Testing & Approvals
OutSystems, provider of low-code application development platform, announced that it is the first low-code vendor to achieve two new cloud security certifications – ISO 27017 and ISO 27018. As organisations develop, run and share a higher percentage of their applications on the cloud, stakeholders across the business are trusting platform providers to ensure their cloud-based environments are secure. These certifications demonstrate the high level of commitment OutSystems has to ensuring...
NTT Security, the specialised security division and centre of excellence in security for NTT, announced that it has completed the acquisition of WhiteHat Security, an application security provider committed to securing applications that run enterprises’ businesses. The acquisition will strengthen NTT Security’s ability to address modern enterprise security needs that range from IT infrastructure to critical business applications, covering the full lifecycle of digital transformation...
SV3, the cloud-based visitor, vehicle and vendor management system from Building Intelligence, has received SAFETY Act Certification, the highest level of accreditation awarded by the U.S. Department of Homeland Security for anti-terrorism technologies, making it the only visitor and vehicle management solution to achieve this level of federal recognition. “By using technology to secure loading docks and parking garages, as well as providing a smart method for managing vehicle access to s...
The National Security Inspectorate (NSI), the UK’s independent certification body specialising in the security and fire safety sectors, shared in the success of this year’s IFSEC and FIREX exhibitions as the integrated events proved important forums for approved companies and applicants, as well as key industry stakeholders, to engage face-to-face with NSI experts. The three-day events provided a vital opportunity to raise awareness of the valuable role of independent certific...
The ASSA ABLOY Door Hardware & Access Control Group has launched an innovative new door closer that offers unrivalled performance for user flexibility and fire safety for buildings in the healthcare, education and hospitality sectors. Unlike any other door closer in its class, the new DC300G-HF is a responsive solution, satisfying multiple door control issues for healthcare professionals, students, customers and staff. This includes flexible operation and use, while also maintaining full ce...
Frontier Pitts will be exhibiting at the IFSEC Exhibition at Excel, London between the 18th and 20th of June 2019. Frontier Pitts will be showcasing a fully operational Secured by Design accredited LPS1175 Automatic Bi-folding Gate SR2 on the stand. This is the first automatic Bi-folding Speed Gate on the market to achieve Secured by Design accreditation and LPS1175 Security Rating! Many clients had been installing unrated Security Gates that had not been tested alongside LPS1175 security rate...
Matrox announces that the Alliance for IP Media Solutions (AIMS) Pro AV Working Group will be at InfoComm 2019 (booth 375) to promote the real-world benefits of open standards for AV over IP and interoperability within the pro AV space. AIMS will be presenting an education session, and the AIMS booth will be hosting educational presentations, and multi-vendor interoperability demonstrations that showcase the benefits of the SMPTE ST 2110 standard. The AIMS Pro AV Working Group’s mission is to define an open-standard approach to addressing the pro AV world’s move towards IP media. SMPTE ST 2110 is already the de facto accepted standard for broadcast — the goal in the pro AV space is for vendors to work together in the same way towards a single standard. Ensuring future-proofed interoperability When everything is based on a single open standard, users are able to mix and match the best products to suit the customer’s needs"“When everything is based on a single open standard, users are able to mix and match the best products to suit the customer’s needs,” says David Chiappini, vice president of research and development, Matrox Graphics Inc. “We have seen this approach work in the broadcast field with SMPTE ST 2110. It was built over many years by hundreds of stakeholders — from manufacturers, end users, and service providers — working towards a common goal. It is important to use the same strategy of education, engagement, and cooperation to ensure truly future-proofed interoperability.” Demos and presentations At the AIMS booth (375), the Matrox X.mio5 Q25 network interface controller (NIC) card will be used in an end-to-end, multi-vendor interoperability demonstration to showcase the SMPTE 2110 standard in action. The AIMS booth will also host several presentations geared towards the adoption of a single set of media-over-IP protocols. Andre Testa, director of ASIC/FPGA engineering at Matrox, will kick off each day’s sessions, presenting ‘Who is AIMS and What is SMPTE 2110?’, which will be followed by other AIMS members speaking on the adoption of open standards for AV over IP. When: Wednesday June 12 & Thursday June 13 Time: 10 a.m. – 3:15 p.m. Where: Booth 375 When: Friday, June 14 Time: 10 a.m. – 11:30 a.m. Where: booth 375 Presentations will be repeated several times during the show. Benefits of AV-over-IP infrastructures AIMS members will also be hosting a panel session titled ‘Audio and Video Streaming Using Established Standards’. Show attendees are encouraged to attend to discover the benefits of truly flexible, scalable, and interoperable AV-over-IP infrastructures. AIMS members will speak on the following: “The Origins of Audio Over IP and the Need for Standards,” Richard Zwiebel, Vice President, Systems Strategy, QSC “There’s Nothing to Be Afraid of With SMPTE ST 2110,” Andrew Starks, Director of Product Management, Macnica “The Open Standards-Based Method for AV Over IP,” Scott Barella, Chief Technology Officer at Pesa and Deputy Chairman of AIMS ProAV Working Group “Next-Gen IP for Networked Media — Collision or Convergence?” Karl Paulsen, Chief Technology Officer, Diversified When: Tuesday, June 11 Time: 1-3 p.m. Where: Room W304E (Session IS020)
Consumers are managing their financial services in more digital and diverse ways than ever before. But as card-not-present (CNP) transactions across e-commerce, m-commerce and remote commerce rise across the globe, so does fraud. Adding security without simply creating more points of friction is a real challenge, but one that the EMV 3-D Secure protocol – EMV 3DS for short – is trying to combat. The protocols are generating real interest across the industry, but what exactly is EMV 3DS? And what are the key considerations stakeholders in the online payments and financial services world should be making? Verifying CNP Transactions Three-Domain Secure (3DS) is a standard messaging protocol used to identify and verify cardholders for CNP transactionsThree-Domain Secure (3DS) is a standard messaging protocol used to identify and verify cardholders for CNP transactions. It creates a standardised, harmonised and secure authentication solution for all stakeholders: merchants, issuers, acquirers and schemes. Initiated by Visa and followed by other payment schemes such as Mastercard, a new version of EMV 3DS has now been developed and is being maintained by the industry body, EMVCo. Goals of EMV 3DS specifications The main goals of the latest EMV 3DS specifications can be broken down into three: Increase approval rates Fundamentally, achieving this boost the total volume of transactions and increases revenues for retailers, banks and schemes alike. Reduce fraud