Percepto, the provider of autonomous industrial drone solutions, launches the next generation of its AI-powered autonomous industrial Drone-in-a-Box (DIB). Available now, the solution includes a highly portable, smaller, lighter-weight and extreme weather resistant base station. Adding field-proven 5G compatibility, the new DIB also features seamless integration of 2D mapping and 3D modelling, highly customised reporting, comprehensive compliance and enhanced safety functions. The award-winning...
Kit (PEK), combines the unerring accuracy of lasers to scan the environment in much the same way a radar does, but at a much higher resolution, building an image of the world around it regardless of lighting conditions. Presenting the technology in the UK for the first time at IFSEC International in London’s ExCeL, Cepton’s VP Neil Huntingdon says that because the device combines the sensor with a powerful micro-computer in a single package it can process the information directly at...
Cable-free access control provider, LOCKEN has launched a new website, which reflects its position as a market pioneer, showcasing its expertise and commitment to innovation and future technologies. Following the company’s merger with ISEO, LOCKEN is increasing its activity within new and emerging markets and is continuing to create innovative solutions that are tailored to its clients’ individual demands and requirements. Industries served by LOCKEN With 15 years’ knowledge...
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announced that in alignment with their ongoing policy to certify products to North American standards, the Trilock 3-arm tripod turnstile models have been tested and certified to conform with UL (United Laboratories) Standard 294 and CAN/ULC S319 for Canada. UL Standard 294 and CAN/ULC S319 (the harmonised standard in Canada) are the prevalent industry standards for ensuring the safe operation of access control e...
Vintra, a maker of video analytics powered by machine learning and artificial intelligence, announces an integration with Genetec Inc., unified security, public safety, operations and business intelligence solutions. Genetec customers can now benefit from FulcrumAI, Vintra’s deep learning video analytics solution integrated with Genetec Security Center to deliver real-time, total-environment intelligence from any camera source, fixed or mobile. Vintra has built its proprietary deep learni...
Videalert, one of the UK’s leading suppliers of intelligent traffic management and enforcement solutions, has announced the appointment of Stuart Scott as Business Development Manager – North. In this new role, he will be responsible for managing relationships and developing new business opportunities with new and existing clients across the Northern England and Scotland. Stuart Scott has over 15 years’ experience of working in both local government and the private sector. He...
As part of its ongoing effort to create new opportunities for customers and partners, Synectics establishes an integration partnership with AnyVision, a pioneer in AI-based facial, body, and object recognition. This allows users of Synectics’ systems to utilise facial recognition data within its Synergy 3 command and control platform, and leverage this by combining with site-wide sub-systems data through the intelligent automation capabilities of the platform. This approach to combining and analysing data from multiple systems in tandem with AnyVision’s powerful technology will ultimately enable a more refined level of actionable intelligence not currently found in other surveillance systems available in the market. Cutting-edge solutions Synectics believes partnerships like this one with AnyVision create the foundation" Commenting on the inspiration behind this collaboration, John Roessler, Vice President of Gaming at Synectics, said: “Synectics believes partnerships like this one with AnyVision create the foundation from which our business can adapt to changes in the marketplace and answers the call from our customers to provide cutting-edge solutions. Taking this approach also allows for increased return on investment not only for us, but, more importantly, for our customers and partners.” Greg Alcorn, Divisional Director at Synectics, added: “As we endeavour to deepen our business across key sectors – transportation, infrastructure, oil & gas, gaming, public space, and high security – partnering with the leading technology providers in our industry who have complementary solutions to ours will be a crucial strategic component.” Facial recognition analysis The partnership will immediately allow end users to leverage the capability of AnyVision within the Synergy 3 command and control platform, enhancing the platform’s powerful situational awareness capabilities by marrying AI-driven facial recognition analysis with its suite of video, data, and alarm management tools. Synergy 3 is used worldwide in sectors where surveillance is critical to business and security, from city surveillance, transportation hubs and networks, oil and gas installations, and CNI infrastructure, to high-security sites, casinos, and major public attractions. The partnership is also part of AnyVision’s mission to make its innovative AI-powered technology available to more businesses and environments across the globe. Unlike other software solutions in the market, AnyVision’s software is plug-and-play for new and existing systems, and able to overcome challenges such as occlusions, different angles of view, and poor lighting conditions. Real-world analytics Facial, body, and object recognition have real-world benefits right now" AnyVision currently develops technology for security and surveillance, mobile authentication, access control, and real-world analytics. Boris Gokhman, Vice President of Strategic Partnerships at AnyVision, commented: “Facial, body, and object recognition have real-world benefits right now. Collaborating with best-of-breed technology partners to help more organisations ‒ working across diverse sectors ‒ harness new capabilities and achieve those benefits is hugely important to us.” “We are delighted to be working with Synectics on this and look forward to expanding this partnership in the future.” With the aim of creating a true interoperability ecosystem, Synectics recently launched a new Software Development Kit (SDK) to help third-party tech companies and developers write their own integrations to Synergy 3.
