Redline, an Air Partner company and a renowned provider of global security solutions, announced that it has won a long-term contract with the CAA, and is now also providing consultancy services to private aviation company Jet Edge. The CAA has awarded Redline a seven-year contract to be the UK’s sole certifier and quality assurer of free running explosive detection dogs (FREDDs). The certification and quality assurance process is set by the Department for Transport (DfT) and overseen by t...
Swarm Intelligence (SI) and bio-inspired computing have attracted great interest in almost every area of science and engineering, including robotics, over the last two decades. Being an innovative manufacturer of autonomous mobile robots (AMRs), AGILOX directs most of its effort into developing one of the most unique robotic material handling features on the market - completely decentralised autonomy. AGILOX Intelligent Guided Vehicles (IGVs) are completely independent, self-controlled, and int...
Coinciding with the recent launch of the Occupancy Monitoring application designed to help implement social distancing rules, Hanwha Techwin has also introduced a Face Mask Detection application which will further help businesses operate in a COVID-19 affected world. Wearing a mask is believed to prevent the spread of COVID-19 and has already been adopted as a safety measure in many workplaces. However, the availability of the Face Mask Detection application could not come at a better time with...
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the IMP-C1000-SFP-bt series. Antaira Technologies’ IMP-C1000-SFP-bt series is a compact, IP30 rated, gigabit Ethernet-to-fiber media converter featuring a 10/100/1000Tx Ethernet port. It supports IEEE 802.3af/at and bt high power...
Teleste Corporation will supply onboard Public Address, Passenger Information display and CCTV solutions to Alstom’s Coradia trains for the Luxembourg state railways, CFL (Société Nationale des Chemins de Fer Luxembourgeois). With the deliveries taking place in 2020–2024, the agreement covers system deployment for 34 EMU trains and includes an option for an additional 20 trains. “As more than 9.6 billion passengers travel on national railway networks in the EU an...
COVID-19 can be stopped right at the entrance to office buildings, schools, hospitals, factories and in public transportation using the hi-tech infection control products launched by Gunnebo, the Swedish global provider of smart access control solutions. The new family of access control solutions supports the smooth return to a safe working environment by providing automated infection prevention through contactless processes, maximised social distancing, and enforcement of body temperature and...
A thermal imaging camera is an effective screening device for detecting individuals with elevated skin temperature. This type of monitoring can provide a rapid screening approach at high-traffic areas, like airports, hospitals, office buildings, and other areas where people congregate, to help identify those whose body temperature is elevated. Non-contact screening of EST Using a non-contact screening solution is one of the current measures to discover quickly individuals with elevated skin temperature (EST). The detection method is designed to help initial screening of EST, with use of medical equipment to further verify symptoms The detection method is designed to help initial screening of EST, with use of medical equipment to further verify symptoms, while reducing manual testing time and the safety risk to those involved in detection. Temperature Screening Solution Hikvision’s Temperature Screening Solution, with various product types and wide range of applications, is designed for the detection of skin-surface temperatures to achieve rapid and safe initial screening in public areas. Its flexibility means it can be used in a multitude of scenarios. Meanwhile, efficiency and cost is important for users. The question here is - What is the best solution for their needs? Temperature screening with fast deployment For high-traffic scenarios, such as urban traffic (train station, bus station, subway, airport, etc.), buildings (such as schools, enterprise parks, office buildings, shopping malls, etc.), a temporary temperature screening scheme can be used. Fast deployment is achieved separately with various devices, such as thermographic cameras, thermographic hand cameras, metal detector doors, etc. This temperature screening with fast deployment is economical and practical, and the deployment process and subsequent disassembly are easy and convenient. The temperature measurement accuracy is guaranteed to be within ± 0.5 ° C or ± 0.3 ° C (with a Blackbody calibrator) to meet the needs of initial screening. Temperature screening with access control In enterprises, schools, factories, communities and other internal areas where people are moving through, the MinMoe wall-mounting touch-free temperature screening terminal (DS-K1T671TM-3XF) can be used. The touch-free nature of the terminal makes access easier and safer, suitable for long-term temperature screening with access control for any building with a high footfall of people. Temperature screening on patrol solution The temperature measurement on patrol solution can also be called a manual inspection program on the move The temperature measurement on patrol solution can also be called a manual inspection program on the move. It can be quickly put into use at fixed entrances and exits for emergencies, for example at external events or building sites, or checkpoints. It can also be used for flexible inspection in high-speed exits, cabins, and engine rooms. Not only that, additionally, Hikvision thermographic bullet cameras support simultaneous temperature screening of multiple people, which can greatly improve the detection efficiency in busy scenarios. DeepinMind NVR and thermographic cameras Additionally, for some countries or regions that require people to wear masks, Hikvision also provides a solution that includes a DeepinMind NVR as well as the thermographic cameras. This delivers a special interface that can visually display temperature and mask status. Hikvision thermal temperature screening products have already been used in airports, ports, office buildings, and other places where many people congregate all over the world. They are providing fast and effective screening as an important part of the fight to maintain public safety and to help public health management.