Merchants or issuing banks have historically been liable for fraudulent chargebacks, but now the responsibility is shifting depending on which version of EMV 3DS is supported during the authentication. EMV 3DS risk-based-authentication helps reduce fraud and brings huge savings, as well as more confident consumers. Enhance the user-experience Improved online authentication solutions – remembering the 3rd, 4th and 7th digit of a password set five years ago, for example – are far from user-friendly. And the stats speak for themselves: eCommerce cart abandonment rate is at nearly 70%, and around 28% of US online shoppers admit to quitting orders due to checkout processes being too long or complicated. Cutting out complex additional steps for consumers will reduce cart abandonment and result in better sales for retailers (as well as customers happier to return!). Intelligent risk-based decision-making EMVCo’s latest specification features even more intelligent risk-based decision-making with advanced algorithms By improving communication ‘in the background’ between the issuing bank, the acquirer and the merchant, EMV 3DS streamlines the user experience. At a high level, basic account holder information can now be automatically retrieved and verified without additional consumer input. EMVCo’s latest specification features even more intelligent risk-based decision-making with advanced algorithms and smarter data sharing that help evaluate if a purchase is ‘normal’ or not. For example, considering user location, amount spent and frequency of transactions. This means additional authentication processes are only requested when really needed. Say if one is making an m-commerce payment on holiday in Australia from a site they’ve never visited before – they may then be taken through some of the new, simpler additional authentication solutions defined. These now include one-time passwords sent via SMS, biometric authentication, use of existing authentication on mobile devices and background authentication checks. Compelling authentication solution Thorough testing and certification needs to be championed throughout Crucially, EMV 3DS is no longer just for payments. The use cases for identification and verification (ID&V) are expanding, so the scope of EMV 3DS has become much broader to include adding cards to a digital wallet, open banking services and financial services apps, etc. EMV 3DS is a compelling authentication solution fit for the digital, omnichannel age. But as with any major system upgrade, implementation does not come without its challenges. Selecting a trusted partner who understands the nuances and complexities of this new payments infrastructure can help take the strain of compliance. Whether defining and certifying a new solution, or upgrading an existing implementation, thorough testing and certification needs to be championed throughout. This is key to minimising unexpected delays and costs on the path to service launch. FIME’s long history supporting the industry’s digital transformation and participation in EMVCo enable them to deliver unrivalled expert support for your projects.
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announced that in alignment with their ongoing policy to certify products to North American standards, the Trilock 3-arm tripod turnstile models have been tested and certified to conform with UL (United Laboratories) Standard 294 and CAN/ULC S319 for Canada. UL Standard 294 and CAN/ULC S319 (the harmonised standard in Canada) are the prevalent industry standards for ensuring the safe operation of access control equipment in the United States and Canada. While all of Boon Edam’s products currently conform to CE (the European Union standard of safety and operation), the company continues to invest in UL certification for all door and turnstile products sold in the Americas to align with North American standards and ultimately streamline installation for their customers. Preventing tailgating in traffic conditions The 3-arm turnstiles rugged construction has provided a dependable way to deter tailgating in traffic conditionsThe Trilock 60 and Trilock 75 waist-high turnstiles have been a pair of reliable workhorses since the 1980s when they were built by Tomsed Corporation, a US-based company acquired by Boon Edam in 2005. These 3-arm turnstiles have been installed to control traffic in a wide variety of applications in the Americas including amusement parks, stadiums, public transit and universities. For many years, their rugged construction has provided a dependable way to deter tailgating in abusive traffic conditions, both indoors and out. Optional features like colour finishes, platforms and wheels, and coin collectors allow organisations to customise the tripod turnstiles to fit any lobby or brand. UL-certified and tested products “Today’s business climate places a premium on risk mitigation and Boon Edam has always emphasised safety around the globe,” says Greg Schreiber, Senior Vice President of Sales at Boon Edam Inc. “When our products conform with UL standards, our North American customers can know that a well-established, 3rd-party has rigorously tested them and confirmed they operate safely at any location.” UL was founded in 1894 and today helps companies demonstrate safety and confirm compliance. Services offered by UL include: inspection, advisory services, education and training, testing, auditing and analytics, certification software solutions, and marketing claim verification.
PPSS Group launched SlashPRO Cut Resistant Neck Guards in order to help further improve the personal safety of homeland security professionals worldwide. The latest addition to this widely respected brand of slash resistant clothing certainly makes sense, understanding that the side of the neck and throat contains both the Carotid Artery and Jugular Vein. If either is cut by an attacker one will most likely suffer from rapid blood loss, subsequent shock and most likely death. Demand from homeland security agencies PPSS Group have identified a noticeable increase in the demand for such products, especially from several homeland security agencies, such as prison, police, immigration, customs, border forces and other government agencies. Many of these agencies have reported incidents, which saw their officers being brutally attacked. Many attacks had targeted the officers’ throats and necks. PPSS Group have identified an increase in the demand for such products, especially from several homeland security agenciesRobert Kaiser, CEO of PPSS Group said: “Many government employees or security professionals have been attacked from behind. This may well be the case because they, for whatever reasons, either trusted the attacker to a reasonable level, or because the attackers put themselves intentionally into such position in order to cause max injury or even death.” “No matter how hard we try, we simply cannot eliminate their operational risks. However, what we can do is continue our research and development and relentlessly explore all possible options to further improve the personal safety of those who serve our countries and protect us.” High levels of certified cut protection SlashPRO Neck Guards can be worn ‘turned up’ to cover the entire neck area, or ‘turned down’ for covert operations or a more natural look. They are available in black as standard colour. The new neck protectors offer thoroughly field tested and exceptionally high levels of certified cut protection. Verified test reports highlight European Cut Level 5 (EN 388:2016), International Cut Level 5 (ISO 13997:1999) and American Cut Level A5 (ANSI/ISEA 2016).
