PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of EAGL Technology to its Managed Security Service Provider Program (MSSP). EAGL Technology is a manufacturer of indoor/outdoor IoT wireless gunshot sensors, as well as sensors that can detect vape, car collisions, flood waters and critical infrastructure failures. Active shooter threat detection “EAGL produces solutions that address today’s real-world securi...
Electronic Security Association’s (ESA) National Training School has launched a valuable new tool to help employers with one of the biggest challenges faced when hiring new security technicians, gauging practical areas of proficiencies. Gauging proficiency areas “Many other professions use skills assessments to verify computer or accounting expertise, for example, so the Electronic Security Association felt with the thousands of test questions we have available from our courses tha...
PSA, one of the world’s largest consortium of professional systems integrators, announced the addition of Dedrone to its Managed Security Service Provider Program (MSSP). Dedrone is a solution provider in the airspace security. “Dedrone provides early warning, identification, location, and mitigation against all drone threats,” said Tim Brooks, PSA’s Vice President of Sales and Vendor Management. “As the market and technology leader in airspace security, Dedrone is...
HelpSystems announced the acquisition of Digital Defense, a provider of vulnerability management and threat assessment solutions. Digital Defense’s cloud-native vulnerability scanning engine gives organisations in healthcare, legal, financial services, and other industries the ability to proactively detect infrastructure security gaps and take effective remediation steps to safeguard against internal and external cyber threats. As part of HelpSystems’ cyber security portfolio, Digit...
SecurityCEU.com announced that they will begin hosting content related to Smart Home and Audio/Video, in partnership with Bedrock Learning. Online courses will be available on the SecurityCEU.com official website, starting February 3, 2021 and will be part of a unique Smart Home and AV Bundle, and an AV Selling Skills Bundle and available as individual courses as well. All online courses will be approved for CEUs at the national and state level for licence compliance. Smart Home and AV content...
Acronis, a pioneer in cyber protection, unveils the details of the new Acronis #CyberFit Partner Programme. This update to the company’s existing programme places increased emphasis on supporting partner development, particularly for cloud-based services, while rewarding service providers and resellers for their expertise, commitment, and growth with Acronis through performance-based benefits and financial compensation. Acronis’ cloud ecosystem has more than doubled since 2018 and l...
Tavcom Training, part of Linx International Group, the globally renowned provider of accredited security systems training courses, has announced the launch of the first in a series of virtual classroom training courses added to its classroom training portfolio, starting with two fundamental courses, Intruder Alarm System Design BTEC Level 3 and CCTV System Design and Planning BTEC Level 3. Virtual classroom training courses Delivered via Zoom through online interactive lectures and workshops and guided by the same expert instructors as the classroom courses, learners will have the chance to gain an accredited certification in a live environment, without having to travel. We understand a lot of our learners come to us for the high standard or training we deliver here at Tavcom" Andrew Saywell, Business Development Manager for Tavcom Training said, “We understand a lot of our learners come to us for the high standard or training we deliver here at Tavcom, and we wanted to find a way to provide that high standard of classroom learning to the many who are not able to travel.” He adds, “Our new virtual classroom courses are a crucial solution to this. Delivered by and in partnership with our lead tutors, they are fully interactive and designed to provide professionals with the necessary skills required to carry out the key elements of their job role.” Enhancing accessibility to Tavcom Training courses Andrew continues, “The launch of our accredited virtual training courses is just one in a series of latest developments that we are implementing in order to increase the accessibility of Tavcom Training courses to learners globally. Now more than ever it is easier to gain a worldwide recognised qualification.” Not only will learners interact with the class and ask questions as they would in a classroom, but they can expect to receive all the typical benefits of traditional face-to-face training including full tutor support, training resources, and protected soft copies of the learning material distributed prior to course commencement. Intruder Alarm System Design BTEC Level 3 course Intruder Alarm System Design BTEC Level 3 training course is the first course in Tavcom Training’s classroom training portfolio to be delivered virtually. It is an essential course for technical specifiers, sales engineers and consultants, who wish to work lawfully within the new legislative guidelines and to determine the risk assessment of each installation. Learners who opt for the course will be taught the skills required to carry out risk assessments and surveys, in accordance with the current British and European standards and in combination with design and planning exercises that will introduce all the necessary new grading requirements. Intruder Alarm System Design is scheduled to take place virtually from the 15th - 17th February 2021 and will cover the following core topics: Completing security risk assessments, An overview of detection devices, Control and indicating equipment, Signalling devices and considerations, Planning and design of systems, European Standards explained, Insurance requirements, Alarm verification techniques, Equipment grading criteria, Producing system proposals, Practical site surveys. Learners can expect to undertake focused morning and afternoon classroom sessions, intersected with project work that requires a level of independent research. CCTV (VSS) System Design and Planning BTEC Level 3 course The other training program on offer is the CCTV (VSS) System Design and Planning BTEC Level 3 course Along with this, the other training program on offer is the CCTV (VSS) System Design and Planning BTEC Level 3 course. This training course is specially offered for all those who have the task of designing and planning small or large CCTV systems, while ensuring compliance with the latest international standards. This training course will provide learners with the experience and knowledge required to offer solutions to a variety of client’s CCTV requirements. The course will be of particular interest to technical specifiers, security consultants, sales personnel and CCTV system project managers. The CCTV System Design and Planning course is scheduled to take place virtually from the 15th - 18th March 2021. Throughout the duration of the training course, learners can expect to cover the following core topics: Overview of CCTV technologies and products, Developing an operational requirement, Risk assessment and site surveys, CCTV system design and product selection, Effective lighting for CCTV applications, Legislation, industry standards and codes of practice, System planning – costing, installation, commissioning, maintenance, System documentation – specification, drawings, commissioning and handover, Writing the system proposal, The Tender Process – pre/post tender meetings and presentations. Live virtual classrooms Delivery in a live virtual classroom has many of the benefits of face-to-face learning" Kevin Matthew, Operations Director for Tavcom Training, said “Delivery in a live virtual classroom has many of the benefits of face-to-face learning, without the inconvenience of travel. This is a very important consideration for those whose need for accredited, quality training hasn’t changed, but their ability to join a classroom course has.” He adds, “Learners will participate in the same way that they would in the classroom, with interaction with each other and the qualified course tutor, as well as receiving the high standard of learning and support associated with Tavcom Training.” Formal CPD points awarded on course completion Kevin continues, “This is just the start of a series of virtual classroom courses we are looking to develop in order to meet the changing needs of our professionals and is something we’re very proud of here at Tavcom Training.” Prices for the Tavcom training courses start from £395 (excl. VAT), which includes a formal BTEC accreditation. Upon completion of the course, learners will also receive formal CPD points (Continuing Professional Development), which count towards their continued professional development within the sector.