Leading lock specialist Pickersgill-Kaye (Kaye), a brand under ASSA ABLOY’s High Security & Safety Group, is encouraging those responsible for critical infrastructure sites to consider servicing contracts to help minimise the risk of costly breaches of security. Perimeter protection With terrorism posing a serious threat to the UK’s interests, perimeter fencing, doors and their locks are the first line of defence against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access.Kaye offers facility managers preventative measures that can reduce deterioration of operational parts and identify faults Safeguarding these vital facilities has become significantly more complex and an essential challenge for all major industries. Enlisting the services of security experts like Kaye offers facility managers preventative measures that can reduce deterioration of operational parts and identify faults before they become a potential problem. Electronic and mechanical locks Locks, which are the heart of any integrated security system, can take a pounding from human intervention and environmental conditions. Regular maintenance checks and rapid repairs of doors and locks can nip in the bud risks of unauthorised access to a secure site’s operations. The High Security & Safety Group, a division of ASSA ABLOY Opening Solutions UK and Ireland, employs a team of qualified engineers that hold high level security clearance. They can provide a quick response throughout the country, including emergency call-outs, to resolve issues, repairing and replacing not only the locks but the high security doors as well, irrespective of the type or original manufacture. High-security doors Behind this support in the field is a 24-hour service hotline, a first-time fix policy – a service that is unique to the High Security & Safety Group, and planned, customised maintenance contracts to give total peace of mind that high security doors and their components are continuing to be fully fit for purpose. Simon Teagle, Managing Director, High Security & Safety Group, said: “Our fully trained and qualified engineers are able to service doors and components from other manufacturers, as well as ASSA ABLOY Group products, to maintain maximum operations on a high security installation. We believe that we offer the most reliable and robust solutions for essential services to ensure the long life of equipment designed to protect infrastructure and deter unwanted visitors.” Training on security systems The company also provides consultancy and training for end users of its locks and high security systems The company also provides consultancy and training for end users of its locks and high security systems, either at its UK manufacturing facility or the customer’s site. Training is tailored to all levels of personnel and include supply of extensive documentation. Locks supplied by Kaye can be seamlessly integrated with third party systems, have been rigorously tested to the highest standards and are recognised throughout the world for their reliability, robustness and longevity. These products can be supported by a proactive, maintenance regime to extend their lifetime and cover exceptional circumstances such as abuse and attack, which can lead to operational issues. High-tech locks and doors Trouble-free locks and doors are an integral factor to the smooth running of any secure facility and regular servicing will help diagnose and eliminate potential weak links in the defence of essential services. It is recognised that long-term reliability gives greater value than short term fixes.
Qognify - the trusted advisor and provider of physical security and enterprise incident management solutions, is exhibiting at ISC West and demonstrating to more than 1,000 organisations around the world, how Qognify solutions are safeguarding people, infrastructure and business operations. At booth 13074, Qognify’s team of subject matter experts will advise security practitioners on how they can maximise the outcomes of their security strategies. Attendees at the ISC West International Security Expo, being held at the Sands Expo Center will benefit from insights they can apply to maximise their organisation’s security strategy, whether in education, critical facilities, finance, healthcare, logistics, manufacturing, retail or transportation sectors. Qognify’s field-tested solutions have demonstrated maximum value to customers who place a premium on physical security. Incident management solutions Qognify applies a consultative approach to building solutions for customers, as opposed to recommending off-the-shelf products Qognify applies a consultative approach to building solutions for customers, as opposed to recommending off-the-shelf products. The company works with customers to understand their organisations’ strategic goals, along with any specific needs based on industry or legislative requirements. Assessing each scenario individually in this collaborative process, has resulted in system solutions that have quantifiably increased the security and operational efficiencies in enterprises. Qognify CEO and President, Steve Shine states: “Customers with complex physical security requirements, or systems that are dictated by strict regulations, or even those with specific needs based on their particular industry have realised optimised outcomes with Qognify solutions.” Shine adds: “Our software solutions reach beyond traditional safety and security applications and deliver far reaching and quantifiable value to the customer across many industries and use cases – even in unexpected areas that may surprise.” Qognify invites visitors of ISC West to visit booth 13074 to learn about how Qognify provides added value and unique physical security and incident management solutions to customers.
Videotec presents NTX, the new IP68 stainless steel thermal camera, developed to provide an efficient and preventative surveillance system in the most critical environmental conditions. The NTX thermal camera offers temperature detection based on the 4 central pixels of the image, and with the advanced version, the temperature of a specific object can be measured at any point in the image by means of defining a specific area. As well as this, the radiometric functions offer the option to set a temperature limit, beyond which an alarm will be raised. Unwanted intrusions These functions are necessary where fire prevention is required or in applications such as monitoring industrial processes or critical equipment, where the ability to identify something quickly and accurately, thus preventing problems or failures and keeping intervention times to a minimum, is essential. Configuring and controlling thermal image parameters is possible via the ONVIF Thermal Service Standard NTX can export all the data necessary for a centralised management of video feeds, data and alarms, and make it available to VMS via the ONVIF Profile S and Profile Q communication protocols. Also, configuring and controlling thermal image parameters is possible via the ONVIF Thermal Service Standard. NTX allows exploiting fully the features and the advantages offered by the thermal camera. This includes the ability to raise an alarm and initiate immediate actions in order to prevent accidents or unwanted intrusions into monitored areas. Adverse environmental conditions The NTX camera is made entirely from electropolished AISI316L stainless steel and stands out thanks to its compact design and light weight. This, and the fact that it can be connected quickly, makes installation and maintenance easier. The modular support for wall, ceiling or parapet is supplied as standard. The NTX has obtained Lloyd’s Register Marine Type Approval certification for the maritime and naval sector and complies with the standard for railway applications. NTX is exceptionally resistant to corrosion and has a wide operating temperature range (from -40°C to +65°C). Its IP66/IP67/IP68, NEMA Type 4X and Type 6P grades guarantee maximum protection and optimal camera operation in even the most adverse environmental conditions. The fact that the NTX is extremely sturdy and of high quality means it is ideal for the most demanding applications in the marine and industrial sectors, in critical infrastructures, power plants and transport sector, including railways and motorway tunnels.