As part of the ongoing expansion of its banking and payments security and consultancy offering, FIME has confirmed the appointments of Arnaud Crouzet and Edouard Baroin. “Banking and retail are experiencing unprecedented change and, while the digitalisation of payments represents significant opportunities, each stakeholder must overcome a range of challenges,” comments Lionel Grosclaude, CEO at FIME. “Banks must balance the need to transform their strategies and infrastructures for long-term success, while ensuring short-term revenue growth. Retailers and merchants need to make increasingly complex strategic decisions to reduce costs and increase revenues in today’s omnichannel world, but with margins constantly squeezed, it is difficult to know where to focus resources.” Digitise payments Arnaud holds a degree in telecom engineering from EPITA and an executive MBA in business strategy and management from CNAM Paris Arnaud will head up FIME’s security and consultancy offerings, helping banks and merchants to secure, automate and digitise payments while improving the buying experience. For the last eight years he has been in charge of payments strategy at Auchan Group, the world’s 11th largest food retailer. He is also General Secretary of nexo standards, the association dedicated to delivering fast, interoperable and borderless card payment acceptance, and previously worked for American Express Group and Ingenico. Arnaud holds a degree in telecom engineering from EPITA and an executive MBA in business strategy and management from CNAM Paris. “This is an extremely exciting time to join FIME,” adds Arnaud. Digital transformation projects “Regulations, standards and new technologies are changing the game, and key stakeholders are completely reevaluating their roles in the payments ecosystem. FIME is perfectly placed to support banks and merchants throughout every stage of their digital transformation projects. Our consultants, engineers and testing experts are removing pain and friction from payments and helping our customers to deliver richer, more secure omnichannel buying experiences. I look forward to collaborating with my new colleagues.” Edouard Baroin brings extensive consultancy experience to FIME, having led teams at Deloitte, Beobank and Eurogroup Consulting Edouard Baroin joins FIME to support banks, merchants and other payment ecosystem stakeholders to define and launch the best solutions for their customers and their business models. He brings extensive consultancy experience to FIME, having led teams at Deloitte, Beobank and Eurogroup Consulting. He holds a degree in mathematical sciences and an MBA in corporate finance. Navigating regulatory challenges “We enable our customers to innovate in a secure and sustainable way. Testing and compliance are therefore essential, but on many projects we are helping to define the future of payments and standards are yet to catch up. This is where our expertise and consultancy comes in,” concludes Lionel. “The arrival of Arnaud and Edouard is another step towards excellence as we revolutionise our consultancy offering and app security testing methodologies. We have some important new services to launch this year to help our customers define, design, develop, validate and launch new products and services, so please join me in welcoming Arnaud and Edouard to help us achieve our ambitious goals.” FIME supports every phase of the digital transformation process by navigating regulatory challenges, reducing risk and complexity, upgrading legacy systems, and ensuring security and interoperability.
Aqua Security announced that its Aqua Container Security Platform (CSP) has been certified by CIS Benchmarks to compare the configuration status of Kubernetes clusters against the consensus-based best practice standards contained in the CIS Kubernetes Benchmark. Organisations that leverage Aqua CSP can now ensure that the configurations of their critical assets align with the CIS Benchmarks consensus-based practice standards. “We are thrilled to have our platform certified by the CIS for the Kubernetes Benchmark,” said Amir Jerbi, CTO and co-founder at Aqua. “This certification is a testament to the rigorous security testing performed by our platform, and our commitment to providing enterprise customers with solutions that enable them to meet CIS best practice standards and maximise the security posture of their Kubernetes clusters.” Aqua Container Security Platform (CSP) Aqua’s platform is used by more than 100 of Global 1000 companies, securing their container-based and cloud native applications, on-prem and in the cloud, supporting both Linux and Windows runtime environments, across Kubnernetes as well as other orchestrators. The Aqua platform drives DevSecOps automation and provides visibility and runtime protection for cloud native workloads, including both host-level and network-level controls. The CIS Benchmarks program is a trusted, independent authority that facilitates the collaboration of public and private industry experts This certification is issued by CIS (Center for Internet Security, Inc.) and reflects proven guidelines that are continuously refined and verified by a volunteer, global community of experienced IT professionals. “Cybersecurity challenges are mounting daily, which makes the need for standard configurations imperative. By certifying its product with CIS, Aqua Security has demonstrated its commitment to actively solve the foundational problem of ensuring standard configurations are used throughout a given enterprise,” said Curtis Dukes, CIS Executive Vice President of Security Best Practices & Automation Group. CIS Certified Security Software Products In order for a product to receive the CIS Benchmarks Certification, a vendor must adapt its product to accurately report to the security recommendations in the associated CIS Benchmarks profile. CIS Certified Security Software Products demonstrate a strong commitment by the vendors to provide their customers with the ability to ensure their assets are secured according to consensus-based best practice standards. The CIS Benchmarks program is a trusted, independent authority that facilitates the collaboration of public and private industry experts to achieve consensus on practical and actionable solutions. CIS Benchmarks are recommended as industry-accepted system hardening standards and are used by organisations in meeting compliance requirements for Federal Information Security Management Act, PCI, Health Insurance Portability Accountability Act and other security requirements.