This year Counter-Terror Expo (CTX) and IFSEC International will co-locate for the first time, creating the UK’s largest security event. The two events will take place simultaneously from 19-21 May 2020 at the ExCeL, London. CTX brings together international specialists and experts from industry, government and policing to share ideas and technology within the counter-terrorism field. The content programme will feature themes including drone threats and response, securing major events and public spaces, perimeter and access security, counter surveillance, threat forecasting and prevention, cyber threat detection and mitigation. IFSEC, one of UK and Europe’s most popular security events, will welcome tens of thousands of security professionals and provide valuable opportunities to meet with buyers and customers across the supply chain. Discuss technologies in crucial areas The first-time co-location of these two key industry events will allow attendees from the broader security and protection sectors to join with counter-terror stakeholders to source and discuss technologies in crucial areas including surveillance, venue security, AI, access control, transport security and more. Co-locating CTX with IFSEC opens the event to a wider and more international audience, which is a win-win" Exhibitors have praised the co-location of the two shows. Antonia McIntosh, Marketing Specialist at Fischer Connections said, “Fischer Connectors is looking forward to be exhibiting at CTX again and as part of the show’s continued growth and popularity, we’re excited to see it co-located with IFSEC which will give us the opportunity to showcase our products and meet and engage with even more visitors representing all aspects of the security supply chain, all under one roof.” More international audience Nick Booth, VP Marketing at Blighter Surveillance Systems Ltd said, “Co-locating CTX with IFSEC opens the event to a wider and more international audience, which is a win-win for both visitors and exhibitors alike.” CTX and IFSEC will also be joined by further co-located events within ExCeL – Forensics Europe Expo, Intelligent Building Europe, FIREX International, Safety & Health Expo, Facilities Show and Workplace Wellbeing Show.
Videonetics, an international provider of AI & DL powered Unified Video Computing Platform development company, has announced a distribution partnership with Spectra Innovations Pte Ltd, Singapore, to offer their complete array of products and solutions across the South East Asia and ASEAN region. Headquartered in Singapore, Spectra Innovations Pte Ltd has an established network of certified channel partners, system integrators, training and support specialists in South East Asia and ASEAN countries. Through this partnership, Spectra is all set to offer Videonetics AI & DL powered Unified Video Computing Platform encompasses Intelligent VMS, Artificial Intelligence & Deep Learning Video Analytics, Intelligent Traffic Management System and Facial Recognition Software. Video Analytics solutions We are pleased to enter into this value-added distribution relationship with Spectra" On the appointment, Avinash Trivedi, VP – Business Development, Videonetics expressed, “We are pleased to enter into this value-added distribution relationship with Spectra and introduce our indigenous offerings in the ever-growing markets of SEA and ASEAN region. As ranked amongst the top 5 VMS providers in Asia, Videonetics continues to increase focus and investment globally." "I am assured that Spectra’s remarkable management capabilities and extensive partner network, combined with Videonetics’s state-of-the-art solutions will cater to growing demand for truly unified solutions in different verticals such as safe & smart city, aviation, transportation, critical infrastructures, heavy engineering, healthcare, education and retail to name a few.” Affordable and deployable “Spectra is pleased to be appointed as a Regional Distributor of Videonetics. With the adoption of CCTV gaining acceptance beyond just surveillance into sectors such as garbage management under Smart City initiative, loss prevention applications in retail, logistics and warehouses, productivity improvements in factories to name a few, the need for VMS and Video Analytics solutions are becoming affordable and deployable in mass scale today” said Kanwal Sahney, Managing Director, Spectra Innovations Pte Ltd.