Heald Ltd., a global innovator in the field of perimeter security technology and one of the major manufacturers of quality security equipment in the United Kingdom, has announced a new partnership agreement with university technical college, Ron Dearing UTC. Since being founded over 30 years ago, the Hornsea-based manufacturer has worked closely with various educational institutions including Hornsea School and Language College, Humberside Engineering Training Association, Beverley College, Hull Training and the University of Hull by providing career insight talks, work experience opportunities, apprenticeships and ongoing learning for their existing employees. Heald - Ron Dearing UTC partnership This new partnership with Hull-based Ron Dearing UTC will provide new opportunities for students to undertake internships and work experience placements with Heald with the potential for longer-term employment opportunities. With many different engineering disciplines within the company, Heald hopes to help guide learning at Ron Dearing UTC to include their specific engineering requirements, which will enable new employees to progress much quicker into full-time employment from apprenticeships or trainee levels, there by benefitting both the individual’s career progression and the business offering. Glenn Jensen, Senior Assistant Principal for Employer Engagement and Head of Engineering at Ron Dearing UTC said “It’s a great credit to Heald that, during such difficult times, they continue to see the importance of investing in their future employees.” Bridging skills gaps in the engineering and digital sectors Having this new partnership helps us to continue to bridge skills gaps in the engineering and digital sectors" Glenn adds, “It’s invaluable for us to have realistic client briefs when working on projects linked to industry and these play a key role in expanding our students’ skill sets. Having this new partnership helps us to continue to bridge skills gaps in the engineering and digital sectors.” Managing Director of Heald Ltd., Debbie Heald MBE said, “I only recently became aware of Ron Dearing UTC, but after discovering more about what they do and their approach to learning, it seemed a natural fit.” Facilitating students engagement with employers Debbie adds, “With education settings and student’s learning facing significant disruption in recent months, engaging with local schools, colleges and universities is vital to ensure students are able to access meaningful engagement with employers.” She further stated, “In turn, this not only helps them to decide on what they wish to do post-education but it also helps them to transition into their chosen career path, and as a result, can be an excellent recruitment pipeline for those businesses who do engage. We’re very excited about our new partnership with Ron Dearing UTC and we’re looking forward to working with local individuals who are passionate about engineering in every field.”
Exabeam, the security analytics and automation company, announced a partnership with Snowflake, the Data Cloud company, to augment Snowflake data lakes with Exabeam security analytics and automation. The partnership enables organisations to identify risks and respond swiftly to incidents across their entire business ecosystem. The COVID-19 pandemic has accelerated digital transformation, expediting the move to the cloud and increasing demand for improved productivity and efficacy through automation. Organisations can now quickly move data and security to the cloud by migrating to Snowflake Data Cloud and Exabeam SaaS Cloud. Automating workflow Security teams can quickly detect, investigate and respond to complex threats with the help of analytics and automation skills By adding the analytics and automation capabilities of Exabeam to the data stored within Snowflake, security teams can quickly and efficiently detect, investigate and respond to complex threats. The combination of both solutions advances an organisation’s security posture by automating the entire workflow from data collection through response, enabling fast and consistent outcomes. Cloud-based security analytics “With demand for cloud technology surging amid the shift to remote working, we proudly welcome Snowflake to our partner network,” said Adam Geller, Chief Product Officer, Exabeam. “Using the combination of the Exabeam Cloud Connector for Snowflake with Exabeam Advanced Analytics, joint customers can easily apply intelligence and automation capabilities to their data stored within Snowflake's platform. This addresses the increasing market need for cloud-based security analytics on third-party logs sent to Snowflake.” Identifying cyberthreats “Security data continues to grow in size and complexity, and a fragmented architecture keeps many organisations struggling to mobilise it for protecting the enterprise,” said Omer Singer, Head of Cybersecurity Strategy at Snowflake. “Snowflake’s unique architecture eliminates data silos, providing organisations a single scalable and cost-effective platform for all their data, while Exabeam’s security analytics adds intelligence and automation to strengthen an organisation’s ability to identify and respond to cyberthreats across subsidiaries, geographies and public cloud providers.” Case study In 2020, several large-scale corporate data breaches centered around compromised credentials of cloud-based data stores. In one example, more than 5 million guests of Marriott hotels were impacted when cybercriminals stole the login credentials of Marriott employees, likely through phishing or credential stuffing. The information was then used to siphon personal customer details such as birth dates, contact information, as well as hotel and airline loyalty program accounts. Technical integration Exabeam provides real-time mapping of logs stored within Snowflake and attributes all activity and behaviour to users and devices Combining Exabeam’s security analytics with Snowflake’s data platform can provide protection against credential-based attacks, including insider threats. The technical integration between the Exabeam SaaS Cloud and Snowflake Data Cloud is done through the new Exabeam Cloud Connector for Snowflake, which allows for easy ingestion of data stored in Snowflake. Exabeam provides continuous, real-time mapping of logs stored within Snowflake and attributes all activity and behaviour to users and devices. This attribution, with additional data and context, provides visibility into abnormal or risky activity to detect malicious insiders or attacks involving compromised credentials. As a new addition to the 40-plus existing Exabeam Cloud Connectors, the Cloud Connector for Snowflake also allows for monitoring of Snowflake audit logs in Exabeam Advanced Analytics to detect anomalous account behaviours within the application itself. Assisting security operations “The proliferation of data is central to all businesses, and so is the need to guard against malicious attacks – especially now, as enterprises rely so heavily on data clouds like Snowflake,” added Chris Stewart, Senior Director, Business Development for Exabeam. “This partnership advances our mission to assist security operations teams in quickly detecting, investigating and responding to incidents throughout the enterprise.”