When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of them have a formal process in place. Large security projects require clear KPIs and targets (including monthly commitments), ongoing review, regular clear communication and a dedicated team for consistency and continuity from start to finish. Major security system Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs If you don’t choose wisely, what you may end up with is company delivering a string of different people from different departments working on your installation at any given time, without a joined up approach. The person responsible for system design, for example, may never see your project when it’s actually being installed, which can lead to a potentially problematic and ultimately unsatisfactory outcome. Whilst every major security system design project will bring about its own set of challenges, the approach taken by the security vendor should remain consistent. Here’s what it should look like at the different stages of the project and what you should expect from your supplier. Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs. Product knowledge Going down this route limits your options and you could end up with a security system that meets the vendor’s product portfolio rather than your needs. That doesn’t mean to say that a security company that is not affiliated to specific manufacturers won’t have close relationships with a range of them. A close relationship can be beneficial in terms of in-depth product knowledge and preferential pricing. What’s most important is that the security company independently test and asses product rather than relying on manufacturers’ claims. They should continually appraise the marketplace to see what’s new and assess the value and relevance of product. They should also have the finger on the pulse of the security sector to identify where the market is going. Team work is essential with large projects not only to get the job done, but also to manage any risk Comprehensive strategy At STANLEY Security we very much focus on identifying technology solutions that minimise financial outlay for a client, such as video analytics. At present we are testing facial recognition systems which have grown in popularity and delivery. A written, comprehensive strategy needs to be in place for the project, including forecasting that considers the longer timescales involved in large, complex projects and includes a ‘what if’ approach to ensure appropriate resource is available. So, for example, if a project looks like it is going to overrun due to unforeseen circumstances, you want to be sure you retain the same team on the project full time and that they are not transferred onto the next contract or dividing their time between the two. Manage any risk Team work is essential with large projects not only to get the job done, but also to manage any risk. Your vendor must have an experienced Major Project Team with a clear structure, so everyone knows their role and you know who you are dealing with at any given time. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate If subcontractors are being used by the security company, which is quite usual for very large installations and for particular specialisms (e.g. control room modelling), then a process needs to be in place to manage them and you need to be made aware of this. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate. High security requirements This is where the dedicated Major Project Team is vital as they will know the project inside out and have worked on it from start to finish, helping to avoid any end of project issues. Large, complex security systems, especially those with high security requirements, are not easy to deliver. They require skilful, experienced hands, substantial resources in both financial and staffing terms, and a clear, consistent procedure that everyone is fully aware of. Don’t assume that just because you are dealing with a large security vendor they will have all of these in place; think like a security professional and ask to see the evidence!
Security teams at casinos and gaming facilities are challenged daily to balance a welcoming and guest-focused attitude with a firm and capable presence to prevent and handle security issues, manage surveillance and security systems, and protect employees, guests, and assets. And all of this needs to be accomplished while complying with strict gaming regulations. An experienced security systems integrator can assist you with many of those challenges, including the very important job of ensuring that the correct security technologies are integrated and installed correctly to avoid downtime and maintain regulatory compliance. On the flip side, partnering with the wrong security integrator can be an expensive lesson with disastrous financial consequences due to system interruptions that can shut down gaming operations. However, selecting the right security systems integrator is not always an easy task. To get the answers you need, you need to ask the right questions. Here’s a list of criteria to help get the search process started. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry 1. Relevant and proven industry experience This may be one of the most important factors for you to research. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry. You wouldn’t hire a plumber to fix your roof or a chef to repair your car, so why consider hiring an integrator without relevant work experience in your specific industry? Does the integrator have experience working with security solutions for casinos and gaming facilities similar to your facility? Have they worked with gaming commissions in your state? Do they have the gaming certifications necessary to ensure your new system is in compliance? And what specific projects have they done – with references you can contact? Even more, look for a systems integrator who has strong relationships with contractors, suppliers, unions and equipment suppliers, as they may need to call on them for assistance during the course of your installation. 2. Security systems knowledge Security technologies are evolving at an unprecedented pace which presents obvious advantages and some hidden dangers. It’s important that you select a systems integrator who not only installs products well – but also works very closely with equipment and software manufacturers to develop new and innovative solutions for the most challenging installations.It’s also important to ask about their procedures and processes for after-hours emergency situations Look for systems integrators that utilise integration and testing facilities to evaluate which system configuration and specific components meet your functionality needs, lighting challenges, resolution and frame rate requirements, and recording accuracy demands to ensure your system provides you with the highest levels of identification while maintaining regulatory compliance. Since no two systems are ever alike, it’s also important to look for custom integration capabilities employing solutions from different manufacturers to ensure you are getting the best possible solution on an application by application basis. 3. Brand loyalty versus conflicts of interest There’s no doubt that security professionals have their preferred brands. This can be based on prior experience, proven reliability, superior customer support, or even personal relationships. But it’s also no secret that price and sometimes spiffs can play a deciding role on which products a reseller recommends. Be specific to ask questions about the systems integrator’s line card – which manufacturers’ products do they actually represent and why? And how do they select specific products for specific applications? If the answers to these simple questions seem vague, there may be more at play than meets the eye. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation. 4. Accelerating resolutions How is the integrator’s firm structured? How long have they been in business? Who will be your daily contact? How long have members of the integrator’s team been with the firm? What experience do they have? It’s also important to ask about their procedures and processes for after-hours emergency situations, as you will likely need service after normal business hours. Find out if they offer on-demand remote system support to address problems immediately, and to accelerate resolutions if and when there is a failure. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation Most importantly, verify that they have technicians who can get to your physical location quickly in the event problems need to be addressed physically in order to keep your property in compliance. Even though it can be overlooked, it’s important to assure the system integrator’s organisational structure meshes well with your general requirements before starting a relationship. 5. Pricing structure Of course, price is important, but while an integrator’s pricing should be competitive, it should be viewed as one of many selection criteria.An experienced systems integrator with casinos and gaming facilities will understand local, state, federal, and tribal regulations A security systems integrator with a proven track record of successfully configuring, installing, and servicing projects like yours, on time and on budget, is worth more than the small amount of money you might save by going with a low-cost integrator. 6. Knowledge of gaming regulations A systems integrator who has experience working with casinos and gaming facilities will understand local, state, federal, and tribal regulations, and will provide you with a gaming surveillance and security solution that minimises disruptions to your operations during its installation and after your new system has been implemented. Along with the requirement standards of performance, quality and reliability, compliance is critical to ensure fluid gaming operations. 7. Adding value with industry references Industry references are invaluable in determining your ideal choice. First, ask them to provide client contacts from their reference list, and contact those individuals. Questions to ask include: Did the integrator clearly understand the reference’s requirements? How did they contribute to the solution? What challenges did they need to overcome? Did the company deliver on time and on budget? How has the system(s) been operating since implemented? How has their support been? Why would you recommend them? A good security systems integrator will take extra steps to ensure your security solution is always working 8. Asking the right questions There are very few security systems integrators who can address all of a casino’s or gaming facility’s needs, but they do exist, and you’ll find them if you do your homework. Look for an integrator that can add value and not just take direction. A good security systems integrator will volunteer ideas to reduce maintenance costs, take extra steps to ensure your security solution is always working, and help save your casino money. Their success will be determined by their initial ability to understand your challenges and deliver the best possible solution to resolve them. And it all starts with choosing the right partner by asking the right questions.