Ocucon’s intelligent video redaction service - Ocucon Pixelate - is set to drastically reduce the cost of CCTV GDPR compliance with the launch of new automatic full body video redaction. Part of a second generation roll out of Ocucon Pixelate’s intuitive web-based software, the introduction of the pioneering full body redaction technology will allow users to simply select the people they do not wish to pixelate before footage is automatically redacted in a matter of seconds. In addition, a new user-friendly manual redaction tool will allow additional features, such as car registration numbers or credit card details to be redacted quickly and easily. Users of Ocucon Pixelate will also notice a new look and feel to the web-based portal as part of the roll out of its intuitive second-generation software. Residential security market Ocucon Pixelate is partnering with Videcon, its main UK distributor, to exhibit at the event and can be found on stand SE50 The new automatic full body redaction functionality will be unveiled at The Security Event, a major new exhibition for the commercial and residential security market at The NEC Birmingham from 9th – 11th April 2019. Ocucon Pixelate is partnering with Videcon, its main UK distributor, to exhibit at the event and can be found on stand SE50. The second generation Ocucon Pixelate software will also be exhibited at Retail Risk London, the risk management and loss prevention event for the retail industry on the 11th April 2019; Security TWENTY 19 in Glasgow on the 30th April 2019; and the Retail Industry Leaders Association (RILA) Retail Asset Protection Conference 2019 in Denver, Colorado from the 5th – 8th May 2019. Harnessing the power of artificial intelligence and machine learning, Ocucon’s innovative pixelation service delivers intelligent cloud-based video redaction tools for General Data Protection Regulation (GDPR) compliance. Outsourced redaction services Whereas traditional outsourced redaction services are time consuming and costly, Ocucon Pixelate allows users to quickly upload and redact CCTV files via a secure web-based portal for a fraction of the cost, with monthly subscriptions starting from as little as £20 per month. Ocucon Co-Founder, Gary Trotter, commented: “Many businesses and organisations don’t realise that if they record and store CCTV footage they could be subject to costly subject access requests. Tougher restrictions around personal data following the introduction of GDPR, can result in organisations needing to pixelate significant amounts of footage and the cost of outsourcing this can be extremely high. Our cost-effective, web-based service, Ocucon Pixelate, already allows organisations to quickly and easily upload and redact video footage and with the introduction of a first-of-its-kind full body redaction functionality, we’re yet again setting a new standard in surveillance technology as the most intuitive and cost effective video redaction service on the market.” Ocucon Pixelate’s key features Pixelate’s innovative software is already used by a number of grocery retailers Originally launched in 2018, Pixelate’s innovative software is already used by a number of grocery retailers, high-street retail and food chains, local authorities and major transport providers. The introduction of the new functionality is expected to drive further demand. Ocucon Pixelate’s key features include: GDPR compliance – including auditable log of video redaction and UK processed data Intelligent automated redaction - select the people you want to pixelate Quick upload via easy-to-use web-based portal Suitable for all types of camera footage, including body-worn cameras Avoidance of high costs associated with traditional outsourcing of video redaction Significantly reduced redaction time compared to manual video redaction methods End-to-end advanced encryption of all footage and secure user access control via multi-factor authentication Intelligent data analytics Customers who already use Ocucon’s powerful, cloud-based storage and retrieval platform also have full access to Ocucon Pixelate and can select video clips to redact from within the cloud. Recognised by business awards for its digital technology innovation, Ocucon combines intelligent data analytics with the facility to store, analyse and retrieve unlimited amounts of HD video surveillance footage from within the Ocucon cloud-based portal. Since its launch Ocucon has seen significant interest in both the UK and US and is currently delivering a number of confidential pilots for supermarkets and retail chains.
Taking place 18-20 June 2019 at ExCeL, London, IFSEC International is Europe’s largest integrated security event. Registration is now open. One of the outstanding highlights from IFSEC 2018, the Converged Security Centre returns to this year’s show on an even bigger and better platform to showcase the very latest in integrated security management technology. Conceived and delivered by Vidsys, the Centre is a state-of-the-art demonstration area which expertly highlights the advancement of Converged Security Information Management (CSIM) and how software, hardware and all forms of information media can be expertly used to gain a complete overview of a developing security situation. Integrated approach to situation management The Converged Security Centre will present a wide range of simulated security scenarios related to situations such as transport, utilities, infrastructureEach day at IFSEC 2019, the Converged Security Centre will present a wide range of simulated security scenarios. These will relate to situations such as transport, utilities, open spaces and infrastructure, and reveal how integrated security systems can be aligned with supplementary information sources such as social media to provide end users with the whole developing picture. As a security professional, if your role is to manage the security of a large-scale asset, then the Converged Security Centre is an absolute must-attend feature; it will expertly show you how this technology provides a vital and integrated approach to situation management. The Converged Security Centre will crucially show how, with a fully converged security system, users can correlate multiple events into one situation, track major assets, execute efficient building management operations, mitigate cyber threats, monitor social networks and most importantly enable high level information security resilience. Highly efficient security solution Converged Security and Information Management provides a real time technical solution enhanced by Artificial IntelligenceThe Vidsys CSIM technology is the perfect integration platform for multiple systems and hardware to work in a fully integrated manner. This year, Vidsys will be welcoming support from a number of global partners, including Ipsotek and Micro Focus, to show how a vast range of related technologies can work in tandem, to provide a truly effective and highly efficient security solution. Converged Security and Information Management provides a real time technical solution enhanced by Artificial Intelligence, meaning large volumes of data can be interpreted and processed to enable a more efficient response. Experts from Vidsys will be on hand at IFSEC to help explain and guide visitors on the uses of CSIM, as well as how this integrated approach to security management can provide effective and long-term resilience for any major asset or installation. Monitoring physical and cyber security events There is a requirement for a converged security solution that monitors both physical and cyber security events under one, unified software platform"The Converged Security Centre is a cornerstone feature in IFSEC’s role as a platform to show security professionals technologies and capabilities in real time, delivered by world leading experts with solutions they can trust. It is also a key part of the IFSEC ‘Show Me How’ programme, providing direct access to learning and insights they would otherwise struggle to see. James I. Chong, CEO, Vidsys says: “We’re thrilled to be part of the Converged Security Centre’s return at IFSEC International 2019 and to be working with our global partners and experts to showcase and share what a truly converged security solution can provide to organisations worldwide. “Today, there is a rapidly growing requirement for a converged security solution that monitors both physical and cyber security events under one, unified software platform, especially due to the ever-increasing amount of data created in the world of IoT and Smart Cities.” Benefits customers safeguarding assets The last few years have shown how important it is for physical security vendors to ensure that their products are resilient to cyber physical attacks"Gerry Dunphy, Exhibition Director IFSEC, says: ‘’IFSEC is delighted to welcome Vidsys back to this year’s show as the key partner in The Converged Security Centre. The feature made a major impact at last year’s IFSEC, showcasing how integration and resilience can be achieved through the strategic use of CSIM. IFSEC visiting customers with key roles in safeguarding major assets will directly benefit from seeing the capabilities on display.” James Willison, Founder, Unified Security Ltd and Sarb Sembhi, CISO, Virtually Informed, added, "We are delighted to be working with UBM, Visdsys and their partners to bring together physical and information security professionals and converged technologies in one operations centre. “The last few years have shown how important it is for physical security vendors to ensure that their products are resilient to cyber physical attacks, and it’s important for them to ensure that their products can integrate with enterprise threat intelligence tools. This theatre showcases some of what is possible with integrated solutions.”