ASIS International, the association for security management professionals, announces that since the launch of the program in November 2020, the ASIS Foundation has awarded more than 120 COVID-19 support grants to its global membership. This is a major component of the association’s efforts to address the global economic climate and those security communities hit hardest by the pandemic. The ASIS Foundation Board of Trustees approved $100,000 in grants to be awarded to ASIS members in need, encouraging individuals who had been financially impacted by the pandemic to apply for a grant to renew their ASIS membership free of charge or to receive a complimentary online certification study program. Facing unprecedented challenges Grant applications are reviewed by ASIS staff and all application materials remain confidential This program will continue through March 2021. Grant applications are reviewed by ASIS staff and all application materials remain confidential. “Giving back to the security community is what the ASIS Foundation does best,” said Brian Allen, CPP, Chair, ASIS Foundation Board of Trustees. “We recognise that security professionals around the world have faced unprecedented challenges and need support. I thank my fellow ASIS Foundation board members for their agility in addressing the challenges faced by our members throughout the world.” Highlights from the program thus far include: 124 grants awarded to date, to recipients in 27 countries 76% of grants received were used for the renewal of ASIS membership 50% of grant recipients are located outside of the United States 24% of grants received were used for certification review courses Higher medical bills Recipients’ stories range from those who got COVID-19 themselves and now face high medical bills, to those who have endured pay cuts up to even 50 percent, those who have been furloughed for a month or more, or those who have lost their jobs all together. Applicants come from a variety of positions—from front-line to senior level and business owners. Many worked in event security, hotels, airlines, and other industries that have been very hard-hit by the pandemic. “This is a great example of ASIS leaving no security professional behind during these challenging times,” stated John Petruzzi, Jr, CPP, President, ASIS International. “On behalf of our members in 158 countries, I would like to thank the leadership of the ASIS Foundation for their support of our global network of security professionals.”
Allied Universal, a renowned security and facility services company in North America, announces the reappointment of Caress Kennedy to the New York board supporting the Workforce Innovation and Opportunity Act (WIOA), which is part of the U.S. Department of Labour. The Board, in partnership with the Mayor, provides overall policy guidance and oversight on the implementation of WIOA in New York City. A member since 2014, Kennedy was reappointed to the board for the remainder of WIOA’s three-year term. Public workforce system “I am very excited to be reappointed as part of the executive committee of WIOA in New York City and look forward to working with fellow members to strengthen and improve the city’s public workforce system and help get New Yorkers, including youth and those with significant barriers to employment, into high-quality jobs and careers,” said Kennedy, Regional President, Northeast Region, Allied Universal. “My work with WIOA is truly rewarding because the organisation provides the opportunity for people to find careers through training, education and support services which gives them the ability to succeed in their lives and to care for their families.” Support services The Board represents a vital link to improve the City’s workforce to meet the needs of the industry The WIOA is designed to help job seekers access employment, education, training, and support services to succeed in the labor market. It also aims to match employers with the skilled workers they need to compete in the global economy. WIOA was signed into law on July 22, 2014. The work of the Board represents a vital link to improve the City’s workforce to better meet the needs of business and industry. As President of Allied Universal’s Northeast Region, Kennedy has oversight of more than 26,000 security professionals in eight states. Kennedy previously was Managing Partner for the Northeast Region at AlliedBarton Security Services, which merged with Universal Services of America to form Allied Universal in 2016. Responsibility and position Prior to joining the company in 2011, Kennedy held senior-level positions where she was responsible for regional and national operations at COMSYS, Global Employment Solutions, Norrell Corporation, Thomson Financial and Xerox.
With an industry predicted to be worth $42.8B by 2025, drones continue to transform a number of industries, from medical and agriculture to transport and construction. Now, there is a unifying global awards scheme recognising best practice drone work (also called UAS or UAV). Association of Remotely Piloted Aircraft Systems (ARPAS-UK) is introducing the Airwards: a not-for-profit awards platform which champions the breadth of pioneering work accomplished with drones. A first digital awards scheme of its kind to recognise the wide variety of positive drone use cases, submissions to Airwards are open until mid-March 2021, with winners announced in May. The award categories span a number of uses and sectors, including Technology, Operations, Supporting Services, specific Industries/Fields and Giving Back, with a People’s Choice category voted for by the public. Advance the drone industry Airwards will be looking for outstanding examples where drones are leading the way in innovation, responsibility and impactful real-world solutions. We’re on a mission to advance the drone industry by championing the broad range of positive drone use cases" Airwards founder, Richard Nichols, says: “We’re on a mission to advance the drone industry by championing the broad range of positive drone use cases from across the globe. 2020 proved a pivotal moment for the drone industry, so we believe the time is now for companies to come together and share their impactful drone work." Airwards categories "Airwards was established not only as a way to bring the drone community together in one place, encouraging cross-industry collaboration, but also to raise awareness of positive drone uses with the wider public - ultimately working towards greater public acceptance of drones. We’re really looking forward to finding some incredible drone projects in our inaugural year and showcasing the inspiring stories behind them.” As a global drone awards platform, Airwards, is open to a range of individuals and companies, including drone specialists transforming an industry, startups using drone technology for creative solutions, and large corporations driving innovation. Awards are grouped by discipline, with entries to the ‘Technology’, ‘Operations’, ‘Supporting Services’ and ‘Industry/Field’ categories starting from £49 for startups. Airwards eligibility & criteria ‘Giving Back’ is free to enter and ‘People’s Choice’ is by nomination-only and voted for by the public. For the full category list, one can visit the Airwards website. Entrants must successfully meet the Airwards eligibility to be able to enter, which includes relevant permits and licences for the project in the country of origin. Amongst others, the three main criteria the Airwards judges will be looking for, are: Innovative: Promoting pioneering ideas successfully challenging what a drone is / can be. Responsible: Recognising the key aspect of safety in every drone flight to advocate legitimate behaviour as a standard best practice. Real-world: Asking the question: ‘How are drones making a difference?’ by demonstrating quantifiable outcomes and tangible solutions. Full Airwards category list Airwards launched in 2020 in association with ARPAS-UK, the not-for-profit trade association for the UK drone industry. Judges will be revealed in due course. Entrants will have from until 12 March 2021, with winners announced late May 2021. For more details on entering, eligibility, pricing, judging criteria and FAQs, one can visit the Airwards official website. Technology Counter Drone Systems (Anti-Drones) Sensors and Payload Software - Captured data management and analysis Software - Enabling flight and operational management Operations Airspace Management Delivery Survey and Inspection Supporting Services Consultancy Insurance and Financing Repair and Maintenance Training and Certification Industry/Field Agriculture Construction and Planning Defence, Security and Surveillance Energy Media, Events and Creative Medical and Healthcare Transport Giving Back Conservation and Environment Education and Research Emergency Response and SAR Humanitarian Aid and Disaster Relief Public Safety People’s Choice Organisation - External Advocate Organisation - Startup Organisation - SME Organisation - Enterprise Person - Rising Star Person - Industry Impactor Person - Disruptor
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organisational level within businesses, they also value PenTesting under the premise that it allows them to identify security vulnerabilities before cyber criminals can. There are some regulatory requirements like PCI-DSS that require penetration assessments as part of their PCI compliance. However, many organisations have come to over-rely on PenTesting, thinking that if all the issues were identified in a PenTest, they’re good to go. Not only is this not helping them improve their security posture, it is also leaving them with a false sense of security. A penetration test is a simulated, live attack on your environment by a white-hat hacker What is PenTesting? A penetration test is a simulated, live attack on your environment by a white-hat hacker, customised to address specific problem areas, such as web-based applications, mobile applications and infrastructure services like border VPNs and firewalls. The PenTest may include different types of attacks based on the requested scope from an organisation so that the tester attempts to come at each system from all sides, the way a cyber-criminal would. The goal is to identify which systems and data the tester was able to access and how an organisation can address the vulnerabilities that allowed them to get in. The limitations of PenTesting There is great value in performing periodic PenTests, which is why PCI DSS and other security standards mandate them. However, PenTesting has three significant limitations: PenTesting does not provide solutions Let’s be honest: No one likes reading technical reports, but typically, that's the only deliverable provided by a PenTester. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability. The tester may miss some things, or not clearly convey their findings. Additionally, a PenTest is a snapshot in time and the PenTester could miss changes in the systems, configurations, attack vectors and application environments. Even if your system “passes” a PenTest, will it crumble in the face of a brand new, more powerful attack vector that emerges a week later? The worst type of “PenTest report” consist of an analyst producing nothing more than the results of a vulnerability scan. Even if the PenTester produces a well-written, comprehensive report filled with valuable, actionable information, it’s up to your organisation to take the action, which leads to the next limitation of PenTesting. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability PenTesters only exploit vulnerabilities and do not promote change PenTesting does not highlight the missing links in your organisation's technology stack that could help you address your security vulnerabilities. This is often in the guise of being agnostic to the technologies that exist because their expertise is only offensive security – unless, of course, the performing company has “magic software” to sell you. PenTests also do not help to develop your organisational processes. Additionally, they do not ensure that your employees have the knowledge and training needed to treat the identified fixes. Worst of all, if your in-house expertise is limited, any security issues that are identified during a PenTest aren't validated, which leads to a misrepresentation of their magnitude and severity while giving your team a false sense of security. PenTesters are self-serving Too often, PenTesting pits the assessment team against the organisation; the goal of the assessment team is to find the best way to "shame" the business into remediation, purchasing the testing company’s “magic software”, then call it a day. Once the PenTesters find, for example, a privilege escalation or a way to breach PII, they stop looking for other issues. The testers then celebrate the success of finding a single “flag”. In the meantime, the business is left in a precarious situation, since other unidentified issues may be lurking within their systems. Shifting the paradigm of PenTesting The goal of PenTesters is to find the best way to "shame" the business into purchasing the testing company’s “magic software”, then call it a day Penetration testing can uncover critical security vulnerabilities, but it also has significant limitations and it’s not a replacement for continuous security monitoring and testing. This is not to say that all PenTesting is bad. PenTesting should be integrated into a comprehensive threat and vulnerability management programme so that identified issues are addressed. The purpose of a mature vulnerability management programme is to identify, treat and monitor any identified vulnerabilities over its lifecycle. Vulnerability management programme Additionally, a vulnerability management programme requires the multiple teams within an organisation to develop and execute on the remediation plan to address the vulnerability. A mature threat and vulnerability management plan takes time and is helpful to partner with a managed security services provider (MSSP) to help you in the following areas: Improve your cyber-risk management program so that you can identify and efficiently address vulnerabilities in your infrastructure, applications and other parts within your organisation’s ecosystem on a continuous basis; Perform retests to validate any problems identified through a vulnerability scan or a PenTest assessment; Ensure that your in-house staff has the knowledge, skills and tools they need to respond to incidents. Cyber risk management and remediation is a "team sport." While periodic testing conducted by an external consultant satisfies compliance requirements, it is not a replacement for continuous in-house monitoring and testing. To ensure that your systems are secure, you must find a partner who not only performs PenTesting but also has the engineering and development experience to assist you in fixing these types of complex problems in a cost-effective manner and ensuring that your systems are hardened against tomorrow’s attacks.