TE Connectivity Ltd., a global industrial technology company with leading positions in connectivity and sensing solutions, completed its public takeover of First Sensor AG. TE now holds 71.87% shares of First Sensor. Sensor technology First Sensor, founded as a technology start-up company in the early 1990s, is a globally renowned firm in the scope of sensor technology and sensing solutions. With its expertise in chip design and production, as well as microelectronic packaging, First Sensor develops and produces standard sensors and customer-specific sensor solutions in the fields of photonics, pressure and advanced electronics for applications within the industrial, medical and transportation markets. First Sensor develops and produces standard sensors and customer-specific sensor solutions It has six German locations along with development, production and sales sites in the USA, Canada, China, the Netherlands, Great Britain, France, Sweden and Denmark, along with a worldwide partner network. Advanced sensors and connectors In combining the First Sensor and TE portfolios, TE will be able to offer an even broader product base, including innovative, advanced sensors, connectors and systems plus best-in-class capabilities that support the growth strategy of TE's sensors business and TE Connectivity as a whole. First Sensor provides market expansion opportunity with optical sensing applications for industrial, heavy truck and auto applications. "The business combination with First Sensor is yet another milestone in TE Connectivity's commitment to being a globally renowned player in the sensor space and continuing to provide customers with a high level of product innovation and service," said John Mitchell, senior vice president and general manager of TE's sensors business. "The First Sensor team's capabilities, as well as their products, strongly align with the markets we serve and create greater opportunity to serve our customers."
Cepton Technologies, Inc., a provider of state-of-the-art, intelligent, lidar-based solutions, has appointed Redtree Solutions as its technical sales representative in the UK and Europe. This announcement comes in response to growing demand for Cepton’s pioneering technology across the region and follows the expansion of its EMEA presence in the UK and Germany in 2019. With this collaboration, Redtree Solutions will serve as an extension to Cepton’s existing Marketing and Business Development teams in Europe, to significantly expand Cepton’s reach into a variety of markets and customers. Intelligent transportation systems Our lidar based solutions are revolutionary and have applications in many industries in Europe" Powered by Cepton’s patented Micro Motion Technology (MMT®) platform – a frictionless, mirrorless, rotation-free lidar architecture capable of high resolution and long range 3D imaging – Cepton’s lidar solutions are being shipped worldwide, serving a range of commercial applications. These include automotive (ADAS), autonomous vehicles (AV), intelligent transportation systems (ITS), security, crowd analytics, mapping/surveying and more – all areas of expertise served by Redtree’s pan-European team. “Our lidar based solutions are revolutionary and have applications in many industries in Europe. Combining our Vista™ and Sora™ lidar sensors with advanced Helius™ perception software running on edge computing in a single package, our solutions can be integrated with a host of other devices and software to deliver a wide range of functions,” explained Andy Nevill, Director of Customer Applications Engineering at Cepton. Generating greater awareness “We are still uncovering new and novel use cases for lidar, which is why we are so excited to announce our collaboration with Redtree Solutions. Working with the Redtree team, we can enhance our presence in the region and serve its growing demand for our lidar innovation.” Redtree Solutions will utilise its resources to support Cepton’s market growth in Europe Through this collaboration, Redtree Solutions will utilise its resources to support Cepton’s market growth in Europe. Covering 19 countries with more than 500 active customers, Redtree will help accelerate Cepton’s business penetration in the region by generating greater awareness of the company’s innovative solutions and providing on-the-ground support to expand Cepton’s customer base. Unique and highly differentiated technology Steve Judge, Redtree Solutions’ Managing Director added: “We are very pleased to be working with Cepton to bring its unique and highly differentiated technology to Europe’s leading industries. This is an agile, intelligent solution that’s very easy to implement and offers significant value to customers across numerous disciplines.” Founded by Dr. Jun Pei and Dr. Mark McCord in 2016, Cepton uses a patented beam-steering MMT® that is unique in the industry and enables the achievement of an optimal balance of performance, reliability and cost for mass market lidars.