Today, customers are demanding immediacy, personalisation and seamless services from their providers and our desire for instant gratification means that those servicing the public need to provide easy, fast, smooth and continuous ways to meet customer expectations. This is where interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way. In recent years, kiosks have fast gained popularity, not only because they enhance customer satisfaction, as they operate in self-service mode, but they also provide crucial information or services to customers as and when they need it. Think about how you utilise such services, at a railway station to buy tickets, in a fast food outlet to order food or in other ways as you go about your daily business. Interactive kiosks can really help organisations to deliver a high level of service in an easy to use, automated way Today, kiosks are typically placed in high foot-traffic environments such as retail stores, hospitals, banks, hotels, airports, courthouses, libraries, railway stations – you name it – providing customer access to information, products, websites, tools, or applications. For those less familiar, an interactive kiosk is a computer terminal featuring specialised hardware and software that provides access to information and applications for communication, commerce, entertainment, or education. Kiosk software platforms are easy to deploy Integration of technology allows kiosks to perform a wide range of functions, for example, kiosks may enable users to order from a shop's catalogue when items are not in stock, check out a library book, look up information about products, issue a hotel key card, or enter a public utility bill account number in order to perform an online transaction. Kiosks are computing platforms where the user interface needs to be limited to serve a specific purposePut simply, kiosks are computing platforms where the user interface needs to be limited to serve a specific purpose. Whether it is a citizen-facing platform in a government building or a device in a train station, the common theme is that the user is constrained to undertake very specific tasks with that device i.e. buy a train ticket. The device itself might have a full-blown operating system but all the user can see is the app and what they need to do. Therefore, it is very important for kiosk software platforms to be very easy to deploy and they must provide a very intuitive user experience. It is very much about the interaction the user is undertaking and little beyond that, which means the software must be optimised for user interaction in that context. But what that means is that security is often a secondary consideration, with many kiosk software providers paying lip service to security, while they focus primarily on ease of use and ease of management. Thinking of a kiosk as just a terminal that wouldn’t be of interest to a hacker is precisely why they are so attractive to attacks The threat of cyber attacks However, today we are seeing cyber-attacks escalating and becoming an everyday occurrence; as adversaries seek out new methods of attack and new threat vectors, so kiosks are becoming more of a target and an attractive platform for cyber adversaries to attack. Most kiosk software platforms just provide a management layer to configure an endpoint device in that kiosk. If you think about a traditional endpoint device such as a laptop, they are more likely to have a greater set of defence tools deployed, actively managing and monitoring the device, regularly patching and updating it. This is not the same where kiosk platforms are concerned. Kiosks are becoming more of a target and an attractive platform for cyber adversaries to attack So why is this? Often, the business can’t justify having a full-blown operating system and sophisticated defence tools on that platform, especially if they have a large number of kiosks deployed out in the field. They are normally in highly remote or widely geographically dispersed locations, which means there are significant costs involved to go out and fix them. Protecting devices in a more robust way Likewise, organisations don’t always have the local IT resource in many of these locations to maintain the equipment and its security. Or, if there is a patch management process in place it might not always be timely. For example, if you adopt an Android platform, Google regularly announces the vulnerabilities they have patched. This means the device manufacturers have to try and create patches for the vulnerabilities that have been announced publically to the cybercriminals. Adversaries know there is a window of opportunity they can exploit because the software author has told them about it. That time delay can be even worse in kiosk ecosystems, where there may be a diverse geographic spread of devices. We need to increasingly think about how we protect these devices in a more robust way Or the kiosk might simply be old. One of the reasons the WannaCry ransomware attack ended up being so widespread, is that there were old computing terminals throughout the NHS, running old operating systems. Any unpatched version of Windows is susceptible, so it can end up being a false economy by attempting to run these legacy systems for too long. As we continue to exploit and expect technology in every far-flung corner of the world, we need to increasingly think about how we protect these devices in a more robust way. Thinking of a kiosk as just a terminal that wouldn’t be of interest to a hacker is precisely why they are so attractive to attacks, because they know the security might not be as tight as it should be. Making kiosks more secure could be the difference between you being breached and remaining safe.