The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), machine learning, cloud-based video management systems and cloud-based access control systems. New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow.The global managed security services market is projected to reach nearly $40.97 Bn, with a CAGR of 16.6% over the next five years Need for education and enhanced security With the increased profile of the industry, one can clearly see that the physical security industry is expanding globally to new consumers; bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols and the need for education. This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership. According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years. Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprised of cloud services at nearly $7B. Sharing security service best practices In September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity. The physical security market will have nearly 18% of the total market opportunity comprised of cloud services These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities. Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions; VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers.Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise Cloud versus non-cloud services The insight that one was able to glean from this information and, that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions. The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition and as such should be addressed across all levels of manufacturing, implementation, and customer utilisation. Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products. Ensuring successful deployment As a SaaS service provider, the technical personnel makeup results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed.Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry. As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions. Data security strategies Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimise attack surfaces, create complex, proprietary associations in a multi-layered and multi-tiered connection throughout the application and lastly ensuring that all communication to and from customers’ devices are encrypted and secured. Implementing a process to protect customer’s data records and facilities begins with mapping out a strategy to secure software and hardware Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests. Addressing cyber threats These tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the manufacturer is providing the latest solutions available in the market.Integration implementation personnel should gain greater knowledge in networks and cybersecurity best practices for their solutions An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises. As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected. It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner. Knowledge of networks and cybersecurity best practices The products and services utilised must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation. However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions.The products and services utilised must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply In most cases, this will mean additional jobs for new higher-level personnel, access to additional services to provide to end users, and an elevation of networking and security expertise within their business. Expanding the reach of physical security These new-found skills and expertise will likely bleed into new markets and expand the reach of the traditional physical security market. It truly is an exciting time to be a part of a rapidly expanding market in the physical security space and to watch the industry react to the growing need for cybersecurity within products and services. In the next four years, there will be new innovations, new investments, and new winners and losers in products and services. It seems clear that those integrators and manufacturers who have begun to create the strategies and products for tomorrow will be well ahead of those who are not actively addressing the need for SaaS products, yet the window to opportunity remains wide open.
Despite any negativity you may hear, Hikvision is optimistic about their role in the U.S. market. “We demonstrate that we can be trusted, and that we should be trusted,” says Jeffrey He, Vice President, Hikvision, and President, Hikvision USA and Hikvision Canada. “We have sound products and technology. Our mission in the security industry is to protect, not to harm. Otherwise why would we be in this industry?” Hikvision is committed to investing in the North American market, where there was ‘positive year-over-year growth’ in 2018 and ‘strong’ sales in Q1 this year, according to Eric Chen, General Manager of Hikvision USA and Hikvision Canada. HikCentral central management software The company’s U.S. focus is shifting from products to solution sales, with emphasis on ‘mid-market’ small- and medium-sized businesses (SMBs). The largest verticals are retail and education, and there are emerging opportunities in the cannabis market. Launch of the HikCentral central management software (CMS) is a component of the company’s solution-sales approach. Launch of the HikCentral central management software is a component of the company’s solution-sales approachMr. He acknowledges the growth of ‘anti-China sentiment’ in the United States and other parts of the world, which he says will impact Hikvision’s operations globally. Specifically, in the U.S., ‘political’ elements impacting Hikvision’s business include ongoing tariffs and a trade war, Congressional calls for export controls and sanctions, and a provision of the National Defense Authorization Act (NDAA) that bans use of Chinese video surveillance products in government applications. Specifying cybersecurity initiatives at ISC West In spite of it all, Hikvision’s message at the recent ISC West show was overwhelmingly positive, and the company also detailed cybersecurity initiatives they say put the Chinese company ahead of many competitors in the industry. Eric Chen came in as General Manager last year; he previously spent a decade working for Hikvision in China. Chen reports solid 18.8% year-over-year growth for Hikvision globally, totalling $7.4 billion last year. He notes the company saw 40% compounded growth between 2010 and 2018. Globally, there are 34,000 employees, 16,000 of whom are research and development (R&D) engineers. Hikvision’s expanding global footprint includes 46 international branches. There are three manufacturing facilities in China, in addition to one in India. HikRewards program for HDP customers At ISC West, Hikvision’s theme was ‘Focus on Your Success’, including introduction of the HikRewards program that provides rebates to HDP (Hikvision Dealer Partner) customers, their core dealer base. A new online Hikvision Knowledge Library for HDPs provides training and reference materials dealers can share with employees. A new tech centre, introduced in December, provides data sheets, product information, and support resources. There is also a North American R&D team headquartered in Montreal. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls A customer satisfaction survey launched in March provided good feedback from customers. “They know who to call if they have a problem,” says Chen. “We want to focus on making customers successful.” The success theme also extends to Hikvision employees, who are featured in videos describing their jobs and enthusiasm for Hikvision. There are some 400 employees in the North American operation. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls. Half of the booth was focussed on solutions, especially retail and education, and also gaming and commercial real estate. Security products displayed at ISC West A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS systemProduct highlights at the ISC West booth included the 32-megapixel PanoVu multi-sensor dome camera, whose 180-degree panoramic image was displayed on a 65-inch monitor. A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS system. Some products new to the North American market, including intercoms, turnstiles, emergency call stations, and under-vehicle inspection, were displayed. Hikvision’s deep learning products are moving into their second generation, including the ability to obscure private information on videos to comply with GDPR/privacy requirements (previewed at ISC West and released later in the year). Algorithm components of Hikvision’s DeepInMind artificial intelligence are being adapted into a platform called AcuSense for value-priced products, which can recognise a human or vehicle and help filter out false alarms. Also being adapted to products with lower price points are the ColorVu system that incorporates visible light LEDs to provide colour images at night, and DarkFighter low-light capabilities. Penetration testing of cameras and NVRs As a global manufacturer, Hikvision faces a high level of scrutiny about cybersecurity, which Mr. Chen says is “a good thing for us,” enabling them to highlight the steps they are taking to improve cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity In September 2017, Hikvision began working with third parties (including Rapid7) for penetration testing (ethical hacking) of its cameras and recorders. That same month, Hikvision set up a Cybersecurity Hotline open to anyone with questions about cybersecurity, including white-hat hackers and researchers. Even before that, Hikvision had an open-door policy on cybersecurity and a program for patching and disclosing responsibility. In February of 2018, Hikvision released a 40-page Cybersecurity White Paper describing cybersecurity testing and processes built into the software development lifecycle. That same month, Hikvision launched an Opened Source Code Transparency Center and offered an open invitation to anyone wanting to inspect Hikvision’s source code and let them know of any vulnerabilities. FIPS 140-2 certification by NIST Hikvision has also become a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA), which ensures their patching and incident reporting programs have been reviewed by a CNA partnering company. Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVRsIn August, Hikvision received Federal Information Processing Standard (FIPS) 140-2 certification, a U.S. government encryption standard created by the National Institute of Standards and Technology (NIST). Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVR products. Davis said the FIPS 140-2 certification process began before the NDAA ban on use of Hikvision products in the U.S. government, and in any case is a standard that ensures a high level of encryption. “We wanted to make sure we had the same level of technology,” he says. “It was not to win over the government.” Making industry more cybersecure “We are really trying to have third parties test and certify our equipment,” adds Davis. “We are trying to be open and transparent. Education and awareness are key.” “We need the trust of customers in the security community,” says Mr. He. “No matter what, we have to follow the highest standards to offset the concerns and accusations.” In April 2018, Davis became a member of the Security Industry Association (SIA) Cybersecurity Advisory Board to help make the entire industry more cybersecure through education, awareness and standards. Hikvision has also joined the Forum of Incident Response and Security Teams (FIRST at first.org), a global cybersecurity incident response consortium that cooperatively handles computer security incidents and promotes incident prevention programs. Davis has presented Cybersecurity Road Shows in 22 cities in the United States and Canada, and also in Australia and New Zealand. The 90-minute presentations focus on education awareness around cybersecurity and seek to get attendees engaged and aware about cybersecurity in business and also in their homes.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm biometrics integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative security technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro intrusion portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping to cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalise on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight hosted managed service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarise system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorised access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT device security management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyses data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyse more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified vendor agnostic software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing connected devices from cyber threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
Knightscope, Inc., a developer of advanced physical security technologies focussed on enhancing U.S. security operations, announced that it is has taken a major step in its commitment to help better secure schools across the country by selecting Clovis Unified School District in California as its beta testing location for a suite of new technologies under development. The Company had prior announced this effort earlier this year when it solicited students to get involved and submit essays on how Knightscope’s fully autonomous security robots could help in a school setting. Security robots to monitor school safety “With over 100,000 schools in the country, we need to develop a new set of tools and technologies as a critical part of our long-term mission to better secure the United States of America,” said William Santana Li, chairman and chief executive officer, Knightscope, Inc. Knightscope’s robots will provide the authoritative presence needed on a school campus and provide actual intelligence by filling in the blind spots"“Being able to utilise a real-world environment to test, sample, and iterate on new capabilities while inspiring students to pursue STEM careers is certainly a winning combination,” continued Li. “As a teacher of thirty years, my philosophy has always been to be proactive instead of reactive, and the idea of security robots monitoring a school is definitely a proactive approach to school safety. Knightscope’s robots will provide the authoritative presence needed on a school campus and provide actual intelligence by filling in the blind spots with their ‘eyes and ears,’” said Clifford A. Nitschke, Jr., AP United States Government and Politics Instructor, Clovis North High School. Trialling a new technology in school safety Mr. Nitschke’s class submitted the winning proposal to Knightscope. “We are honoured to be chosen by Knightscope and to be given the opportunity to pilot a new and exciting technology in the field of school safety.” The Clovis United Unified School District Governing Board is scheduled to meet on January 16, 2019 to formally accept the beta testing program by Knightscope. The meeting is planned to occur at 6:30pm at the Clovis Unified Professional Development Building, 1680 David E Cook Way, Clovis, CA 93611. Assuming an approval by the Board, the parties will determine implementation timing thereafter.