The drive for learning doesn’t diminish, even in times of a global pandemic. To accommodate the demands of social distancing, more training today happens online. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organisations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a U.K. training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Expert security training Topics such as CCTV, Access Control, Intruder and Fire Tavcom Training, part of the Linx International Group, provides technical security training delivered by expert tutors on topics such as CCTV, Access Control, Intruder and Fire and also CCTV Control Room and Security Management. Given the practical nature of the courses, the majority have historically been delivered in a state-of-the-art training centre through interactive workshops. However, in order to best protect their staff and learners, and following government guidelines, Tavcom have closed their training centre for the time being. Learners are still able to book into classroom courses for later in the year with a choice of two learning centres now being offered: Hampshire or the recently established training centre in Shipley. For those who prefer to learn online, Tavcom delivers accredited online security training. “Given the situation we are all in at the moment, our online courses have seen an 86% increase in demand over the last several months,” says Alfandari. All online courses offer the same level of support as the classroom courses, with many accredited to BTEC level 3 and 5, catering to professionals of varying skill levels and experience. Improve your professional development “Our online courses remain as accessible as ever, with huge numbers of security systems engineers and professionals seeking to use this [quarantine] time to improve their professional development,” Alfandari says. “We encourage all people to consider the benefits of eLearning and, if they need any advice, to reach out to the Tavcom training team.” It’s more important now than ever before that learners are able to access Tavcom’s online learning programmes and continue in their professional development, he says. To help facilitate learning, the company has discounted 25% off the portfolio of eLearning courses, many of which are BTEC accredited and come with expert tutor support. We are also introducing new interactive ways of teaching traditionally classroom-based courses" “We are also introducing new interactive ways of teaching traditionally classroom-based courses with the aid of Zoom virtual classroom courses, led by our tutors,” says Alfandari. “From the learner’s own home, they will be able to undertake their chosen training course and return to the training centre later in the year to complete the practical assessment.” Skillsets remain in demand Even the most well-prepared organisations with extensive contingency plans have been stunned by the scale and speed of the current situation. Alfandari says: “We are finding especially our Intruder Alarms courses for repair and maintenance engineers have been exceptionally popular; those skill sets remain as in demand as ever in these troubled times.” A sister company, PerpetuityARC Training, offers Security Management BTEC Level 4 and Risk, Crisis and Disaster Management BTEC Level 4 courses that are purposely designed to help businesses and those responsible for security learn how to identify threats, risks and vulnerabilities, and create a comprehensive plan that will enable practical measures to be applied to mitigate the impact. Both courses run via two media: classroom or online and are tutor-supported so learners have a choice according to what best suits their needs and requirements. An online Essential Security Practices course is comprised of 12 modules designed to introduce the essentials of corporate security. Modules can be bought individually or as a whole course and will establish fundamental knowledge of best security practice. “It’s a great starting place if you’re new to security or want to brush up on your expertise,” says Alfandari. Maintaining a security presence is a challenge during a global pandemic. “With people following guidelines by staying at home, we’ve been working hard to drive the message that learning doesn’t stop just because you can’t go out,” says Alfandari. “People may think that because they can’t get to the training centre then they can’t train, but that’s just not the case.” Learning in these unprecedented times Our training centres may be closed for now, but our courses are still very much running" Between Tavcom Training and PerpetuityARC Training, there are more than 20 distance learning courses including ASIS International and The Security Institute, all of which can be accessed at home, at a learner’s own pace. “It’s important that people understand that we’re still here, still available and that we haven’t ‘gone away’,” says Alfandari. “Our training centres may be closed for now, but our courses are still very much running. “ “These are, without doubt, extremely difficult times,” he adds. “We are here for our learners. Our team are working hard behind the scenes to facilitate the best possible learning experience during this time, and we encourage all potential learners to really use this and make the most of it. Whether you want a refresher in security basics or finally to start on that qualification you’ve been putting off, we are here to help you in your professional development.” Rhiannon Limbert, Marketing Coordinator for Linx International Group, contributed to this content.
Kurt Takahashi, the new CEO of Pelco, says he will provide collaborative leadership to help build the Pelco team, work together hand-in-hand with team members, remove barriers and lead the company forward. He brings industry experience and relationships to the new post that will translate into new opportunities. Takahashi joins Pelco from AMAG Technology, where he served as President for the last couple of years. Earlier, he had stints at ADT, Tyco and Quantum Secure, where he was Global Vice President of Sales and Marketing. “This was an opportunity to join a brand that has deep, rich and far-reaching history,” says Takahashi. “I couldn’t resist the opportunity to come into a company such as Pelco and be able to make a difference.” Improving the fundamentals Takahashi acknowledges that Pelco has slipped in the last 10 years from its position as a market-leading brand. To address the situation going forward, the company must “improve fundamental things,” he says. Those fundamentals include keeping the customer first, putting the right people in the right roles, and executing technical support well. Keeping the customer first, putting the right people in the right roles, and executing technical support well “We have to provide customer service from when we receive an order, to acknowledging it, to processing it and shipping the order,” says Takahashi. “Another piece is to deliver revisions to a product in a faster time period and introduce new products to the market in a timely way. In terms of market presence, we learn that people haven’t really heard from Pelco in a while. We have to get in front of integrators and consultants more aggressively than we have in the past.” “It’s up to us to prove that we belong and can sustain and support customers moving forward,” he adds. “We will get new opportunities, but we will need to execute them. If we do that, we will grow.” Brand optimism Takahashi sees more reasons for optimism. “In spite of the problems, we are a big company with thousands of customers, a massive footprint, 10 offices around the world and people in over 40 countries. We are a strong, known brand around the world. These are a great foundation to grow from; we just have to execute better.” These are a great foundation to grow from; we just have to execute better Pelco’s new parent company, Transcom Capital Group, was another reason Takahashi was attracted to the position. He says Transom is led by “amazing professionals” that specialise in “transformational culture and how to diffuse best practices in an organisation.” At Pelco, Transom has already led surveys, workshops and focus groups throughout the organisation to create a vision, mission and values covering how the company wants to present itself in the market. From those values will emanate new process and policy improvements to move the company in the right direction. New visions and missions The company’s new, collectively developed vision is “to make the world safer.” The mission is “to deliver distinctive video solutions and world-class customer experiences.” The company’s new, collectively developed vision is “to make the world safer.” The company’s culture is built on six values: innovation and excellence, customer focus, integrity, respect and recognition, collaboration, and ownership. “We believe this is what will help drive our culture moving forward, and it’s the mindset of all of us as one team with one goal that will give us something to be proud of,” says Takahashi. “As we move into the new era of Pelco, you will see excitement internally and externally,” he adds “Everybody’s really eager to see Pelco come back and be a significant player.” Three horizons to success The idea is to look inward and improve on the current, successful product lines Takahashi sees three horizons that summarise the company’s path to future success. The first horizon is to focus on the fundamentals of what the company does today. The idea is to look inward and improve on the current, successful product lines, such as the VideoXpert video system and on-board video analytics. The second horizon will be to look at ways to advance the current feature set, whether “to build, partner or buy.” Building partnerships will be part of that success, such as the partnerships they are already building with Briefcam and Anyvision. The third horizon will be to expand their innovation, based on feedback from end users, dealers and consultants. “I want to get very deeply connected with our customer base,” says Takahashi. “Are we on the right path? Should we explore other partner relationships? We need to bring those minds together to expand our vision.” The focus should be on solving three business problems – mitigating risk, ensuring compliance and saving money. Looking ahead to ISC West in the spring, Takahashi expects Pelco to emerge as a more proactive company that is eager to engage. “We have a lot of stories to communicate, and we have not been as active as we should,” he says.