Cyber security specialists and decision makers from all over Europe gathered to Helsinki, Finland on 13th of February to discuss what the new 5G technology means to cyber security, digital infrastructure and user-centric services. Forum’s keynote speakers included leading global experts of the field such as Jakub Boratyński from the European Commission, Steve Purser from ENISA and Timo Harakka, Finland’s Minister of Transport and Communications. Reasonably priced connections The Finnish Transport and Communications Agency Traficom, and The National Cyber Security Centre Finland operating as part of Traficom arranged the event. Traficom is a modern wide-scoped agency, which promotes the transport system and traffic safety, and boosts digitalisation and trusted digital services. Traficom supports sustainable development and ensures that everyone in Finland has access to high quality, secure and reasonably priced communications connections and services. Changing the future of the society starts from vision and courage, and it starts today" Safeguarding the future digital society and working on 5G cybersecurity form one essential part of Traficom's cutting-edge future-oriented work on improving via innovation. It focuses on the phenomena of the digital society, seeks solutions, builds networks and helps companies and other authorities to prepare for the future. "Changing the future of the society starts from vision and courage, and it starts today", says Kirsi Karlamaa, the Director-General of Traficom. Fifth-generation wireless communication technology The forum was preceded by the world’s first open 5G cyber security hackathon where 70 cyber security specialists and whitehat hackers from 15 different countries got a chance to test their skills on 5G technology provided by Ericsson, Nokia and Oulu University. Finland and Traficom as a visionary authority received praises for progressing and initiating the work focusing on 5G cyber security during Finland’s Presidency of the Council of the European Union in 2019. Mr Jakub Boratyński, Head of Unit for Cybersecurity and Digital Privacy from the EU Commission presented the EU Toolbox for 5G cyber security and emphasised Finland´s proactive role in the EU work around 5G cyber security. This decade will see the expansion of 5G-based services and infrastructure, and cooperation between different players developing the fifth-generation wireless communication technology is essential. Cyber security community Focus on end-to-end thinking were recurring themes in the keynotes and presentations" The first ever Leading Edge 5G Forum organised in Helsinki draw together companies, cyber security influencers and industry members, EU representatives and authorities, academics and members of the cyber security community to discuss the future opportunities and challenges concerning 5G. "The Leading Edge 5G Forum indicated that there is a strong will within the community and industry to share experiences and discuss the future of 5G and cyber security. Going forward, Traficom will continue this cooperative work with all stakeholders and organise discussions where exchange of ideas is possible", says Kalle Luukkainen, the Deputy Director-General of The National Cyber Security Centre Finland. Security and privacy risks “We initiated this work but our vision is that going forward the cyber security hackathons and the Leading Edge 5G Forum could be a collaborative European wide activity. Therefore, we challenge all interested parties to get in touch with us and to join the effort of putting together the next cooperative actions and a cyber security hackathon in 2021. Our common aim is to safeguard the future digital society. Building digital trust globally, strengthening the existing ecosystem and focus on end-to-end thinking were recurring themes in the keynotes and presentations heard during the event.” Forum speakers also emphasised that 5G is designed to be more secure than its predecessors and cyber security has received a massive focus in 5G’s development. However, there is work to be done as the diversity and volume of novel IoT devices and their control systems will continue to increase and pose a new kind of security and privacy risks and additional threat vectors as we move to 5G and beyond.