In January 2018, the Mayor of New York, Bill de Blasio and the City’s Security Infrastructure Working Group announced plans to bring permanent perimeter barriers, or bollards, to high-profile sites and to create a process to streamline their design and construction. With funds exceeding $14 million for permanent bollards in Times Square and more than $50 million to commence the broader rollout of new protective measures in phases. Mayor de Blasio said, “In 2017, New Yorkers witnessed the horrible capacity of people willing to do us harm, whether it was in our subways, on our bike paths or in Times Square. But we will not be cowed and our expanded investment today in barriers and bollards in our public spaces underscores our resolve in keeping New York City safe from future attacks. In this new year, we can and will protect our iconic public spaces while New Yorkers go on living our lives, including by hosting a record number of tourists.” “These additional safety bollards will allow New Yorkers and visitors to be more secure at landmark locations and other sites throughout our City,” said Police Commissioner James P. O’Neill.With vehicles becoming a weapon for terrorists, the need to protect citizens has dawned on most large cities Ensuring public security And with vehicles seemingly becoming the weapon of choice for terrorists, the need to protect citizens from 'people willing to do harm' has dawned on most large cities, leaving many still trying to find the best way to protect their citizens. Admittedly in many cases, it seems to be ‘after the horse has bolted’ so to speak. In 2016, a lorry was driven into crowds celebrating Bastille Day in Nice, killing 87 people and injuring 458. This was an awful, cowardly and devastating attack that had a huge impact on so many lives. The stark reality is however, after two previous vehicle attacks in France, if there had had been tougher security measures in place, rather than an increased police presence, and a plastic temporary barrier, then many of those citizens would still be alive today. MacSafe for vehicle incursion prevention Reacting to these devastating events, Metropolis Nice C.te d’Azur decided to install a safety barrier along the Promenade des Anglais. The new barrier, or vehicle incursion prevention system, MacSafe, was tailormade for the Promenade des Anglais by Maccaferri and J&S Franklin. It was inaugurated in July 2017. It is crash test rated to stop a 19-tonne truck travelling at 50km/h and impacting at 20°, equivalent to the vehicle used by the terrorist in Nice in 2016 and can withstand two successive impacts. The system is also accredited by the UIAU (University of Venice). The MacSafe system consists of two high tensile steel cables supported on tubular steel posts and anchored at each end with our patented energy dissipation system. The posts are secured to ground foundations and all external fixings are designed to prevent them being easily removed. The force of the vehicle impact is distributed through the cables and posts and absorbed within the patented energy dissipaters. The energy is absorbed through compressive deformation and not by friction. This ensures better and more reliable performance throughout the long-life of the barrier.Las Vegas plan to have their existing 800 bollards updated to some 7,000 by the end of 2018 Balancing security and aesthetics On the 19th December 2016, a truck was deliberately driven into the Christmas market next to the Kaiser Wilhelm Memorial Church at Breitscheidplatz in Berlin, killing 12 people and injuring 56 others. One year on, and the Christmas Market in Berlin is protected by large concrete barriers, armed police patrols and stop and search checks. In January 2017 in Melbourne, 6 people were killed and 37 injured when a car sped down a footpath crashing into pedestrians, by June 2017 $10 million had been allocated, and temporary concrete barricades and bollards had been installed around the City of Sydney. In January 2018, the City of Gold Coast began installing heavy duty retractable bollards capable of repelling the force of a large heavy goods vehicle. They had previously resolved to spend $515,000 on bollards which met the Australian standard, but on the advice of the QPS Commonwealth Games security adviser, it was recommended that the bollards comply with a European standard bringing the cost of the project to $1.095 million. Las Vegas plan to have their existing 800 bollards updated to some 7,000 by the end of 2018, to increase the safety of those walking The Strip in Sin City. However, some cities are still concerned about the aesthetics of concrete bollards on their historic cities, a case of balancing security over protecting tourism. Physical barriers for pedestrian security Take for instance, Barcelona in Spain. On the 17th August 2017, a van was driven into pedestrians strolling along Las Ramblas, in Barcelona, killing 13 people and injuring at least another 130. Advice was given that bollards were needed, warnings of impeding threats were given, and yet, the action taken was to increase policing levels on the streets. Now, thankfully, there are a few bollards and increased police presence on the streets, and going forward they are “studying the possibility of installing physical barriers to prevent further attacks with vehicles.”Although guard rails would not have stopped either of the London attacks, they can limit the damage In London on 22nd March 2017, a car was driven into pedestrians on Westminster Bridge, killing 5 people and injuring 49 others. The driver also stabbed a policeman to death. Built-in counter terrorism design Again, in London, on 3rd June 2017, a van was driven at pedestrians in the London Bridge Area. Three attackers began stabbing people, before being shot by police. 8 people died. 48 were injured, 21 critically. Controversially previously installed 'Guard Rails' had been removed from London’s streets to protect cyclists and make the Capital more ‘attractive’. Although guard rails would not have stopped either of the London attacks, they could have limited the damage. However, today, protective barriers are erected on Thames bridges and from London’s experience of previous terrorist activities (IRA) there are very few buildings or indeed public spaces that don’t have ‘counter-terrorism’ design inbuilt. Government-initiated guidance The UK Government has produced a 174-page guide, Crowded Places Guidance, that highlights the threat as a vehicle being used as a weapon, but also highlights that these threats can be “mitigated by installing physical measures (including blending into the landscape or streetscape) which may be passive (static) or active (security controlled). These measures can be installed either on a permanent or temporary basis. All such measures should meet appropriate standards in terms of their vehicle impact performance, design and installation.” Vehicle security barriers, need not be ugly concrete monstrosities. Nor do they need to be concrete lumps that need huge lifting gear to place them. They can be totally inconspicuous, letting everyday life continue and forgetting they are there, or full on ‘in your face’ shouting a warning to would be terrorists that this area is safe.Planters can be installed quickly and are sited to allow pedestrians to pass through while vehicles can’t PAS68 Street Planters They come in many guises, from retractable bollards and passive static bollards to street furniture. Even cleverly disguised PAS68 Street Planters from Securiscape, which have an attractive floral display whilst cleverly acting as a security barrier. These planters can be installed quickly and are sited to allow pedestrians to pass through while vehicles can’t, but due to intelligent design, incorporating a surface mounted, reinforced structure which can stop a vehicle if it is used as a battering ram. But if none of that appeals, then there are many landscaping options, including, ditches, bunds and berms. DefenCell mesh gabion DefenCell by J&S Franklin, is a lightweight geotextile welded mesh gabion that once filled with locally available materials, can be incorporated into security measures for public places and protection. Filled and stacked, these gabions can be covered and planted, maintaining the aesthetic and environmental considerations of high profile or sensitive locations. Sadly, people with ‘evil intent’ are a fact of life. Which makes vehicle security barriers a permanent part of our city landscapes. So, whether hidden or in plain sight they will be there be to Protect and Protect again.