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyse a security event, machine learning can analyse the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the centre of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level”, Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centres, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organisation has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centres, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions.Mergers and acquisitions have been commonplace in the integrator space Beyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognised brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy”. He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted”. Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
Leonardo delivered the first two M-345 jet trainer aircraft to the Italian Air Force, which to-date has ordered 18 units from a total requirement for up to 45 aircraft. The new type of jet trainer aircraft, designated T-345A by the Italian Air Force, will gradually replace the 137 MB-339s which have been in service since 1982. M-345 jet trainer aircraft Marco Zoff, Leonardo Aircraft Managing Director, said “Building on our heritage and expertise in jet trainers, the M-345 will allow our customers to achieve a significant improvement in training effectiveness while at the same time reducing operating costs. This first delivery to the Italian Air Force is a key milestone, the result of a longstanding and productive team working closely together with the operator.” The new M-345 jet trainer aircraft, designed to meet basic and basic-advanced training requirements, will complement the in-service M-346, which is used for advanced pilot training. Integrated training system Leonardo’s integrated training system developed around the M-345 platform is representative of the company’s technological leadership in training pilots to fly current and future generation aircraft. The system benefits from experience with, and technology developed for, the M-346, which includes a ‘Live Virtual Constructive’ capability. This allows aircraft which are flying live training missions to incorporate simulated ‘friend’ or ‘foe’ elements into scenarios, allowing the pilot to be exposed to the full range of possible operational situations. M-345 HET (High Efficiency Trainer) The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots The M-345 is a high-performance aircraft which supports a pilot’s transition from basic trainers to latest-generation fighters. The Italian Air Force’s acquisition of the new aircraft is an important step forward in the modernisation of its fleet, with the M-345 replacing the MB-339A in Air Force’s second and third military pilot training phases. The M-345 has also been chosen as the new aircraft of the Italian Air Force’s acrobatic team, the ‘Frecce Tricolori’. The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots. It also gives trainees the chance to fly an aircraft that features higher performance characteristics than other basic/advanced trainer aircraft currently in service around the world. Delivering high quality training at low cost The performance of the M-345 allows it to carry out the most demanding mission types found in a training syllabus, delivering high quality training at significantly lower cost. The M-345 cockpit architecture is the same as that of frontline fighters. The aircraft is also able to perform operational roles, thanks to an extended flight envelope, with a high-speed maneuvering capability even at high altitudes, modern avionics systems, high load capacity and performance. Health and Monitoring Usage System The M-345 is designed with a long life-cycle and a two-level approach to maintenance The M-345 is designed with a long life-cycle and a two-level approach to maintenance, eliminating the need for expensive general overhauls. The aircraft’s Health and Monitoring Usage System (HUMS) also contributes to a lower cost of ownership. A sophisticated on-board training simulator confers a number of benefits. For instance, M-345 pilots are able to plan maneuvers before live training, allowing for higher efficiency during flight. Mission Planning and Debriefing Station Trainees are also able to fly in formation with other pilots in the air and those training on the ground in simulators, via a real-time data-link. The aircraft’s Mission Planning and Debriefing Station (MPDS) allow trainees to analyse the missions they have just flown. The M-345’s engine is a Williams FJ44-4M-34 turbo fan optimised for military and aerobatic use. The cockpit is based on HOTAS (Hands-On-Throttle-And-Stick) controls and features a glass cockpit with a three-colour MFD (Multi-function Display) touch screen. The aircraft’s heads-up display is mirrored on a fourth screen in the rear seat.
In 2017 alone, 71 prison staff were found to be smuggling contraband into detention facilities in the UK alone. This is a known issue for security officers in prisons around the world, and that is why a major prison in Australia approached UVeye in 2019 about installing intelligent vehicle scanning devices. During 2019 In England and Wales drugs were found 13,119 times in prisons, more than 35 incidents per day, on average. The number of incidents has tripled since 2014, after years of relative stability, with some smugglers taking advantage of new technology, such as drones, to deliver contraband. Self-made devices The value of the UK prison drug market is an estimated £100 million, according to the Prison Officers Association. Drugs aren’t the only issue; weapons are also being smuggled into prisons at increasing rates. Instruments like wrenches and other self-made devices, usually attached to the undercarriage of vehicles coming in and out of the prison, can violate the rules and cause disruptions. Drugs aren’t the only issue; weapons are also being smuggled into prisons at increasing rates This Australian prison has over 100 regular employees coming in and out. Some of their vehicles have been used to deliver messages to the outside world from gang members who are in detention. Whether the prison staff or bus drivers themselves were paid to smuggle materials and objects in or out of the prison, or a criminal from the outside attached phones or drugs to their undercarriage while their vehicle was parked, this was clearly a matter of concern. Access control systems In other prisons which don’t have an automatic system, there are usually manual inspections conducted by a guard holding a mirror to check the undercarriages of vehicles coming in or out. It is clear in the industry that an efficient technological solution is needed. UVeye facilitates the following things: Securing vehicle access control points Full integration to barriers, bollards and access control systems Tightly securing sensitive areas like the apron of the prison Automatic detection of illicit materials under the vehicle on the first pass Driver and passenger fever detection capabilities SUV delivery vehicles Since most vehicles entering and leaving the prison come in and out regularly, there needs to be a quick and easy experience to compare the vehicles and look for attachments or modifications. The system also needs to be versatile enough to detect anomalies in the undercarriages of a wide variety of vehicle types, from private vehicles to SUV delivery vehicles and armoured trucks and buses. Understanding that the quality of inspection and streamlining the entry and exit process is a top priority, the security chiefs of the prison contacted UVeye. They asked for an automatic solution that can compare every vehicle entering or leaving the prison, and that is able to detect any modifications, smuggled devices or illegal weapons entering the facility. High-resolution cameras Helios UVSS by UVeye is setting the global standard for under-vehicle inspection Helios UVSS by UVeye is setting the global standard for under-vehicle inspection. Equipped with five high-resolution cameras, the system can be installed at the access lane of the prison and automatically detect any