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Today, customers are demanding immediacy, personalisation and seamless services from their providers and our desire for instant gratification means that those servicing the public need to provide easy, fast, smooth and continuous ways to meet customer expectations. This is where interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way. In recent years, kiosks have fast gained popularity, not only because they enhance customer satisfaction, as they operate in self-service mode, but they also provide crucial information or services to customers as and when they need it. Think about how you utilise such services, at a railway station to buy tickets, in a fast food outlet to order food or in other ways as you go about your daily business. Interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way Today, kiosks are typically placed in high foot-traffic environments such as retail stores, hospitals, banks, hotels, airports, courthouses, libraries, railway stations – you name it – providing customer access to information, products, websites, tools, or applications. For those less familiar, an interactive kiosk is a computer terminal featuring specialised hardware and software that provides access to information and applications for communication, commerce, entertainment, or education. Kiosk software platforms are easy to deploy Integration of technology allows kiosks to perform a wide range of functions, for example, kiosks may enable users to order from a shop's catalogue when items are not in stock, check out a library book, look up information about products, issue a hotel key card, or enter a public utility bill account number in order to perform an online transaction. Kiosks are computing platforms where the user interface needs to be limited to serve a specific purposePut simply, kiosks are computing platforms where the user interface needs to be limited to serve a specific purpose. Whether it is a citizen-facing platform in a government building or a device in a train station, the common theme is that the user is constrained to undertake very specific tasks with that device i.e. buy a train ticket. The device itself might have a full-blown operating system but all the user can see is the app and what they need to do. Therefore, it is very important for kiosk software platforms to be very easy to deploy and they must provide a very intuitive user experience. It is very much about the interaction the user is undertaking and little beyond that, which means the software must be optimised for user interaction in that context. But what that means is that security is often a secondary consideration, with many kiosk software providers paying lip service to security, while they focus primarily on ease of use and ease of management. Thinking of a kiosk as just a terminal that wouldn’t be of interest to a hacker is precisely why they are so attractive to attacks The threat of cyber attacks However, today we are seeing cyber-attacks escalating and becoming an everyday occurrence; as adversaries seek out new methods of attack and new threat vectors, so kiosks are becoming more of a target and an attractive platform for cyber adversaries to attack. Most kiosk software platforms just provide a management layer to configure an endpoint device in that kiosk. If you think about a traditional endpoint device such as a laptop, they are more likely to have a greater set of defence tools deployed, actively managing and monitoring the device, regularly patching and updating it. This is not the same where kiosk platforms are concerned. Kiosks are becoming more of a target and an attractive platform for cyber adversaries to attack So why is this? Often, the business can’t justify having a full-blown operating system and sophisticated defence tools on that platform, especially if they have a large number of kiosks deployed out in the field. They are normally in highly remote or widely geographically dispersed locations, which means there are significant costs involved to go out and fix them. Protecting devices in a more robust way Likewise, organisations don’t always have the local IT resource in many of these locations to maintain the equipment and its security. Or, if there is a patch management process in place it might not always be timely. For example, if you adopt an Android platform, Google regularly announces the vulnerabilities they have patched. This means the device manufacturers have to try and create patches for the vulnerabilities that have been announced publically to the cybercriminals. Adversaries know there is a window of opportunity they can exploit because the software author has told them about it. That time delay can be even worse in kiosk ecosystems, where there may be a diverse geographic spread of devices. We need to increasingly think about how we protect these devices in a more robust way Or the kiosk might simply be old. One of the reasons the WannaCry ransomware attack ended up being so widespread, is that there were old computing terminals throughout the NHS, running old operating systems. Any unpatched version of Windows is susceptible, so it can end up being a false economy by attempting to run these legacy systems for too long. As we continue to exploit and expect technology in every far-flung corner of the world, we need to increasingly think about how we protect these devices in a more robust way. Thinking of a kiosk as just a terminal that wouldn’t be of interest to a hacker is precisely why they are so attractive to attacks, because they know the security might not be as tight as it should be. Making kiosks more secure could be the difference between you being breached and remaining safe.