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make improvements in the area of video security, and beyond. However, as the list of possibilities grows, so too does the risk of unauthorised access by cybercriminals. We should all be aware that a single weak link in a communications infrastructure can give hackers access to sensitive data. That’s the bad news. Safeguarding data and utilising deep learning The good news is cybercrime can be avoided by employing a data security system that’s completely effective from end-to-end. One technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’ Once this level of safeguarding is in place you can begin to confidently explore the technologies and trends happening now, and those on the horizon. So, what will be having an influence on surveillance in 2018? Well, according to IHS Markit, one technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’, which uses algorithms to produce multiple layers of information from the same piece of data, therefore emulating the way the human brain absorbs innumerable details every second. In Europe, GDPR compliance will also be a big talking point as new principles for video surveillance data collection, use limitation, security safeguards, individual participation and accountability are introduced. And, as the popularity – and misuse – of drones continues to rise, the recent developments in drone detection technology will be particularly welcomed by those whose primary concern relates to large areas, such as airport perimeter security. The future of 'smart' video analytics An important feature of today’s intelligent cameras is the ability to provide smart video analytics. The Bosch ‘i’ series, for example, offers a choice of formats – Essential Video Analytics and Intelligent Video Analytics. Essential Video Analytics is geared toward regular applications such as small and medium businesses looking to support business intelligence (e.g. inter-network data transfer), large retail stores and commercial buildings for advanced intrusion detection, enforcing health and safety regulations (no-parking zones or detecting blocked emergency exits) and analysing consumer behaviour. The camera-based, real-time processing can also be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Intelligent Video Analytics provides additional capabilities. It is designed for demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). An important feature of today’s intelligent cameras is the ability to provide smart video analytics Intelligent Video Analytics can also differentiate between genuine security events and known false triggers, such as challenging environments created by snow, wind (moving trees), rain, hail, and water reflections. For more expansive areas, like an airport perimeter fence, the system has the range and capability to provide analysis over large distances. And, if a moving camera is employed, it is also possible to capture data on objects in transit when used in conjunction with the Intelligent Tracking feature. For roadside use, Intelligent Video Analytics systems, such as the Bosch MIC IP range, are resistant to vibrations and can still operate in extreme weather conditions, continuing to detect objects in heavy rain or snow. Evolving cameras past surveillance It’s becoming ever clearer that the IoT is transforming the security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. The capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed) With intelligent video security cameras at the core of an urban infrastructure smart data can be collected to optimise energy consumption via smart city lighting that responds to crowd detection and movement. Cameras can also be used to improve public transport by monitoring punctuality and traffic flow based on queue lengths, with the ability to control traffic lights an option should a situation require it. As the urban sprawl continues and this infrastructure grows, the need for more knowledge of its use becomes more essential, necessitating the monitoring technology developed for use by human operators to evolve into smart sensing technology, that no longer just provides video feeds, but also uses intelligent analytics and sophisticated support systems. These systems filter out irrelevant sensor data and present only meaningful events, complete with all relevant contextual data to operators to aid their decision-making. Expanding the video security camera network Today, video analytics technology has tangible benefits for human operator surveillance, and delivers KPIs that are highly relevant to transport operators, planners and city authorities. As an existing infrastructure, a video security camera network can be improved and expanded by installing additional applications rather than replaced. From a business perspective, that means greater value from a limited investment. Thereafter, the capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed), image and data interpretation, and the ability to perform a variety of tasks independently to optimise both your safety and business requirements. The fact is, cameras see more than sensors. Sounds obvious, but a conventional sensor will only trigger an alarm when movement is detected, whereas a camera can also provide the associated image and information like object direction, size, colour, speed or type, and use time stamps to provide historical information regarding a specific location or event. Based on this evidence, the video security camera of today is more than ready for the challenges of tomorrow.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
Information can be a scarce commodity in the midst of terrorism or a mass shooting incident. Information can also save lives during the first critical moments of such events. The general public can now download a free smartphone app that provides instantaneous real-time information as a terrorism or mass shooting event is unfolding. TerrorMate crawler software Called TerrorMate, the app began development in 2013, in the wake of several terrorist attacks in France. People in the affected areas were relying on media sources, which sometimes do not provide information on a real-time basis as an event unfolds. To provide information faster, TerrorMate’s proprietary “crawler software” uses more than 200 key words to monitor Internet, social media and “dark web” sources. They also monitor Telegram channels, which are private encrypted messages that terrorists use to communicate. TerrorMate has access to four channels used by the Islamic State. Know your enemy Any leads are then confirmed using 1,100 human sources “on the ground” around the world, including contracted security consultants and law enforcement. TerrorMate employs 15 analysts and 10 software developers who work in a global control room in Belgium 24/7 to monitor any situations. Unlike media professionals, who are monitoring a range of news stories in a variety of fields, TerrorMate operators are focused solely on terrorism and mass shooting events. TerrorMate’s proprietary “crawler software” usesmore than 200 key wordsto monitor Internet, social media and dark web sources “We keep up with what the threat is doing,” says Barry Oberholzer, founder of TerrorTech, the developer of TerrorMate. “You need to know your enemy. We keep analysing and researching so we know the enemy. Mass shootings are hard to predict, and terrorists keep changing their methods, from suicide bombings to vehicle attacks. The game keeps changing, and we see that and keep up to speed on what they’re doing.” Intelligence communication TerrorMate also keeps up to date by communicating with authorities around the world, ranging from an intelligence agency in Spain to the customs and immigration services in Great Britain, from Belgium’s state security services to France’s national police. In addition, TerrorMate is an authorised alert distributor of the Integrated Alert and