illicit materials entering or leaving the prison walls. Offering both single- and multi-lane stationary as well as mobile units, Helios has a feature called UVcompare that enables it to recognise vehicles by their licence plate or unique undercarriage fingerprint ID and compare the vehicle to a previous scan. This feature can assist in detecting tiny objects such as letters, paper bags, phones and other contraband. Advanced deep learning algorithms that were developed through training with millions of vehicles allow UVeye to offer its first pass solution, UV Inspect. Providing maximum security Built on a truly intimate understanding of what a wide range of vehicles are supposed to look like in a variety of environmental conditions, UV Inspect can be used for vehicles that have not been previously scanned by a system. UVeye is the only under-vehicle inspection system (UVIS or UVSS) vendor to offer a first verified, first pass solution that greatly increases the effectiveness of security teams. The UVeye team sent its representatives from Singapore for several site visits and worked closely with the construction integrator to provide maximum security and screening for all vehicles coming in and out of the prison. Classifications for items such as tiny paper notes, which in other cases might be considered false positives, were calibrated to be exposed by the system within several seconds, and the security guards will be alerted. Improving staff satisfaction The local staff was trained within several weeks of the installation, and objects like wrenches and boxes were picked up immediately during the early implementation of the system. The queuing time for vehicles entering or leaving the facility is reduced by over 70% As a pass-through system that scans vehicles as they drive over the device at up to 30km/h, the prison’s security team is now able to keep traffic flowing without compromising the quality of its inspections. The speed of inspection with a UVeye undercarriage system is reduced dramatically compared to manual inspection by a guard and keeps the prison staff safe. The queuing time for vehicles entering or leaving the facility is reduced by over 70% these cases improving staff satisfaction. Automated UVSS technology UVeye has simplified the documentation of inspections for the leadership, providing centralised, detailed reports of every vehicle, with the ability to compare past scans, which is often used for different purposes. If there is a case of corruption within staff, the accountability is immediate. Adopting UVeye’s automated UVSS technology has given the prison’s security team a quick and efficient method to monitor all vehicles entering or leaving the facility. In a world where a detention facility’s security is constantly tested, it is important to automate and rely on objective systems that can help prevent smuggled items from reaching the wrong people.
Dahua Technology – one of the pioneer video technology companies – has entered into a six-figure sponsorship deal with Celtic FC, supplying the club with state of the art video-based technology and equipment. Under the sponsorship deal, Dahua is supplying video walls for locations such as the Celtic Store and Media Centre at Celtic Park, high-tech quad-rotor drones to help with player training and development, and electronic whiteboards to be used for staff training, as well as meetings and presentations for staff and visitors. Highly visible aspects As part of the new partnership, Dahua will be appearing across a range of Club assets, on LED pitch-side banners, and on the club’s website and match programmes. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland “We are thrilled about our sponsorship of Celtic FC,” said Michael Lawrence, Marketing Director at Dahua Technology UK & Ireland. “As well as the highly visible aspects of the sponsorship, this deal represents a real partnership between Celtic FC and Dahua, and is an example of our engagement with communities across the UK and Ireland.” High quality technology Commenting on the deal, Cheng Zeng, Business Development Manager for China and Asia at Celtic FC said: “We are delighted to launch this partnership today with Dahua Technology. Their expertise and high quality technology will enhance both fan experience in our stores and business operations as a whole. We hope to work with Dahua long into the future.” As well as the equipment supplied to Celtic FC, Dahua Technology manufactures a range of innovative and technically advanced video equipment. These include TiOC, a three-in-one camera that integrates 24/7 full-colour monitoring, active deterrence and Artificial Intelligence into one smart unit; WizSense, a series of products and solutions that utilise Artificial Intelligence and deep learning algorithms; and its Starlight range of low-light video technology.
Leonardo announced the delivery of the first of two AW169 basic training twin engine helicopters to the Italian Army during an official ceremony held at the 2nd Rgt. AVES ‘Sirio’ based in Lamezia Terme in the presence of representatives from the operator and industry. The second aircraft is expected to be handed over in the next few months. The introduction of the new generation training helicopter (designated UH-169B) allows the Italian Army to prepare its crews for the future operational transition to its all-new advanced multirole Light Utility Helicopter (LUH) programme developed on the AW169 dual-use baseline and aimed at longer term fleet modernisation and rationalisation plan. Efficient supply chain The two AW169 trainers, which will enable the Italian Army to familiarise with the platform’s basic characteristics during the development of the new LUH, are being supplied with a comprehensive “turnkey” logistical support and a pilot/maintenance technician training package. The LUH programme is aimed at progressively replacing ageing models including the A109, AB206, AB205, AB212 and AB412 to meet the evolving operational requirements, and benefits from a more efficient supply chain based on a ‘one single platform’ approach. Emergency response capability The overall AW169 LUH programme is based on an advanced multirole configuration The introduction of the AW169 LUH, specifically developed for the Italian Army leveraging on the AW169M military helicopter baseline, also provides the advantage of unique logistical, operational and technical, certification and training commonalities and synergies across the growing AW169 fleets of Government operators in Italy. This strengthens the possibility to perform effective and safe joint operations with other users of this modern type and represents a quantum leap in homeland security, emergency response capability and overall through-life-cycle cost/effectiveness for decades to come. Advanced multirole configuration The overall AW169 LUH programme is based on an advanced multirole configuration provided with dedicated flight/mission equipment including, among others, skids landing gear and an advanced C4 command, control and communication system to grant full interoperability with the other assets in the NATO environment. Gian Piero Cutillo, Managing Director Leonardo Helicopters, said: “It gives us great pleasure to celebrate with the Italian Army the delivery of its first AW169 in basic training configuration as an essential enabler ahead of the implementation of the new, broader LUH programme. The LUH will definitely represent the start of a new era in terms of capabilities, technical support, mission flexibility and interoperability in the light weight segment." Excellent handling characteristics "The new programme takes advantage of many decades of a successful partnership and continued exchange of information, intended to fully understand the changing operational needs and how to address them through the possibilities offered by new technologies. We’re committed to supporting the Italian Army to maximise the benefits of these new helicopters.” The AW169M is the military variant of the latest generation AW169 twin-engine helicopter The AW169M is the military variant of the latest generation AW169 twin-engine helicopter, designed to the latest FAR/JAR/EASA requirements as well as those standards of military, homeland security and government users. The platform features outstanding power, agility and manoeuvrability, which provides excellent handling characteristics in a wide range of operating conditions including hot and high. Optimising response time The unique transmission design provides power to hydraulic, electrical and air conditioning systems with the rotors stopped (APU mode) optimising response time and availability. The cabin is the most spacious in its class and features a constant height cross section for rapid reconfiguration and ease of access. Pilots benefit from a latest-generation, open-architecture avionics suite, including a fully digital glass cockpit and unprecedented external visibility, providing advanced tactical and situational awareness. Orders for over 220 AW169 helicopters have been placed by customers worldwide today, including military and law enforcement / public service operators, to carry out a range of missions including utility, surveillance, special operations, maritime patrol, land reconnaissance, training, rescue and firefighting.