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organisers globally have cancelled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was cancelled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theatre offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local/national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
Some of the electronic features we all love in our new cars depend on a connection to the Internet. But what are the cybersecurity risks involved in that connection? Could a widespread cyberattack turn our cars into deathtraps and create a traffic catastrophe on the scale of 9/11? That’s the scenario described in a report from the nonprofit group Consumer Watchdog, which warns that a fleet-wide cyberattack at rush hour could result in a 9/11-style catastrophe with approximately 3,000 deaths. The organisation recommends that automobile manufacturers install a ‘kill switch’ that would disconnect a vehicle from the Internet in an emergency to mitigate the threat. Protecting transportation system Automakers are keeping the public in the dark as they market new features based on Internet connections"Consumer Watchdog contends that the vulnerability of automotive computer systems, and the possibility of a cyberattack, has been communicated privately to investors but not widely to consumers. “Automakers are keeping the public in the dark as they market new features based on Internet connections,” says Consumer Watchdog. “Connecting safety-critical systems to the Internet is an inherently dangerous design,” says Jamie Court, President of Consumer Watchdog. “American car makers need to end the practice or Congress must step in to protect our transportation system and national security.” Future designs should completely isolate safety-critical systems from infotainment systems connected to the Internet or other networks, according to Consumer Watchdog. By 2022, at least two-thirds of new cars on American roads will have online connections to the cars’ safety-critical systems, putting them at risk of deadly hacks. Updating vehicle software over-the-air One economic motive of connecting vehicles to the Internet is the ability of car manufacturers to update vehicle software over-the-air rather than having to recall a vehicle. Systems also enable collection of valuable data on how fast a car owner drives or where he/she shops. Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin. Software may be written by third parties and/or include contributions from hundreds or thousands of different authors around the world, with little accountability for flaws. The ability to update software ‘over the air’ without touching the vehicles lets automakers cover up safety problems and sloppy testing practices, contends Consumer Watchdog. “Allowing consumers to physically disconnect their cars from the Internet and other wide-area networks should be a national security priority,” says Court. “If a 9/11-like cyber-attack on American cars were to occur, recovery would be difficult because there is currently no way to disconnect our cars quickly and safely. The nation’s transportation infrastructure could be gridlocked for weeks or months. Mandatory ‘kill switches’ would solve the problem.” Understanding the risks of connected cars In addition to more attention to cybersecurity, there also needs to be more transparency to enable consumers to understand what is at risk and the choices they make. For example, a group of more than 20 car industry engineers and insiders helped to prepare the Consumer Watchdog report, but many of them remained anonymous for fear of losing their jobs. Consumers have a right to understand the risks they are taking and how they can minimise them. In the Internet of things, cybersecurity dangers extend to almost every device in the connected world, from cars to smartphones to medical devices. Increasingly, we will be asked to weigh the convenience of cranking our car with a smartphone, for example, against the possible risk in the form of vulnerability to cyberattack.
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimise the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customised access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorised entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorisation to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customisation ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
Teleste Corporation will carry out information display deployment for Braunschweig Transit Authority (Regionalverband Großraum Braunschweig) in Germany together with the company’s local subsidiary iqu Systems. The project will be completed by March 2022 and it will include harnessing the entire tram network and selected bus stops in the city of Braunschweig with 243 monochrome LED displays as well as Teleste’s passenger information system for their management. In addition, all the included stops will be equipped with text-to-speech buttons and loudspeakers announcing the displayed information for visually impaired passengers. City-wide transport systems “We at Teleste are pleased that Braunschweig Transit Authority has trusted our solution and capabilities in upgrading information infrastructure across their transport network in the city. While public transport is becoming the number one form of urban mobility for many citizens, the passengers are also expecting easy and safe travel across the city-wide transport systems.” It is clear that the right travel information needs to be available when and where the passengers need it" “It is clear that the right travel information needs to be available when and where the passengers need it. Investing in real-time information infrastructures ensures that operators will be able to meet the passengers’ expectations in an efficient and flexible manner”, said Stephan Brünig, Head of Teleste’s Public Transport Operators business. Teleste’s passenger information system includes versatile modules designed for the management of passenger information, media content, displays and fleets across public transport systems of various sizes and demands. Managing information and daily operations The system allows Braunschweig Transit Authority to manage all the 243 displays within the deployment with a web-based user interface including functionality such as status check-ups, configuration and operational management. The system will also provide the necessary interfaces to the real-time database of Braunschweig Transit Authority and the state-wide database of Lower Saxony. Through this integration, the system provides the passengers in Braunschweig with accurate and up-to-date information related to their journeys, making it easier and safer for them to navigate across the city infrastructure, while also providing the operator an efficient and flexible tool to manage the information and daily operations.