Warning (IPAW) system operated by the U.S. Department of Homeland Security and the Federal Emergency Management Agency (FEMA). Mission goals TerrorMate has a two-pronged mission. One goal is to provide actionable intelligence to law enforcement to help prevent an imminent attack. If TerrorMate personnel identify a possible threat, whether on social media or the dark web, they confirm the information and then communicate it to local law enforcement. The second goal is to provide real-time information to the general public about terrorism and mass shooting events. The app can be downloaded from the iTunes app store or Google Play. TerrorMate employs 15 analysts and 10 software developers who work in a global control room 24/7 to monitor any situations In addition to providing timely reports, the TerrorMate app includes a “safety guide” during an attack, advising phone numbers that users can call or people they can contact for additional information; listing which areas they should avoid; which public transport systems are functioning, etc. The goal is to get people to safety as soon as possible. During an attack in Barcelona on August 17 this year, the app provided a discount code to enable users to get a free taxi ride home from the affected areas. Tailored location alerts Because the app uses the smartphone geolocation feature, TerrorMate can send tailored alerts based on where a user is located. Users can also choose whether they want only local (in-country) or international alerts. Users may upload media, including photos and video, to the app; all information is verified by the TerrorMate control room and then shared with authorities. Because the app uses the smartphone geolocation feature, TerrorMate cansend tailored alerts basedon where a user is located The app also allows users to share their location with a list of contacts, in effect enabling users to see where their loved ones are during an incident, and to send and receive messages. The feature was developed after the May 2017 bombing at an Ariana Grande concert in Manchester, United Kingdom, when parents needed information on whether their teenagers were safe as the tragedy unfolded. Vehicle integration TerrorMate will integrate with vehicle systems such as OnStar and Uconnect within the next six months. Companies may also subscribe to the service. A benefit is early warning of a terrorist event that might impact a company’s operation. For example, one stock broker subscribes to the service to get early warning of any incident that might negatively impact stock prices. Corporate licensing fees are one source of potential revenue for the company, which currently is self-funded and has little revenue, according to Oberholzer. Identifying what constitutes a mass shooting is not always a clear-cut process, and often the determination happens in real-time. The basic criteria TerrorMate uses is multiple casualties in a highly populated area. Analysts make the call based on real-time information as it comes into the control center about an unfolding incident. Any early information that is reported is labelled as a “possible” mass shooting until it is confirmed. TerrorMate is currently available in English, French, German, Spanish, Italian, Russian, Korean, Japanese, Chinese, Dutch, Swedish and Portuguese.
We can add another technology category to those aspects of the physical security market on the verge of being changed by cloud technology. The new category is the printing and encoding of ID cards. HID Global is adapting the benefits of cloud computing to the ID card printing market with the introduction of HID Fargo Connect, a cloud-based personalisation and issuance system for ID cards. The new cloud approach, which will be introduced at the ASIS 2017 show in Dallas, converts standalone card printers and encoders into edge devices in the Internet of Things (IoT). In effect, ID cards can now be printed from any device anywhere on any other device anywhere else. Evolving ID card market Historically, ID cards were printed by local standalone printers connected to on-premises personal computers (PCs). Using the cloud approach, a card can be printed from a tablet or similar device and directed to a cloud-connected card printer. The cloud approach is a new twist in a mature market that has been largely unchanged for the past two decades. HID Global, which acquired the Fargo printer business in 2006, is seeing customer needs evolving to include both printing and encoding ID cards. In the future, customer needs will broaden to encompass every aspect of managing identity issuance, according to Craig Sandness, Vice President and Managing Director of the Security Issuance business unit at HID Global. “This is not a one-off product but a new platform, and new solutions will continue to be introduced and evolve in the market,” says Sandness. “We are initially focusing on the higher-education market, but there are lots of opportunity in several major verticals, such as corporate environments with multiple locations. The solution can be centrally managed for all the locations.” Other HID Global vertical markets include government and public administration, healthcare, financial, transportation, and enterprise. Benefits for end users Benefits for end users include greater flexibility in how card printing systems are designed and operate, says Sandness. More flexibility enables end users to streamline processes and promote a better “customer experience” when issuing ID cards and credentials. The new cloud approach converts standalone card printers and encoders into edge devices in the Internet of Things For example, students no longer have to wait in long queues at multiple PC workstations to be issued cards in a higher education environment. Instead, card issuance can be managed in a more casual, relaxed environment, with operators using tablet computers to input data and capture images for the cards, which can then be printed in bulk at a large production facility connected to the cloud. Kent State University, Kent, Ohio, is an early user of HID Fargo Connect. The cloud approach also takes away the need to manage software and other IT resources. End users get better visibility and more control of the card issuance processes, according to HID Global. New economic models for security integrators For integrators, the approach introduces new economic models for their business. It allows their customers to transform the issuance of ID cards from a capital expenditure (capex) to an operating expense (opex). Security dealers no longer need to be just in the business of selling card printers; they could also be in the business of providing cards as a service, payable as a monthly operating expense based on how many cards are needed, for example. Providing a service rather than a product can position dealers for a longer-term relationship with a customer, in effect promoting “stickiness” (customer retention). The service aspect also provides dealer/integrators new opportunities to realise recurring monthly revenue (RMR). Benefits for dealers Dealers can also benefit from automated replenishment systems. A cloud-connected printer can signal a dealer automatically when it needs a new ribbon, for example, thus boosting a dealer’s ongoing business in consumables. “There could be an annual or monthly contract that allows the integrators to provide much better and more timely service and faster consumables,” says Sandness. As with any IoT approach, cybersecurity is paramount, and HID Global emphasises the cloud card issuance system is secure. The system uses HID’s Identrust Certificates and end-to-end encryption, and all personal data is transcient, not stored, and communicated between highly secure end points. “The print systems have unique firmware and will only work with Fargo Connect,” says Robin Tandon, Director of Product Marketing, Cloud Solutions, Secure Issuance Business Unit of HID Global.
