligence by filling in the blind spots"“Being able to utilise a real-world environment to test, sample, and iterate on new capabilities while inspiring students to pursue STEM careers is certainly a winning combination,” continued Li. “As a teacher of thirty years, my philosophy has always been to be proactive instead of reactive, and the idea of security robots monitoring a school is definitely a proactive approach to school safety. Knightscope’s robots will provide the authoritative presence needed on a school campus and provide actual intelligence by filling in the blind spots with their ‘eyes and ears,’” said Clifford A. Nitschke, Jr., AP United States Government and Politics Instructor, Clovis North High School. Trialling a new technology in school safety Mr. Nitschke’s class submitted the winning proposal to Knightscope. “We are honoured to be chosen by Knightscope and to be given the opportunity to pilot a new and exciting technology in the field of school safety.” The Clovis United Unified School District Governing Board is scheduled to meet on January 16, 2019 to formally accept the beta testing program by Knightscope. The meeting is planned to occur at 6:30pm at the Clovis Unified Professional Development Building, 1680 David E Cook Way, Clovis, CA 93611. Assuming an approval by the Board, the parties will determine implementation timing thereafter.
In January 2018, the Mayor of New York, Bill de Blasio and the City’s Security Infrastructure Working Group announced plans to bring permanent perimeter barriers, or bollards, to high-profile sites and to create a process to streamline their design and construction. With funds exceeding $14 million for permanent bollards in Times Square and more than $50 million to commence the broader rollout of new protective measures in phases. Mayor de Blasio said, “In 2017, New Yorkers witnessed the horrible capacity of people willing to do us harm, whether it was in our subways, on our bike paths or in Times Square. But we will not be cowed and our expanded investment today in barriers and bollards in our public spaces underscores our resolve in keeping New York City safe from future attacks. In this new year, we can and will protect our iconic public spaces while New Yorkers go on living our lives, including by hosting a record number of tourists.” “These additional safety bollards will allow New Yorkers and visitors to be more secure at landmark locations and other sites throughout our City,” said Police Commissioner James P. O’Neill.With vehicles becoming a weapon for terrorists, the need to protect citizens has dawned on most large cities Ensuring public security And with vehicles seemingly becoming the weapon of choice for terrorists, the need to protect citizens from 'people willing to do harm' has dawned on most large cities, leaving many still trying to find the best way to protect their citizens. Admittedly in many cases, it seems to be ‘after the horse has bolted’ so to speak. In 2016, a lorry was driven into crowds celebrating Bastille Day in Nice, killing 87 people and injuring 458. This was an awful, cowardly and devastating attack that had a huge impact on so many lives. The stark reality is however, after two previous vehicle attacks in France, if there had had been tougher security measures in place, rather than an increased police presence, and a plastic temporary barrier, then many of those citizens would still be alive today. MacSafe for vehicle incursion prevention Reacting to these devastating events, Metropolis Nice C.te d’Azur decided to install a safety barrier along the Promenade des Anglais. The new barrier, or vehicle incursion prevention system, MacSafe, was tailormade for the Promenade des Anglais by Maccaferri and J&S Franklin. It was inaugurated in July 2017. It is crash test rated to stop a 19-tonne truck travelling at 50km/h and impacting at 20°, equivalent to the vehicle used by the terrorist in Nice in 2016 and can withstand two successive impacts. The system is also accredited by the UIAU (University of Venice). The MacSafe system consists of two high tensile steel cables supported on tubular steel posts and anchored at each end with our patented energy dissipation system. The posts are secured to ground foundations and all external fixings are designed to prevent them being easily removed. The force of the vehicle impact is distributed through the cables and posts and absorbed within the patented energy dissipaters. The energy is absorbed through compressive deformation and not by friction. This ensures better and more reliable performance throughout the long-life of the barrier.Las Vegas plan to have their existing 800 bollards updated to some 7,000 by the end of 2018 Balancing security and aesthetics On the 19th December 2016, a truck was deliberately driven into the Christmas market next to the Kaiser Wilhelm Memorial Church at Breitscheidplatz in Berlin, killing 12 people and injuring 56 others. One year on, and the Christmas