Teleste Corporation and a renowned international rail vehicle construction company Stadler have agreed on deliveries of Teleste’s passenger information and CCTV systems to Stadler’s new FLIRT trains for Norwegian State Railways. The deliveries will take place in 2019–2021, continuing the cooperation between Teleste and Stadler that was started in 2009. The deployment will include on-board passenger information (PIS) and CCTV systems for more than 20 trains complemented with video security cameras and video recorders, intercommunication and public address systems as well as TFT and LED information displays. The flexible and future-proof system works seamlessly together with the existing PIS systems, delivered during earlier stages of the cooperation, and includes upgrades such as enhanced cyber security. Rolling stock manufacturers We have been able to fulfil Stadler’s requirements for high-quality delivery of passenger information" “Today, transport operators and rolling stock manufacturers need to stay at the cutting edge of on-board technologies to deliver an excellent travel experience for the growing number of public transport users who wish to be informed about their travel at every step of the journey." "We are pleased that we have been able to fulfil Stadler’s requirements for high-quality delivery of passenger information on their trains to Norway, and we are looking forward to continuing our cooperation,” stated Jörn Grasse, Vice President of Rail Information Solutions at Teleste. Effective transport system Teleste’s on-board passenger information system is based on modular software architecture, which makes it possible to use the system technology for different kinds of applications. The system provides a flexible option for the delivery of passenger information for rolling stock manufacturers and operators who wish to build and run an effective transport system that can carry large volumes of passengers smoothly and safely every day. Customers can visit the company’s website for more information about the solution and its benefits.
Valdosta Regional Airport in Valdosta, Georgia offers three daily commercial flights to and from Atlanta Hartsfield-Jackson International Airport, along with general aviation. The airport contains three runways, two of which are used by commercial aircraft. The airport offers ground transportation, free parking, a Subway restaurant, and many other services such as hangar space and flight training to name a few. Previously, Valdosta Regional Airport operated a legacy Matrix access control system. The proprietary system, including the readers, panels and software, was outdated, making it difficult and expensive to obtain replacement parts. Building automation systems Looking for an open solution, Valdosta Regional Airport turned to Allcom Global Services for their expertise and upgraded to AMAG Technology’s Symmetry SR Retrofit Access Control system with HID readers. “Symmetry integrates into various video, intrusion and building automation systems,” said Kevin Cioffi, vice president, Allcom Global Services. Valdosta has more freedom to research competitive pricing and alternative options" “By choosing an open system, Valdosta has more freedom to research competitive pricing and alternative options. We are thrilled they have chosen Allcom. We gutted all the circuit boards and changed them to the Symmetry panels,” said Tim Register, operations manager/airport security coordinator, Valdosta Regional Airport. “We kept the antennas and how the data was transmitted. All the mounts stayed the same; we just swapped in Symmetry and it worked.” Integrating different technologies Symmetry controls access to the perimeter of the airport including the vehicle access gates and all outside doors facing the Security Identification Display Area (SIDA). The SIDA includes all areas that have access to the commercial apron and tarmac. The SIDA also requires a reader with a PIN-plus-card swipe to open, which make up 75% of the airport’s readers. The remaining Airport Operations Areas (AOA) require only a proximity card swipe to open, which are mostly internal doors and the main entrance. Thirty-two new HID proximity card readers were installed in total. To get the open system the airport required, Valdosta Regional Airport replaced older panels with Symmetry SR panels. As the Symmetry system changes or expands, integrating different technologies or adding more readers will be easy and less expensive. More economical approach The simple job of creating a badge for a user was cumbersome and time consuming with their old system The security operators found Symmetry much easier to learn and use, saving money and hours in training time. The simple job of creating a badge for a user was cumbersome and time consuming with their old system. With Symmetry, badges are created on demand, onsite, with no hassle or extra charge. “Symmetry provided us a more economical approach to facilitate the same thing we used to do with a more expensive, proprietary system,” said Register. “It is much easier to create a badge with Symmetry.” Life flight helicopter Airport authority employees, TSA, airline employees, fixed based operators, life flight helicopter and fixed wing aircraft are all protected by Symmetry. In addition to the perimeter, Symmetry controls access to all work areas within the airport and to the hangars located inside the perimeter fence. “An incident happened one Sunday morning where a car hit a pole and brought the power down,” said Tim Register. “If we were operating the Matrix system, it would have been down for hours. Our Symmetry system was only down minutes.”