A multi-division and multi-location conglomerate in Kutch (Gujarat, India), engaged in manufacturing, trading, exporting and supplying a finest assortment of Roofing Accessories Roofing Sheets, Metal Coils, Roofing Accessories, Metal Roofing Sheets, Coated Roofing Sheets and Tiled Sheets for Roofing has trusted Matrix with providing top grade security solutions for its site. Matrix IR bullet cameras and VMS VMS Software with Inbuilt Weighbridge Application Module: SATATYA SAMAS PLT IPC Channel Wise ANPR/LPR License (ANPR1) Cameras installed at the site: 2 MP Varifocal IR Bullet Camera with 2.8-12 mm Lens- SATATYA CIBR20VL12CWS 2 MP Fixed Lens IR Bullet Camera with 3.6 mm Lens- SATATYA CIBR20FL36CWS The company was using conventional Weighbridge system that performed basic functionalities. This traditional system had certain limitations, such as Data spoofing due to manual system Lack of centralised solution for multiple branches Dependency on more than one system Lack of evidence for auditing purpose Matrix Weighbridge integration solution Looking at all the challenges that the company was facing, Matrix offered an optimised solution with Weighbridge Integration. Matrix Weighbridge Integration solution provides the following functionalities: Vehicle Number Snapshot (ANPR) Driver Snapshot (Evidence) Material Snapshot (Auditing) Weighbridge Snapshot (Avoid Data Spoofing) Safeguard Evidence Bookmark Video Recordings Print Evidence Record Periodic Report Generation Benefits Client will be able to track in-bound and out-bound material movement by capturing the details of respective material weight. Enables the client to make easy comparison of weights between supplying plant and receiving plant with the help of captured screenshots. Record weight of the material and then use the data to post good’s receipts, production bookings and dispatch documents, etc. Limits Weighbridge Vendor dependency by providing interoperability without depending much on other APIs.
The new vibration-proof Wisenet TRM-410S and TRM-810S NVRs manufactured by Hanwha Techwin are designed to be at the heart of video solutions for transport applications. Wisenet NVRs With a footprint of just 250mm x 210mm and offering two-way audio communication, the two new robust NVRs are EN50155, EN-50121 and EN-61373 certified. This makes them particularly suitable for deployment on buses and trains where they can be used to record video of passenger activity, as well as video of the road or track ahead, in order to provide evidence of any incidents. The new NVRs, which support H.265, H.264 and MJPEG compression, offer 4TB onboard video data storage, with the TRM-810S also offering the option of RAID. PoE/PoE+ support Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch, making them ideal for mobile applications as there is no need to install separate power supplies for cameras and monitors. Designed to offer the stable recording of event and location data as well as video, the two new devices complement the sixteen channel TRM-1610S and TRM-1610M NVRs and the three compact Wisenet X mobile H.265 dome cameras which were launched in 2018. Cost-effective video solution “Our two existing sixteen channel NVRs are proving to be popular among train operators who wish to record images captured by a large number of cameras installed in train carriages,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “The introduction of the four and eight channel NVRs means that we now have cost-effective solutions for bus, coach and truck type applications.”
Apstec Systems (Apstec) announces that its Human Security Radar (HSR) system will be deployed at the Palexpo Exhibition and Congress Centre in Geneva to improve safety and security for the International Motor Show 2019. Asptec’s HSR system is the world’s first fully automatic real-time mass people screening solution. Held over a period of ten days, the Geneva International Motor Show is one of the automotive industry’s flagship events and attracts large numbers of visitors every year. The organisers are anticipating up to three-quarters of a million visitors over the duration of this year’s event, with capacity reaching 150,000 attendees a day during peak times. Largest conference centres The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors HSR is uniquely well suited to managing this level of throughput and providing a high level of security without causing disruption to the flow of visitors into the venue, or negatively impacting their experience. Two HSR systems will be deployed for the show, each capable of screening up to 10,000 people per hour. The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors. Traditional security checkpoints or manual searches, which scan one individual at a time, are not suited to large venues and public places, leading to queues and delays. Although security is still paramount, attention has moved towards the need to add a critical level of defence that doesn’t impede visitor experience. Cost-effective solution HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in high footfall scenarios. The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. Developed by specialists in the fields of radio physics, electronics and software engineering, the walkthrough system has been built in conjunction with authorities and ‘end users’ in security and counter-terrorism. HSR screens for mass casualty threats including improvised explosive devices concealed on the body or in body-worn bags, and firearms wherever they are carried, without the need for an operator to inspect suspect materials. It leverages centimeter wave technology, meaning it can discriminate explosives from benign materials, with a high degree of accuracy. Security screening The Palexpo’s deployment of HSR is the latest major implementation of this new technology Gregory Labzovsky, CEO, Apstec, explained: “Until recently, it’s been almost impossible to secure public spaces in a simple and cost-effective way, with existing approaches to security screening proving to be impractical, inconvenient and expensive to operate. HSR enables venue owners to close a critical security capability gap without impacting the experience of their patrons. We’re delighted to be working with The Geneva International Motor Show to enhance safety for thousands of motoring exhibitors and enthusiasts.” The Palexpo’s deployment of HSR is the latest major implementation of this new technology. The system has been installed in some of the world’s busiest airports, as well as in sports stadiums, entertainment venues, mass transport hubs and networks.