Market in Berlin is protected by large concrete barriers, armed police patrols and stop and search checks. In January 2017 in Melbourne, 6 people were killed and 37 injured when a car sped down a footpath crashing into pedestrians, by June 2017 $10 million had been allocated, and temporary concrete barricades and bollards had been installed around the City of Sydney. In January 2018, the City of Gold Coast began installing heavy duty retractable bollards capable of repelling the force of a large heavy goods vehicle. They had previously resolved to spend $515,000 on bollards which met the Australian standard, but on the advice of the QPS Commonwealth Games security adviser, it was recommended that the bollards comply with a European standard bringing the cost of the project to $1.095 million. Las Vegas plan to have their existing 800 bollards updated to some 7,000 by the end of 2018, to increase the safety of those walking The Strip in Sin City. However, some cities are still concerned about the aesthetics of concrete bollards on their historic cities, a case of balancing security over protecting tourism. Physical barriers for pedestrian security Take for instance, Barcelona in Spain. On the 17th August 2017, a van was driven into pedestrians strolling along Las Ramblas, in Barcelona, killing 13 people and injuring at least another 130. Advice was given that bollards were needed, warnings of impeding threats were given, and yet, the action taken was to increase policing levels on the streets. Now, thankfully, there are a few bollards and increased police presence on the streets, and going forward they are “studying the possibility of installing physical barriers to prevent further attacks with vehicles.”Although guard rails would not have stopped either of the London attacks, they can limit the damage In London on 22nd March 2017, a car was driven into pedestrians on Westminster Bridge, killing 5 people and injuring 49 others. The driver also stabbed a policeman to death. Built-in counter terrorism design Again, in London, on 3rd June 2017, a van was driven at pedestrians in the London Bridge Area. Three attackers began stabbing people, before being shot by police. 8 people died. 48 were injured, 21 critically. Controversially previously installed 'Guard Rails' had been removed from London’s streets to protect cyclists and make the Capital more ‘attractive’. Although guard rails would not have stopped either of the London attacks, they could have limited the damage. However, today, protective barriers are erected on Thames bridges and from London’s experience of previous terrorist activities (IRA) there are very few buildings or indeed public spaces that don’t have ‘counter-terrorism’ design inbuilt. Government-initiated guidance The UK Government has produced a 174-page guide, Crowded Places Guidance, that highlights the threat as a vehicle being used as a weapon, but also highlights that these threats can be “mitigated by installing physical measures (including blending into the landscape or streetscape) which may be passive (static) or active (security controlled). These measures can be installed either on a permanent or temporary basis. All such measures should meet appropriate standards in terms of their vehicle impact performance, design and installation.” Vehicle security barriers, need not be ugly concrete monstrosities. Nor do they need to be concrete lumps that need huge lifting gear to place them. They can be totally inconspicuous, letting everyday life continue and forgetting they are there, or full on ‘in your face’ shouting a warning to would be terrorists that this area is safe.Planters can be installed quickly and are sited to allow pedestrians to pass through while vehicles can’t PAS68 Street Planters They come in many guises, from retractable bollards and passive static bollards to street furniture. Even cleverly disguised PAS68 Street Planters from Securiscape, which have an attractive floral display whilst cleverly acting as a security barrier. These planters can be installed quickly and are sited to allow pedestrians to pass through while vehicles can’t, but due to intelligent design, incorporating a surface mounted, reinforced structure which can stop a vehicle if it is used as a battering ram. But if none of that appeals, then there are many landscaping options, including, ditches, bunds and berms. DefenCell mesh gabion DefenCell by J&S Franklin, is a lightweight geotextile welded mesh gabion that once filled with locally available materials, can be incorporated into security measures for public places and protection. Filled and stacked, these gabions can be covered and planted, maintaining the aesthetic and environmental considerations of high profile or sensitive locations. Sadly, people with ‘evil intent’ are a fact of life. Which makes vehicle security barriers a permanent part of our city landscapes. So, whether hidden or in plain sight they will be there be to Protect and Protect again.