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enrol and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
Southeastern Rail Network operates train services between London, Kent and parts of East Sussex. It is one of the busiest networks in the country, transporting 640,000 passengers each weekday on its 392 trains, which are temporarily housed in 12 depots situated around South-East England. Some of these depots are unmanned, and therefore require intelligent security solutions. Bosch Security System’s Integration Partner, Taylor Technology Systems, were tasked with upgrading the entire video surveillance system across the 12 depots. The legacy analogue surveillance system had come to the end of its service life and was overdue for an upgrade. A state of the art IP based system was required to deliver upon the clients requirements for all the depots to be fully monitored 24/7. Tracking train arrivals departures A fully integrated solution was required that could provide all of this while also reducing costs An upgrade to an IP camera solution can provide vastly improved image quality, wider coverage and wireless capability, along with Intelligent Video Analytics and high levels of data security encryption. The primary challenge that needed to be solved by the video surveillance solution was securing the 5 unmanned depots. Some of these sites had previously been subject to thefts due to unauthorised entry via the main entrances. All access gates therefore needed to be monitored 24/7, ensuring that all personnel, or vehicles, entering the sites are tracked and reported. This includes all deliveries to onsite buildings as well as tracking all train arrivals and departures. A fully integrated solution was required that could provide all of this while also reducing costs. High clarity video in low-light levels A critical factor was that the video surveillance solution had to be able to work unimpeded throughout the night. The installed video technology therefore needed to provide high clarity video in low-light levels, whilst also still ensuring that the Intelligent Video Analytics worked as required. The camera portfolio installed across the 12 depots included FLEXIDOME IP starlight 7000 VR, DINION IP starlight 7000 HD and AUTODOME IP starlight 7000 HD cameras. These cameras are all equipped with Bosch’s Intelligent Video Analytics solutions ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Network surveillance systems Some surveillance cameras are using a digital trip wire to identify movement at perimeters These analytics solutions allow video surveillance to go further than just security applications, using statistics in the form of metadata for purposes such as perimeter control and vehicle tracking. Using Camera Trainer, a built-in machine learning capability, surveillance cameras can also be taught to recognise and detect stationary objects or certain situations instead of being triggered by motion alone. As an integral part of this end-to-end Bosch solution, all recording from the depots is remotely managed using DIVAR IP all-in-one 7000 recorders – an all-in-one recording, viewing and management solution for network surveillance systems. To combat unauthorised entry to unmanned sites, the IP cameras are using Intelligent Video Analytics to prevent security breaches before they occur. Some surveillance cameras are using a digital trip wire to identify movement at perimeters. In-built Intelligent Video Analytics If movement is detected, an alert is sent to security personnel who are able to view the recording and respond straight away. Intelligent Video Analytics from Bosch are able to differentiate between genuine security events and false-triggers, meaning that security alerts are dependable and reliable. In-built Intelligent Video Analytics went further in this application; to monitor train movements, track deliveries inside the depot and provide access to staff. Taylor Technology Systems carried out the installation and configuration of this solution The AUTODOME IP starlight 7000 HD cameras were installed on gantries over train tracks and were the ideal PTZ solution, as they can continue tracking while panning, tilting or zooming. All cameras with starlight technology continue to deliver full intelligent analytics at night and in low light levels. The cameras installed around the depots are able to provide colour filtering down to 0.0077 lux or deliver detailed monochrome images where other cameras show no image at all. Expert installation and integration Taylor Technology Systems, a member of our Installer and Integrator Partnership Programme, carried out the installation and configuration of this solution. They expertly delivered the installation project at active depots while keeping the legacy system working. The team worked with Southeastern to arrange complex line blockages so they could install the equipment safely without affecting the day-to-day operation of the railway. To complete the project, engineers from Taylor Technology Systems completed comprehensive training courses on the Bosch Video Management System, allowing seamless management of the digital video across IP Networks. This ensured that the Bosch technology was installed exactly to specification. Ensuring site safety The Taylor Technology engineers worked to a professional high standard by ensuring site safety" Taylor Technology Systems have been awarded a Bosch Outstanding Achievement Award for their work on this project. “Taylor Technology Systems deployed a full suite of servers and IT equipment with Bosch CCTV Platform across several sites to ensure security was enhanced due to end of life equipment. With full in-depth training, the Taylor Technology engineers worked to a professional high standard by ensuring site safety was paramount during the 6 month project that was on time and within budget", says Steve Martin, Project Manager, Southeastern With built-in analytics in all cameras, this end-to-end Bosch solution lowered costs for the end-user. Installation, configuration and maintenance were also eased, as pre-configured default settings can be used in applications such as vehicle tracking and perimeter detection. The guaranteed top build quality from Bosch, combined with expert installation, ensures that this is a long-term solution for Southeastern.
Round table discussion
Internet-based training has long provided a less-expensive alternative to in-person classroom time. There are even universities that provide most or all of their instruction online. However, the COVID-19 pandemic has expanded acceptance even more and increased usage of internet-based meeting and learning tools. We asked this week’s Expert Panel Roundtable: How can remote or internet-based training benefit the physical security market?
Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download