IDF Aluminium has installed transom closers, solenoid locks and hook locks from Alpro Architectural Hardware at a building in a historic section of London’s Finsbury Square. 4 Chiswell Street backs onto the Artillery Ground which has seen archery in Tudor times, some of the first organised games of cricket in the 1730s and even a hot-air balloon flight in 1784. The four-storey structure was refurbished by main contractor Parkeray to a design by Ben Adams Architects that created column-free office space with exposed concrete soffit and a signature golden mesh & grille facade based on curtain walling with bold circles. Automatic voltage regulation The glazing is unusual since the Reynaers’ curtain walling for the double-height reception uses innovative bracketry to support massive panes from Euroview Architectural Glass. The Alpro closers are on the distinctive gilt exterior doors and the client is also benefiting from solenoid bolts in the door heads. Alpro transverse action deadlocking bolts offer high levels of physical strength with holding forces of up to 2,000kg Alpro transverse action deadlocking bolts offer high levels of physical strength with holding forces of up to 2,000kg, a bolt throw of 14mm and models with oversize pins. The advanced microprocessor module provides power reduction allowing for continuous operation without heat generation as well as automatic voltage regulation, dual monitoring and access control features to fully monitor and control movement. Installers can use housings from the same series for surface mounting which facilitates the securing of glass doors. Dress plates are offered for a clean finish. Public sector environments The 4 Chiswell Street refurbishment was carried out with tenants in occupation and even involved use of abseiling techniques to replace glazing. A temporary reception was created for access and egress. Daylight has been maximised and floor-to-ceiling height is used wherever possible in a design that meets the Equality Act and includes a revised fire strategy. IDF specialises in the design, manufacture and installation of aluminium doors. The door projects are often in business and public sector environments where usage may be high but maintenance costs must be minimised. IDF has 30 years’ experience in the shop front and commercial door market. The company ensures a quality service by designing and fabricating all of its doors and shop fronts in-house with no use of sub-contractors. The client portfolio covers transport, local government, healthcare and education from schools through to universities.
Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland has supplied a number of high security steel doorsets to Network Rail for the upgrade of its remote signal rooms. The project was commissioned through Kent-based trade customer Taylor Refit, who removed the existing doors and installed new high security steel doorsets certified to LPS 1175 security ratings from the Powershield range. Network Rail specified that the high security doors supplied needed to offer maximum protection to the remote rooms The upgrade comes as part of Network Rail’s plan to heighten the security level to its signal rooms following the recent vandalism. High security doors for Network Rail Network Rail specified that the high security doors supplied needed to offer maximum protection to the remote rooms, whilst also providing a cost-effective solution. ABLOY Protec cylinders were also incorporated into the specialist locks throughout the sites. Due to the easy-to-install products, Taylor Refit was able to remove and install the security doors in just one day, resulting in minimal disruption to services. Superior security doorsets Chris Cole, Area Sales Manager (SE & London) for Door Group, ASSA ABLOY EMEA comments: “We are delighted that Network Rail gave us the opportunity to provide superior security doorsets to this project and we hope to build on our relationship in the future. We had to ensure that the doorsets we were supplying offered maximum security, as per the customer’s specifications" "We pride ourselves on supplying high quality products and we work closely with our customers to understand their specific requirements and to provide specialist and tailored solutions. We had to ensure that the doorsets we were supplying offered maximum security, as per the customer’s specifications.” Door Group’s work with Network Rail follows a number of high-profile contracts with Transport for London and Crossrail Limited. Brian Sofley, Managing Director for Door Group, added: “We pride ourselves on our portfolio of well-respected clients that choose to work with us time and time again. We attribute this to our comprehensive service offering and expert advice throughout each project.”
Apstec Systems announces that its Human Security Radar (HSR), the first fully automatic real-time mass people screening solution, has been selected by Esenboga Airport, Ankara, to significantly boost security in land side areas. Chosen following a rigorous selection process, including a pilot installation, HSR will be installed at the terminal entrances as part of ongoing security enhancement measures by the Turkish State Airports Authority. It will enable people screening without slowing down the flow of traffic, with each system capable of scanning up to 10,000 individuals per hour. The technology was deployed in partnership with local distributer AKBA. Cost-effective solution The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism. Since these events there has been global interest in securing the land side of airports, but traditional aviation style security checkpoints or manual searches, which scan one individual at a time, are not suited to purpose and result in large queues of passengers, which are vulnerable to attack in their own right. With existing approaches to security screening providing impractical, inconvenient and expensive to operate, terminals have remained susceptible to attack, or are subject to intrusive and disruptive security screening regimes. HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in such high footfall scenarios. Enhanced security measures The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. The walkthrough system uniquely combines unparalleled high throughput, speed and accuracy, simultaneously screening multiple subjects in real-time for threats, without the need for an operator to inspect suspect materials. With 40,000 passengers traveling through Esenboga Airport every day, the deployment of HSR will be instrumental in improving security for millions of people. Through deploying HSR as part of its commitment to terminal safety and enhanced security measures" “HSR constitutes a major breakthrough in the way airports protect the land side of terminals,” commented Osman Aksoy & Sirzat Balin,Co-Founders, AKBA. “Through deploying HSR as part of its commitment to terminal safety and enhanced security measures, the Turkish Airport Authority has taken a major step to prevent the reoccurrence of terrorist attacks.” Mass transport hubs Esenboga Airport’s uptake of HSR is the latest major deployment of the technology, which is currently utilised by some of the world’s largest airports, as well as sports stadiums, entertainment venues, mass transport hubs and networks, places of worship, hotels and high-end retail and entertainment centres. “HSR is proven to dramatically improve safety in crowded public spaces, and enables venue owners to close a critical security capability gap,” added Gregory Labzovsky, CEO, Apstec. “We’re therefore delighted to be working with Esenboga Airport to enhance safety for millions of travellers. AKBA, our distributor in Turkey, were instrumental in helping the Turkish Authorities understand the potential of HSR.”
Round table discussion
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?