To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, a new smart IoT industrial park in Hangzhou has been put to use by Dahua Technology, a video surveillance solution provider. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Efficient information integration The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialised requests and ever-changing reality.The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production(preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning high-end devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools, etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. Fast processing According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35 multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. Dahua Smart Industrial Park provides the great benefit of internal synergy The faster speed also applies to the development of new molding, since Dahua Smart Industrial Park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organising system is supported by topnotch equipment, such as MAKINO high-speed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005MM, while also supporting CAD / CAM / CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days.Higher quality results in less likelihood for products to malfunction especially when they are used in critical situations Time- and cost-saving solution By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors, etc., all of which proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, not-allowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons: first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, Dahua has put together an effectively closed loop for quality control in the manufacturing process. Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example: it can process components, in metric size, as small as 03015(0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry.Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process Enhanced vision and intelligent analytics Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high-definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognise flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.In the future phase, this industrial park is expected to be more intelligent to enable a safer society and smarter living Safe society and smart living Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialised needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialised use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one. And in the future phase, it is expected to be more intelligent, to realise client-centred flexible production and to enable a safer society and smarter living.
ip.access has announced a collaboration with Imaginet, a provider of IT network and security solutions, to implement a rapidly deployable disaster response network in Makati City, the Philippines. Makati City, part of the Metro Manila region, is the main financial hub and has a population of 6 million people. Built on a drained mangrove swamp, the city’s infrastructure is at a high risk for significant damage in the event of an earthquake, typhoon or other natural disasters. In the event of a disaster it is likely that communications infrastructure would be affected – hindering efforts to direct the population to safety and locate people trapped in collapsed buildings. To improve the city’s preparedness for natural disasters, the local Disaster Risk Reduction & Management Office (DRRMO) worked with Imaginet to implement a rapidly deployable mobile network. Deployed via four command vehicles, the network will allow first responders to communicate with the population and report back to the central command office.The ip.access team has an inherent understanding of disaster situations, with extensive experience working in harsh environments Ensuring disaster preparedness Basing the network on 2G technology, to ensure that signals would be capable of penetrating collapsed buildings and enabling communication through SMS messaging, ip.access was tasked with designing, installing and testing the network in a tight six-week window. Following a successful commissioning period, the four command vehicles were first deployed in December 2017. Commenting on the partnership, Blair Duncan, CEO at Imaginet, said, “This was a challenging technical undertaking. As such, we needed confidence that we were working with a partner that could deliver a high quality solution. In that respect ip.access were an ideal partner – the team has an inherent understanding of disaster situations, with extensive experience working in harsh environments. We knew that we could rely on them to equip our vehicles with the robust and reliable radio network the DRRMO requires should a disaster strike.” Small cell solutions Nick Johnson, CTO at ip.access added, “We have a wide range of award winning commercial off-the-shelf (COTS) small cell solutions that can be easily integrated and operated within a wide range of specialist deployment scenarios – including in disaster response settings.” “Communication is critical in a disaster situation, so the fact our proven solutions deliver five nines availability with exceptional reliability makes them ideal for applications like the vehicle-borne network in Makati City.” Due to the success of the vehicles, the Makati City DRRMO is now looking to increase its fleet to nine vehicles to enable more flexibility and more robustness in its disaster readiness.
Muir Group Housing Association, which manages more than 5,500 homes across the country, has formed a new partnership with OpenView Security Solutions, a national supplier of electrical and mechanical services, to further enhance the level of services to residents. The contract started on 1st June 2017 and OpenView Security Solutions is providing a range of specialist services including PAT testing, fire risk assessments and the ongoing maintenance of fire alarms, emergency lighting, door entry systems, automatic doors and barriers. The transfer of these services from the previous contractor was efficiently achieved by both organisations. Residential safety and security According to Mike Proudfoot, Maintenance manager at Muir Group Housing Association, “This partnership will be very important in ensuring that we maintain our ongoing commitment regarding the safety and security of residents. As a landlord, OpenView’s involvement will be crucial in helping us to meet our obligations and the long-term benefits will be positive, both for Muir residents and the housing association as a whole.” Andy Ward, Sales Director at OpenView Security Solutions, added, “We are excited about embarking on a new era with Muir Group Housing Association. With extensive experience of working closely in partnership with housing associations, Openview understands the importance of ensuring that all equipment is working efficiently at all times and is committed to providing the highest quality service to the organisation and its residents.”
Round table discussion
Sometimes you see it coming and want to scream out: “Don’t do that.” We all make mistakes, but it’s hard to sit and watch others as they go down the wrong path. It’s especially difficult when the errant party is a customer, and when their wrong move might somehow end up reflecting badly on you as a technology or security systems provider. Much better to anticipate the problem by expecting the possible mistake before it happens. We asked this week’s Expert Panel Round Table: What is the biggest mistake you see your customers make when it comes to buying or installing security or surveillance systems?