To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, a new smart IoT industrial park in Hangzhou has been put to use by Dahua Technology, a video surveillance solution provider. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Efficient information integration The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialised requests and ever-changing reality.The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production(preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning high-end devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools, etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. Fast processing According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35 multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. Dahua Smart Industrial Park provides the great benefit of internal synergy The faster speed also applies to the development of new molding, since Dahua Smart Industrial Park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organising system is supported by topnotch equipment, such as MAKINO high-speed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005MM, while also supporting CAD / CAM / CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days.Higher quality results in less likelihood for products to malfunction especially when they are used in critical situations Time- and cost-saving solution By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors, etc., all of which proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, not-allowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons: first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, Dahua has put together an effectively closed loop for quality control in the manufacturing process. Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example: it can process components, in metric size, as small as 03015(0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry.Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process Enhanced vision and intelligent analytics Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high-definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognise flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.In the future phase, this industrial park is expected to be more intelligent to enable a safer society and smarter living Safe society and smart living Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialised needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialised use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one. And in the future phase, it is expected to be more intelligent, to realise client-centred flexible production and to enable a safer society and smarter living.
ip.access has announced a collaboration with Imaginet, a provider of IT network and security solutions, to implement a rapidly deployable disaster response network in Makati City, the Philippines. Makati City, part of the Metro Manila region, is the main financial hub and has a population of 6 million people. Built on a drained mangrove swamp, the city’s infrastructure is at a high risk for significant damage in the event of an earthquake, typhoon or other natural disasters. In the event of a disaster it is likely that communications infrastructure would be affected – hindering efforts to direct the population to safety and locate people trapped in collapsed buildings. To improve the city’s preparedness for natural disasters, the local Disaster Risk Reduction & Management Office (DRRMO) worked with Imaginet to implement a rapidly deployable mobile network. Deployed via four command vehicles, the network will allow first responders to communicate with the population and report back to the central command office.The ip.access team has an inherent understanding of disaster situations, with extensive experience working in harsh environments Ensuring disaster preparedness Basing the network on 2G technology, to ensure that signals would be capable of penetrating collapsed buildings and enabling communication through SMS messaging, ip.access was tasked with designing, installing and testing the network in a tight six-week window. Following a successful commissioning period, the four command vehicles were first deployed in December 2017. Commenting on the partnership, Blair Duncan, CEO at Imaginet, said, “This was a challenging technical undertaking. As such, we needed confidence that we were working with a partner that could deliver a high quality solution. In that respect ip.access were an ideal partner – the team has an inherent understanding of disaster situations, with extensive experience working in harsh environments. We knew that we could rely on them to equip our vehicles with the robust and reliable radio network the DRRMO requires should a disaster strike.” Small cell solutions Nick Johnson, CTO at ip.access added, “We have a wide range of award winning commercial off-the-shelf (COTS) small cell solutions that can be easily integrated and operated within a wide range of specialist deployment scenarios – including in disaster response settings.” “Communication is critical in a disaster situation, so the fact our proven solutions deliver five nines availability with exceptional reliability makes them ideal for applications like the vehicle-borne network in Makati City.” Due to the success of the vehicles, the Makati City DRRMO is now looking to increase its fleet to nine vehicles to enable more flexibility and more robustness in its disaster readiness.
Muir Group Housing Association, which manages more than 5,500 homes across the country, has formed a new partnership with OpenView Security Solutions, a national supplier of electrical and mechanical services, to further enhance the level of services to residents. The contract started on 1st June 2017 and OpenView Security Solutions is providing a range of specialist services including PAT testing, fire risk assessments and the ongoing maintenance of fire alarms, emergency lighting, door entry systems, automatic doors and barriers. The transfer of these services from the previous contractor was efficiently achieved by both organisations. Residential safety and security According to Mike Proudfoot, Maintenance manager at Muir Group Housing Association, “This partnership will be very important in ensuring that we maintain our ongoing commitment regarding the safety and security of residents. As a landlord, OpenView’s involvement will be crucial in helping us to meet our obligations and the long-term benefits will be positive, both for Muir residents and the housing association as a whole.” Andy Ward, Sales Director at OpenView Security Solutions, added, “We are excited about embarking on a new era with Muir Group Housing Association. With extensive experience of working closely in partnership with housing associations, Openview understands the importance of ensuring that all equipment is working efficiently at all times and is committed to providing the highest quality service to the organisation and its residents.”
Round table discussion
Sometimes you see it coming and want to scream out: “Don’t do that.” We all make mistakes, but it’s hard to sit and watch others as they go down the wrong path. It’s especially difficult when the errant party is a customer, and when their wrong move might somehow end up reflecting badly on you as a technology or security systems provider. Much better to anticipate the problem by expecting the possible mistake before it happens. We asked this week’s Expert Panel Round Table: What is the biggest mistake you see your customers make when it comes to buying or installing security or surveillance systems?