TCIEXPRESS, a customer-oriented, multi-technology transport system in the Indian and International markets, has announced using Matrix Time-Attendance solution for increasing productivity and streamlining salary processing. This high-tech transport system pursuit value-based policies to satisfy the aspirations of society, customers, vendors, employees, shareholders and the transport industry. Speed is the essence of all the services of TCIEXPRESS whether through land or air, anywhere in India and the world. TCIEXPRESS multi-technology transport system TCIEXPRESS is actively engaged at 500 locations across India. To manage entire attendance, diverse shifts and leave policies for the various locations and numerous workers at a central place was a very tedious task for them. Moreover, this leads to complex computation for salary based on the absent-present report. So, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. Ultimately, they were facing challenges over various matters like manual paperwork, lack of productivity and discipline, remote access of all the locations for Time-Attendance and payment process. Matrix offered COSEC VYOM for people mobility management for TCIEXPRESS's 3000 employees at 500 locations COSEC VYOM cloud-based system After a comprehensive discussion regarding problems and requirements, Matrix has offered COSEC VYOM for people mobility management for their 3000 employees at 500 different locations. COSEC VYOM is a cloud-based Time-Attendance system that addresses solutions to the outlined issues of productivity and efficiency. It provides ubiquitous, cost-effective, secure and on-demand network access. Moreover, Matrix Time-Attendance solution is integrated with HR1 and HRMS software for easy salary processing and speedy HR process of TCIEXPRESS. COSEC VYOM cloud-enabled Time-Attendance system provides the following results - Quick salary processing Improves productivity Reduce paperwork Secure and on-demand network access Eliminates server cost, infrastructure cost, and maintenance cost Products Offered: COSEC DOOR FOT
APRR (Autoroutes Paris Rhin Rhône) Group has selected Teleste’s S-VMX Video Management System for upgrading its motorway safety and surveillance infrastructure. The system will be implemented by a consortium composed of Teleste and ENGIE Ineo, a part of worldwide renowned energy provider, The ENGIE group. Teleste S-VMX video security system APRR Group, a subsidiary of Eiffage, manages motorways and toll structures under concessions awarded by the French State. Under the terms of its concession agreements, the Group also invests heavily in its 2,323 km network in order to improve travel conditions and satisfy customers’ new mobility requirements. Teleste’s S-VMX system will be in charge of monitoring and securing the East & South of France Motorways network, including the motorway routes as well as car parks and rest areas. The project is expected to be delivered during 2019 and 2020, and the contract scope includes a 10-year maintenance agreement. Security and operations control systems Security and operations control systems are becoming increasingly complex as they are expected to process large amounts of information in real-time. Teleste’s S-VMX video surveillance and S-AWARE situational awareness platforms enable the building of security systems that will evolve alongside the changing needs of public authorities. In addition to the powerful video core, the systems can control large amounts of information from multiple sources within the operating environment to ensure that the right information is available to the right people, when and where needed, and that the correct action is taken promptly whenever unexpected situations occur.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbour for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbour in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbour complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analysing people's behaviour. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
Round table discussion
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
Automatic vehicle identification: State of the industry 2020Download
How analytics engines mitigate risk, ensure compliance and reduce costDownload
11 considerations for embedded system RFID readersDownload